*IPv4<br><br><div><span class="gmail_quote">On 12/19/07, <b class="gmail_sendername">ffm</b> <<a href="mailto:ffm@intserverror.com">ffm@intserverror.com</a>> wrote:</span><blockquote class="gmail_quote" style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">
<div><span class="e" id="q_116f44a5124a636e_0">On 12/19/07, <b class="gmail_sendername"><a href="mailto:elw@stderr.org" target="_blank" onclick="return top.js.OpenExtLink(window,event,this)">elw@stderr.org</a></b> <<a href="mailto:elw@stderr.org" target="_blank" onclick="return top.js.OpenExtLink(window,event,this)">
elw@stderr.org</a>> wrote:</span></div><div><div><span class="e" id="q_116f44a5124a636e_2"><span class="gmail_quote"></span><blockquote class="gmail_quote" style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">
<br>> On a simmilar vein, would it be much of a perfomance hit to be running<br>> denyhosts on these machines?<br><br>What would it do with the mesh network interface?</blockquote></span></div><div><br>IIRC, each member of the mesh is assigned an IPv6 IP address in the reserved range, so an attacker would have to disconnect and reconnect from mesh network to resume his attacks. Given the large number of IPs, it is unlikely that one will be reused.
<br><br>-ffm<br></div><br></div><br>
</blockquote></div><br>