At 11:34 AM 9/9/2003 -0400, K Old wrote:
Also, they tech guy from the company
was able to connect to port 22, but how?  We got a connection refused.
For ssh to be able to validate a key it has to at least allow a
connection.  Does anyone have any idea how they achieve this kind of
security?

This kind of thing can be done pretty easily by simply blocking certain IP ranges with local firewall rules.


They could also be using an IPS to dynamically add blockades of any IP address that sends packets which look like they came from nmap. This kind of thing is pretty easy using snort and snortsam, or other packages.




------------------------------------------------------- This sf.net email is sponsored by:ThinkGeek Welcome to geek heaven. http://thinkgeek.com/sf _______________________________________________ Spamassassin-talk mailing list [EMAIL PROTECTED] https://lists.sourceforge.net/lists/listinfo/spamassassin-talk

Reply via email to