Hacked - FreeBSD 7.1-Release

Lowell Gilbert freebsd-stable-local at be-well.ilk.org
Tue Dec 29 19:30:13 UTC 2009

Edwin Groothuis <edwin at mavetju.org> writes:

> On Mon, Dec 28, 2009 at 10:44:41AM -0500, Andresen, Jason R. wrote:
>> The point is, if your machine is on the internet, then bots are
>> going to try password attacks on any open port they can find.  It's
>> just the sad fact of life on the current internet.  Unfortunately,
>> this activity will also make it much more difficult to determine
>> when you are under attack from an actual person, which was my point
>> earlier.  It's one that is not going to be easy to solve either,
>> unless you're willing to rewrite SSH to require every connection
>> attempt to pass a Turing test or something.
> On all systems which need to be accessible from the public Internet:
> Run sshd on port 22 and port 8022. Block incoming traffic on port
> 22 on your firewall.
> Everybody coming from the outside world needs to know it is running
> on port 8022. Everybody coming from the inside world has access as
> normal.

This assumes that everybody coming in from the outside is doing so from
a location that can reach port 8022 on your network.  Restrictive
corporate, campus, and hotspot firewalls will often break this
assumption.  If your network is personal, and you know the other ends
of the connections won't be so draconian, this isn't a problem.

More information about the freebsd-stable mailing list