Hi Mike! At this moment I am traveling for business, and when I get back I have to move to another house (I have all servers off). I will send you more information about the implementation ASAP.
Greetings! On Sat, Apr 26, 2008 at 3:48 AM, Mike <[EMAIL PROTECTED]> wrote: > HDC, > > I am interested in finding out more of how to setup something like that . > > > > > On Wed, Apr 23, 2008 at 4:06 PM, HDC <[EMAIL PROTECTED]> wrote: > > > > > I have 3 sshd deamons in my border firewall, 2 in no common ports for > > my use, and 1 on default port (without real access) for "prevention > > statistics". > > Depending of the "prevention statistic" I design de security policy to > > SSH and passwords. > > > > It nice to see the statistics of ilegal access on the default port of > > your sshd :) > > > > Greetings, > > Hernan > > > > OpenBSDeros.org > > > > On Wed, Apr 23, 2008 at 11:12 AM, Peter N. M. Hansteen <[EMAIL PROTECTED]> > > wrote: > > > > > > > > > "Ed Ahlsen-Girard" <[EMAIL PROTECTED]> writes: > > > > > > > When I was getting brute forced that way I just turned off remote > > password > > > > login and use keypairs exclusively. > > > > > > > > Which won't work for everybody, I guess. > > > > > > plus, of course, the fact that overload + flush global is fun to watch > > > > > > - P > > > -- > > > Peter N. M. Hansteen, member of the first RFC 1149 implementation team > > > http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/ > > > "Remember to set the evil bit on all malicious network traffic" > > > delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds. > > > > > > > > > > > > > > -- > > # /dev/hdc > > -> OpenBSDeros.org > > hdc [at] openbsderos [dot] org > > > > > > -- # /dev/hdc -> OpenBSDeros.org hdc [at] openbsderos [dot] org