illegal user root user failed login attempts

Francisco francisco at natserv.net
Wed May 18 06:26:35 PDT 2005


On Tue, 17 May 2005, Peter Kropholler wrote:

> As things stand, ssh is designed so you can't get at people's passwords
> and I am leaving it alone. Focussing instead on the task of making
> sure my passwords are strong

One thing I do is to prevent the IPs from connecting to my machine
One can either do it at the firewall level or use the route command to 
"blacklist" the IPs.

The advance of using route, I was told, is that it uses a more efficient 
way than the firewall to seek IPs.
The syntax for using route to black list is:

route add -host <ip of hacker> 127.0.0.1 -blackhole

The reason I do this is because I figure those machines may try other 
attacks besides ssh and also I just don't like to see my logs with so many 
warnings of break in attemps.


More information about the freebsd-questions mailing list