My xinetd has been running (my incoming proxies for) sshd and telnetd with cps = 1 15 cpm = 5 60 cph = 20 300
for a fortnight now, and that has caught and stopped many sshd password guessing runs/attacks, significantly lowering the CPU load on my machines. (The attacks were doomed anyway, we use skey authentication on those incoming services.) For reference on attacks, please see http://isc.sans.org/diary.html?storyid=6214 Cheers, Paul Szabo p...@maths.usyd.edu.au http://www.maths.usyd.edu.au/u/psz/ School of Mathematics and Statistics University of Sydney Australia -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org