On 2006/11/23 17:07, Igor Sobrado wrote: ... > to set up a firewall with an ever-growing list of hostile machines. ...
I think you misunderstand me. I mean to restrict direct SSH access to only those networks which need access, not to block attackers when you see them. Authorized users would either connect from an approved IP address, or by using authpf. (for this, I'm assuming use of a separate firewall to protect a number of other machines, not 'self- protecting'). There aren't a lot of cases where you need to leave SSH access open to the world.

