On Tue, 6 Oct 2009 11:06 +0200, des@ wrote:

"Peter" <[email protected]> writes:
Or combine that with portknocking - Only open port 22 after X number of
attempts to connect on port 1234:

> As has already been explained, that's no good if you need to ssh in from
behind a corporate firewall that blocks everything except 20, 22, 80 and
443.

DES


Don't forget about making good use of the following configuration turntables. You can enforce a default policy of deny by just saying that a user must be in the group of AllowGroups. This does enforce a little bit more of a administrative overhead but that's for your staff and policy to decide.

AllowGroups
AllowUsers
DenyGroups
DenyUsers

Collect tried user names and don't allow those to be added to your system as legitimate users is another approach. Configuring pw(8) and adduser(8) for this will be a good exercise.

--

%{----------------------------------------------------+
 | dataix.net!jhell         2048R/89D8547E 2009-09-30 |
 | BSD since FreeBSD 4.2    Linux since Slackware 2.1 |
 | 85EF E26B 07BB 3777 76BE  B12A 9057 8789 89D8 547E |
 +----------------------------------------------------%}
_______________________________________________
[email protected] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "[email protected]"

Reply via email to