[Info-vax] SSH on VAX - performance impact of break in attempts

Mike Rechtman mike at rechtman.com
Thu Aug 26 19:56:57 EDT 2010


On 27/08/10 02:13, VAXman- @SendSpamHere.ORG wrote:
> In article<kk8ik7-7s5.ln1 at Ubuntu.mike-r.com>, Mike Rechtman<mike at rechtman.com>  writes:
>> On 26/08/10 16:40, Bill Gunshannon wrote:
>>> In article<4C75EDE9.5060502 at vsm.com.au>,
>>> 	Jeremy Begg<jeremy.removethis at vsm.com.au>   writes:
>>>> Hi Mark,
>>>>
>>>> I can recommend from personal experience both of the following solutions:
>>>>
>>>> 1.  Change the incoming port to something other than 22.  This almost always
>>>> prevents your system being targetted by the bots.  (I typically add another
>>>> three digits to the port number.)
>>>
>>> It also prevents legitimate users from getting in if they don't already
>>> know what port you are using.  Reminds me of the guy I know locally who
>>> was trying to run a webserver from home even though it is prohibited by
>>> his AUP with his ISP.  He said he got around it by not using port 80 and
>>> moving the port around a lot.  Seemed rather silly to me as no one would
>>> ever know where to find his webserver!!
>>>
>>> bill
>>>
>> Also, when SSHing in from an outside site, I often find that non-standard ports
>> (say ports other than 22,23 and 80) are blocked. Possibly illogical, but thats
>> what their particular admin wants.
>
> Blocked by whom?  The site you want to get into?  Or, the network you are using
> at the time?
>
 From some sites (perhaps particularly paranoid) _outgoing_ traffic is blocked 
on non-standard ports.
E.g. from within HP I cannot SSH out using a port above 1024 - traffic is blocked.

-- 
Mike R.
Home: http://alpha.mike-r.com/
QOTD: http://alpha.mike-r.com/php/qotd.php
No Micro$oft products were used in the URLs above, or in preparing this message.
Recommended reading: http://www.catb.org/~esr/faqs/smart-questions.html#before




More information about the Info-vax mailing list