[Info-vax] VSI OpenVMS Hobbyist Program Announced.
    Steven Schweda 
    sms.antinode at gmail.com
       
    Fri Jul  5 00:54:54 EDT 2019
    
    
  
> Moving otherwise secure traffic (we are talking SSH here)
> to a non-standard port is hardly "security by obscurity".
> [...]
   It's not?  Some malefactor can attempt brute-force
credential guessing about as easily over a secure channel as
over an unencrypted channel.  The fact remains that a little
obscurity (using a non-standard port) seems to evade a big
majority of such (low-tech) attacks.
> [...] That would be more like moving telnet traffic to a
> non-standard port.
   I do that, too.  With similar results (four apparent port
scans in 2018, two (so far) in 2019).  Telnet probes were
always rare compared to SSH, however.
   Intentionally public servers (FTP, HTTP[S]) on standard
ports continue to get regular attention from apparent
malware: many ".php" things on the web server; many
domain-name related user-name/password guesses on FTP.
    
    
More information about the Info-vax
mailing list