also sprach Bernd Eckenfels <firstname.lastname@example.org> [2004.09.19.2153 +0200]: > You can either move your ssh to another port, that will greatly > reduce the distributed brute force attacks, or you can put > a filter with port knocking in front of it. Another option is to > turn off password authentication, completely. All of which are not options when you have a couple hundred users accessing the machine from anywhere on the globe, including from Windoze machines and Internet cafes. > And yes you should be worried about those attacks if you habe weak > passwords. If you have a weak password, you should be worried anyway. -- Please do not CC me when replying to lists; I read them! .''`. martin f. krafft <email@example.com> : :' : proud Debian developer, admin, and user `. `'` `- Debian - when you have better things to do than fixing a system Invalid/expired PGP subkeys? Use subkeys.pgp.net as keyserver!
Description: Digital signature