Hi Mike!

At this moment I am traveling for business, and when I get back I have
to move to another house (I have all servers off).
I will send you more information about the implementation ASAP.

Greetings!

On Sat, Apr 26, 2008 at 3:48 AM, Mike <[EMAIL PROTECTED]> wrote:
> HDC,
>
> I am interested in finding out more of how to setup something like that .
>
>
>
>
> On Wed, Apr 23, 2008 at 4:06 PM, HDC <[EMAIL PROTECTED]> wrote:
>
> >
> > I have 3 sshd deamons in my border firewall, 2 in no common ports for
> > my use, and 1 on default port (without real access) for "prevention
> > statistics".
> > Depending of the "prevention statistic" I design de security policy to
> > SSH and passwords.
> >
> > It nice to see the statistics of ilegal access on the default port of
> > your sshd :)
> >
> > Greetings,
> > Hernan
> >
> > OpenBSDeros.org
> >
> > On Wed, Apr 23, 2008 at 11:12 AM, Peter N. M. Hansteen <[EMAIL PROTECTED]>
> > wrote:
> >
> >
> >
> > > "Ed Ahlsen-Girard" <[EMAIL PROTECTED]> writes:
> > >
> > > > When I was getting brute forced that way I just turned off remote
> > password
> > > > login and use keypairs exclusively.
> > > >
> > > > Which won't work for everybody, I guess.
> > >
> > > plus, of course, the fact that overload + flush global is fun to watch
> > >
> > > - P
> > > --
> > > Peter N. M. Hansteen, member of the first RFC 1149 implementation team
> > > http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
> > > "Remember to set the evil bit on all malicious network traffic"
> > > delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.
> > >
> > >
> >
> >
> >
> > --
> > # /dev/hdc
> > -> OpenBSDeros.org
> > hdc [at] openbsderos [dot] org
> >
> >
>
>



-- 
# /dev/hdc
-> OpenBSDeros.org
hdc [at] openbsderos [dot] org

Reply via email to