The facts of life is script kiddies and robots roll through ranges
ip address looking for open ssh ports and then mount a attack. There
nothing you can do about this except change the port
number ssh uses to some high port number so they do not find you.

Here is document to explain how to do that in detail.

-----Original Message-----
[mailto:[EMAIL PROTECTED] Behalf Of nawcom
Sent: Tuesday, March 28, 2006 2:12 PM
Subject: ipfw secure setup for ssh bruteforcers

I have a pretty good setup with ipfw, and theres always dickheads
trying to get in - mostly through
old microsoft and ssh1/2 exploits with certain usernames and
passwords. I
pretty much add their ip to a protected ban list (after 5 tries)
which bans
them from the entire server.

>From any professionals, what is the most effective technique that i
use to take care of these kiddies
other than a complete ban? Is my technique good or is it oversecure?
admin said that doing this can be bad, especially when
the kiddy is connected to a large network like a company or
university; I
may block other people who aren't guilty of the act. (which makes

I use the up do date ssh so any exploits are
either patched up or will be patched when they're discovered, so
holes in
the program shouldn't be in issue.

any replies would be wonderful,

"They that can give up essential liberty to obtain a little
temporary safety
deserve neither liberty nor safety."
--- Benjamin Franklin
_______________________________________________ mailing list
To unsubscribe, send any mail to

_______________________________________________ mailing list
To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Reply via email to