From: Phill Edwards [[email protected]]
Sent: Tuesday, 10 November 2009 12:25 PM
To: Shorewall Users
Subject: Re: [Shorewall-users] counter SSH brute force attacks

> I haven't counted them here but I suspect that your result is about
> average. Together with using 'Limit', I disable password authentication
> in all of my SSH servers and then don't worry about it. They can try
> until hell freezes over and they still won't get in.

Sorry, but this comment was lost on me! How does disabling password
authentication make you more secure? Are you only allowing access with
private keys or something?

Yep, No opportunity for brute-force dictionary attach, the server is not 
interested/listening for a username/password combination, it does the DH bit 
and then exchanges certificates, and if there is a match, you are connected.

port knocking, obscure port, and certificates will make it about as good as it 
can get.

------------------------------------------------------------------------------
Let Crystal Reports handle the reporting - Free Crystal Reports 2008 30-Day
trial. Simplify your report design, integration and deployment - and focus on
what you do best, core application coding. Discover what's new with
NOTE: URL removed for security purposes - contact [email protected] 
for support.
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users

------------------------------------------------------------------------------
Let Crystal Reports handle the reporting - Free Crystal Reports 2008 30-Day 
trial. Simplify your report design, integration and deployment - and focus on 
what you do best, core application coding. Discover what's new with
Crystal Reports now.  http://p.sf.net/sfu/bobj-july
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to