[Info-vax] VSI OpenVMS Hobbyist Program Announced.
Steven Schweda
sms.antinode at gmail.com
Fri Jul 5 00:54:54 EDT 2019
> Moving otherwise secure traffic (we are talking SSH here)
> to a non-standard port is hardly "security by obscurity".
> [...]
It's not? Some malefactor can attempt brute-force
credential guessing about as easily over a secure channel as
over an unencrypted channel. The fact remains that a little
obscurity (using a non-standard port) seems to evade a big
majority of such (low-tech) attacks.
> [...] That would be more like moving telnet traffic to a
> non-standard port.
I do that, too. With similar results (four apparent port
scans in 2018, two (so far) in 2019). Telnet probes were
always rare compared to SSH, however.
Intentionally public servers (FTP, HTTP[S]) on standard
ports continue to get regular attention from apparent
malware: many ".php" things on the web server; many
domain-name related user-name/password guesses on FTP.
More information about the Info-vax
mailing list