On Wed, Mar 26, 2025 at 05:21:53AM +0800, jeremy ardley wrote:
> 
> On 25/3/25 23:22, Jan Claeys wrote:
> > On Mon, 2025-03-24 at 12:39 +0800, jeremy ardley wrote:
> > > I should mention that having an internet facing ssh service is
> > > usually a very bad idea. The 'better' approach is to have only a VPN
> > > exposed and use heavy security on that. Once the VPN link is
> > > established you can ssh through the VPN to internal systems.
> > Why do you think SSH is less secure than any other VPN ?
> > 
> > 
> One reason to choose VPN over ssh is that many ISPs block incoming ports
> including ssh, telnet, RDP,  smtp, and smb ports.
> 
> The more extreme ones block outgoing  connections on most of those those
> ports as well.

I was once sitting at a $(DAYJOB) where they blocked everything but
443 (and 80). I tunneled ssh over socat (with TLS, so that the handshake
didn't look suspect, in case their firewall sniffed that). Bonus: I
got to see whether they did MITM, since I made my own server and
client certs.

Bigcorps are like that. It was not that the firewall department didn't
want to talk to me. It was that they bought a "product" without really
understanding how it works.

Cheers
-- 
t

Attachment: signature.asc
Description: PGP signature

Reply via email to