Re: Repeated attacks via SSH

看板FB_security作者時間20年前 (2005/10/03 21:50), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串17/23 (看更多)
> Of course, the problem is that if you need to get access in an > emergency from who-knows-where, you're pretty much stuck with > passwords unless you have a token system or a one time password > system (e.g. S/Key). (Which reminds me: Anyone have a good S/Key > implementation for the Palm Pilot?) sshv2 with keys for palm at <http://shrug.csl.uiuc.edu/~sachs/palm/>. works great on my treo 650. if at all possible, just don't allow passwords the ssh root and dict attacks have been going on for long over a year. some days we see more than 25,000 per target host, occasionally 100,000. it's so common that i started to grep it out of log reports ages ago. randy _______________________________________________ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
文章代碼(AID): #13GJSO00 (FB_security)
討論串 (同標題文章)
文章代碼(AID): #13GJSO00 (FB_security)