Displaying 11 results from an estimated 11 matches for "wjw".
Did you mean:
waw
2004 Sep 18
8
Attacks on ssh port
....242.5.195 port 39239 ssh2
with all kinds of different source addresses.
They have a shot or 15 and then they are of again, but a little later on
they're back and keep clogging my logs.
Is there a "easy" way of getting these ip-numbers added to the
blocking-list of ipfw??
Thanx,
--WjW
2012 Nov 21
3
Increasing the DMESG buffer....
...n to my building this server.
I'm nogt able to get a full verbose dmesg.
Probably because the kernelbuffer for it is too small.
I know there used to be a kernel option to increase it.
But I can not find it with the setting in NOTES or any other place I
looked....
Is it still there?
Thanx,
--WjW
2008 Mar 04
2
Missing IMAP folders
...However I have over 3500 folders and most of them are more than 3 levels deep.
And I only get to see the first top level of directories.
Searching and/or subscribing does not bring anything.
Does somebody have pointers on how to fix this, other than manually trying to
recreate al subscriptions.
--WjW
2008 Jan 21
5
denyhosts-like app for MySQLd?
Hi all,
?Is there any app like denyhosts[1] but intended for MySQLd service?
We have a mysql ports (3306) opened for remote connections, and
obviously the /var/db/mysql/machine_name.log is full of these kind of
entries:
...........
936012 Connect Access denied for user 'user'@'85.19.95.10' (using
password: YES)
936013 Connect Access denied for user
2015 Mar 19
3
Patch for "doveadm -f table" nit (was Re: Dovecot current number of connections being used.)
On 03/18/2015 08:49 PM, Timo Sirainen wrote:
> There's no reason why flow and pager should write headers to stderr because it would always result only in a mess. But instead of changing table headers to write to stdout, I think a better fix would be to make tab formatter write headers to stderr. Including headers in stdout makes it more difficult to write scripts that access the actual
2005 Feb 22
1
periodic/security/550.ipfwlimit
550.ipfwlimit check in /etc/periodic/security takes into account only
global/default verbosity limit and does not account for a specific
logging limit set for a particular rule e.g.:
$ ipfw -a l | fgrep log
65000 *521* 41764 deny log logamount *1000* ip from any to any
$ sysctl -n net.inet.ip.fw.verbose_limit
*100*
>From security run output:
ipfw log limit reached:
65000 519
2005 Apr 06
8
What is this Very Stupid DOS Attack Script?
We have been noticing flurries of sshd reject messages in
which some system out there in the hinterlands hits us with a flood of
ssh login attempts. An example:
Apr 6 05:41:51 dc sshd[88763]: Did not receive identification
string from 67.19.58.170
Apr 6 05:49:42 dc sshd[12389]: input_userauth_request: illegal
user anonymous
Apr 6 05:49:42 dc sshd[12389]: Failed password for illegal user
2013 Jun 19
3
shutdown -r / shutdown -h / reboot all hang and don't cleanly dismount
Hello -STABLE@,
So I've seen this situation seemingly randomly on a number of both
physical 9.1 boxes as well as VMs for I would say 6-9 months at least.
I finally have a physical box here that reproduces it consistently
that I can reboot easily (ie; not a production/client server).
No matter what I do:
reboot
shutdown -p
shutdown -r
This specific server will stop at "All buffers
2010 Sep 01
2
HEADS UP: FreeBSD 6.4 and 8.0 EoLs coming soon
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hello Everyone,
On November 30th, FreeBSD 6.4 and FreeBSD 8.0 will have reached their
End of Life and will no longer be supported by the FreeBSD Security Team.
Since FreeBSD 6.4 is the last remaining supported release from the FreeBSD
6.x stable branch, support for the FreeBSD 6.x stable branch will also
cease at the same point. Users of either of
2010 Sep 01
2
HEADS UP: FreeBSD 6.4 and 8.0 EoLs coming soon
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hello Everyone,
On November 30th, FreeBSD 6.4 and FreeBSD 8.0 will have reached their
End of Life and will no longer be supported by the FreeBSD Security Team.
Since FreeBSD 6.4 is the last remaining supported release from the FreeBSD
6.x stable branch, support for the FreeBSD 6.x stable branch will also
cease at the same point. Users of either of
2009 Jul 23
1
[PATCH server] changes required for fedora rawhide inclusion.
...XL`
zek-ZSpcj*0;J4oC53X7=bW_vk8`njTn6kTXWK>TF7~CaEWWD&pv~pPQC+Qp4UmP)G
z-=;^)>sQ4CY1urmLR`MIv8XDgc>P87oa~c^i;n<4K*7Hkfxb7}=(_Vv*tOU at yl~Zm
z^pdY$_iA``%eUvgP5J%mCIabj3&;<jxwuEhJ9R%cyjt}<ZM`9Uh#tgzpCovC?Ns^7
z!|N?Ge%v5g^(!Xj%o#vhIS*|8t$x{8`*zIr+90{r{z%EAYnN7lT-B&P;+TsL*WjWO
zv6`Hxp1N~L at ld&AYtsqo>A66;|0XzDJs|qs{B^T(hZOG>ms|3RDgc;U;E>$gbpLw7
zs;X~h<z{W%>toKp(7U<66)3+ at 5q+g!_H=ChX6nwYjYET0F1WDiY6O^o-?8;$c7JrQ
zad5ATl~1aJ59AJxYMO6LYZ%p-B#!M1a=Yl#(+5{RUp$~gB#>Rt0FGHH at 8uncxbr*k
zRmB3o?$&})(`EyST(;=`iu!p(ZmgeR12MMCbP&1GAtX9{Z}IvANT0)...