My xinetd has been running (my incoming proxies for) sshd and
telnetd with

        cps =   1 15
        cpm =   5 60
        cph =   20 300

for a fortnight now, and that has caught and stopped many sshd
password guessing runs/attacks, significantly lowering the CPU
load on my machines. (The attacks were doomed anyway, we use skey
authentication on those incoming services.) For reference on
attacks, please see

  http://isc.sans.org/diary.html?storyid=6214

Cheers,

Paul Szabo   p...@maths.usyd.edu.au   http://www.maths.usyd.edu.au/u/psz/
School of Mathematics and Statistics   University of Sydney    Australia



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to