On Sun, Nov 27, 2011 at 8:47 AM, Gordon Henderson
<gordon+aster...@drogon.net> wrote:
> On Sat, 26 Nov 2011, C F wrote:
>
>> On Sat, Nov 26, 2011 at 7:50 AM, Gordon Henderson
>> <gordon+aster...@drogon.net> wrote:
>>>
>>> On Sat, 26 Nov 2011, Terry Brummell wrote:
>>>
>>>> Install & Configure Fail2Ban then the host will be blocked from
>>>> connecting.  And no, it's not new.
>>>
>>> I don't need Fail2Ban, thank you. But your advice might be useful to
>>> others.
>>
>> Why is that?
>> Even if they don't compromise an account they are still using your
>> bandwidth and resources on your machine.
>
> Linux has excellent built-in subsystems to control firewalling and so on
> without resorting to external programs. It's called iptables. If you know
> how to use them, then using an external resource such as fail2ban is
> unneccessary.
So its not that you don't need it, but you use something else.
BTW, you were just proven wrong, you need it for this hack.

--
_____________________________________________________________________
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
               http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users

Reply via email to