Re: Security basics

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Alan M. Evans wrote:
On Wed, 2007-10-03 at 15:40 -0500, Steve Siegfried wrote:

Changing ports for ssh isn't actually that hot of an idea.  Most port scanners
can detect ssh implementations since they normally self-identify.  For example,
if you're running ssh on the normal port (22), try executing:
	/usr/bin/telnet YOUR.HOST.IP.ADDR 22
and see what pops out.

Of course. But most attacks aren't scanning every port on your machine
and trying to identify unknown services. Mostly they're just going for
the low-hanging fruit on the standard port numbers.


This whole line of reasoning is false. I don't care if Hacker, the bad guy, gets on my computer with ssh. He then needs to come up with a valid login name and password. If he fails at this in some set time it all quits.

Until you can convince me that my system is at risk from ssh when using a real password I am going to sleep well.



--

	Karl F. Larsen, AKA K5DI
	Linux User
	#450462   http://counter.li.org.


[Index of Archives]     [Current Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [Yosemite Photos]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux