On Jan 17, 2012 6:11 AM, "Mick" <michaelkintz...@gmail.com> wrote:
>
> On Monday 16 Jan 2012 01:35:04 Pandu Poluan wrote:
> > On Jan 16, 2012 12:58 AM, "Walter Dnes" <waltd...@waltdnes.org> wrote:
> > > On Thu, Jan 12, 2012 at 06:30:03AM -0500, Tanstaafl wrote
> > >
> > > > This is nothing like changing the port for SSH - a port scanner can
> > > > figure that one out in seconds...
> > >
> > >  A real BOFH would set up a dummy instance of sshd on the regular
port,
> > >
> > > as well as a real sshd instance on another port.  The dummy instance
> > > could be set up to always fail the login attempt, and with special
> > > iptable rules to not clutter up your logfile.
> >
> > And don't forget to put the false sshd through a tc rule that chokes the
> > return traffic to 1 cps B-)
> >
> > Of course, being the "real sysadmin" a.k.a lazy slob that I am, that's
way
> > too much work for not enough bastardly pleasure... I can't gleefully see
> > the face of people trapped in the tc hell :-P
>
>
> Can you set up tc by port?  I thought it is only applicable to an
interface.
> I need to brush up on this one day.

Actually, yes, by using u32 match.

But I prefer to just MARK the packet in iptables and match against that.

Rgds,

Reply via email to