[Info-vax] SSH on VAX - performance impact of break in attempts

Bill Gunshannon billg999 at cs.uofs.edu
Thu Aug 26 20:39:26 EDT 2010


In article <00AA28DB.0416FD2E at sendspamhere.org>,
	VAXman-  @SendSpamHere.ORG writes:
> In article <8dn96lF8lcU2 at mid.individual.net>, billg999 at cs.uofs.edu (Bill Gunshannon) writes:
>>In article <4C75EDE9.5060502 at vsm.com.au>,
>>	Jeremy Begg <jeremy.removethis at vsm.com.au> writes:
>>> Hi Mark,
>>> 
>>> I can recommend from personal experience both of the following solutions:
>>> 
>>> 1.  Change the incoming port to something other than 22.  This almost always 
>>> prevents your system being targetted by the bots.  (I typically add another 
>>> three digits to the port number.)
>>
>>It also prevents legitimate users from getting in if they don't already
>>know what port you are using.  Reminds me of the guy I know locally who
>>was trying to run a webserver from home even though it is prohibited by
>>his AUP with his ISP.  He said he got around it by not using port 80 and
>>moving the port around a lot.  Seemed rather silly to me as no one would
>>ever know where to find his webserver!!
> 
> But 'ssh' and 'sftp' have optional switches for modifying the port.  If there
> is a user that is suppsed to get into your system, then they should know the
> port.

You mean like that customer that I don't even know about yet?

bill
 

-- 
Bill Gunshannon          |  de-moc-ra-cy (di mok' ra see) n.  Three wolves
billg999 at cs.scranton.edu |  and a sheep voting on what's for dinner.
University of Scranton   |
Scranton, Pennsylvania   |         #include <std.disclaimer.h>   



More information about the Info-vax mailing list