On 2/25/06, Harry Putnam <[EMAIL PROTECTED]> wrote:
> "Melameth, Daniel D." <[EMAIL PROTECTED]> writes:
>
> > On a consumer-class Internet connection, I don't expect too much.
> > However, the following should only log ssh:
>
> That is what got me going on this... By negligence I'd left ssh open
> after coming home from a trip where I had it open for connectiong to
> home machine.  Normally I turn it back off when I'm home.
>
> I saw over a 5 day period some 13,000 hits on ssh port.  Apparently
> some half configured dictionary attacks.  I say half configured
> because the attemted user names don't seem to be in any recognizable
> order.  My passwords are good so I didn't get too worried but it did
> cause me to wonder what is going on that my ssh port got so
> interesting suddenly.

you worry too much. either choose good passwords, or better, setup
login with ssh-keys only. its worth reading and googling for maybe
an hour or two, if you're not familiar with it. if this is in place, you don't
have to worry, and you also don't have to log connections to your ssh
port.


--knitti

Reply via email to