On Tuesday, December 06, 2011 08:06:55 PM James A. Peltier wrote:
> [Changing the port #] is completely and utterly retarded.  You have done 
> *NOTHING* to secure SSH by doing this.  You have instead made it only 
> slightly, and I mean ever so slightly, more secure.  A simple port scan of 
> your network would find it within seconds and start to utilize it.

Simple port scans don't scan all 65,536 possible port numbers; those scans are 
a bit too easy for IDS detection and mitigation.  Most scans only scan common 
ports; the ssh brute-forcer I found in the wild only scanned port 22; if it 
wasn't open, it went on to the next IP address.

Unusual port numbers, port knocking, and similar techniques obfuscate things 
enough to eliminate the 'honest' script-kiddie (that is, the one that doesn't 
know any more that what the log of the brute-forcer I found showed, that the 
kiddie was going by a rote script, including trying to download and install a 
*windows 2000 service pack* on the Linux server in question).  This will cut 
down the IDS noise, that's for sure.  And cutting down the information overload 
for the one tasked with reading those logs is important.

Of course, it could be argued that if you have port 22 open and you get those 
kiddies, you can block all access from those addresses with something like 
fail2ban (and pipe into your border router's ACL, if that ACL table has enough 
entries available.....).

> A basic qualification to operate a computer would also be nice.  Sad thing 
> is, there is no such thing.

Microsoft has proposed such... of course, the prerequisites would likely 
include  running the latest Windows....

If you get an 'Internet driver's license' you then have to have a licensing 
authority, and any time you get that sort of thing involved.... well, you can 
imagine how it could pan out.
_______________________________________________
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos

Reply via email to