Not neccessarily. Does 'ps -A | grep sshd' show a sshd proccess running when no one is logged into the system via ssh? If your router doesn't allow you that kind of fine-tuning then I would just use a local rule on your computer. You don't need to have any kind of firewalling setup, as long as you have netfilter compiled into your kernel and the iptables package installed you can just create specific rules to block that IP.
-- Personal: Trevor Lauder Web: http://www.thelauders.net E-Mail: [EMAIL PROTECTED] Work: Trevor Lauder Technical Services Specialist Wireless Networks Inc. Web: http://www.wirelessnetworksinc.com E-Mail: [EMAIL PROTECTED] Jesse Kline said: > On Mon, 2003-02-03 at 13:30, Trevor Lauder wrote: >> Only if you are running sshd through the inetd services. If it is >> then yes a /etc/hosts.deny entry will work. I doubt that is how it is >> setup though, I would just use an ipchains/iptables rule to block that >> IP. > > Well it's setup so that sshd loads on boot, so that would indicate that > it's a child process of inetd, right? I don't have any firewalling setup > on this machine. It is all done in my router that sits between the DSL > modem and the local network. > > Jesse
