Not neccessarily.  Does 'ps -A | grep sshd' show a sshd proccess running
when no one is logged into the system via ssh?  If your router doesn't
allow you that kind of fine-tuning then I would just use a local rule on
your computer.  You don't need to have any kind of firewalling setup, as
long as you have netfilter compiled into your kernel and the iptables
package installed you can just create specific rules to block that IP.

-- 
Personal:

Trevor Lauder
Web: http://www.thelauders.net
E-Mail: [EMAIL PROTECTED]

Work:

Trevor Lauder
Technical Services Specialist
Wireless Networks Inc.
Web: http://www.wirelessnetworksinc.com
E-Mail: [EMAIL PROTECTED]

Jesse Kline said:
> On Mon, 2003-02-03 at 13:30, Trevor Lauder wrote:
>> Only if you are running sshd through the inetd services.  If it is
>> then yes a /etc/hosts.deny entry will work.  I doubt that is how it is
>> setup though, I would just use an ipchains/iptables rule to block that
>> IP.
>
> Well it's setup so that sshd loads on boot, so that would indicate that
> it's a child process of inetd, right? I don't have any firewalling setup
> on this machine. It is all done in my router that sits between the DSL
> modem and the local network.
>
> Jesse


Reply via email to