[Info-vax] SSH on VAX - performance impact of break in attempts

Mike Rechtman mike at rechtman.com
Thu Aug 26 10:00:20 EDT 2010


On 26/08/10 16:40, Bill Gunshannon wrote:
> In article<4C75EDE9.5060502 at vsm.com.au>,
> 	Jeremy Begg<jeremy.removethis at vsm.com.au>  writes:
>> Hi Mark,
>>
>> I can recommend from personal experience both of the following solutions:
>>
>> 1.  Change the incoming port to something other than 22.  This almost always
>> prevents your system being targetted by the bots.  (I typically add another
>> three digits to the port number.)
>
> It also prevents legitimate users from getting in if they don't already
> know what port you are using.  Reminds me of the guy I know locally who
> was trying to run a webserver from home even though it is prohibited by
> his AUP with his ISP.  He said he got around it by not using port 80 and
> moving the port around a lot.  Seemed rather silly to me as no one would
> ever know where to find his webserver!!
>
> bill
>
Also, when SSHing in from an outside site, I often find that non-standard ports 
(say ports other than 22,23 and 80) are blocked. Possibly illogical, but thats 
what their particular admin wants.

-- 
Mike R.
Home: http://alpha.mike-r.com/
QOTD: http://alpha.mike-r.com/php/qotd.php
No Micro$oft products were used in the URLs above, or in preparing this message.
Recommended reading: http://www.catb.org/~esr/faqs/smart-questions.html#before




More information about the Info-vax mailing list