[Info-vax] VSI OpenVMS Hobbyist Program Announced.

Steven Schweda sms.antinode at gmail.com
Fri Jul 5 00:54:54 EDT 2019


> Moving otherwise secure traffic (we are talking SSH here)
> to a non-standard port is hardly "security by obscurity".
> [...]

   It's not?  Some malefactor can attempt brute-force
credential guessing about as easily over a secure channel as
over an unencrypted channel.  The fact remains that a little
obscurity (using a non-standard port) seems to evade a big
majority of such (low-tech) attacks.

> [...] That would be more like moving telnet traffic to a
> non-standard port.

   I do that, too.  With similar results (four apparent port
scans in 2018, two (so far) in 2019).  Telnet probes were
always rare compared to SSH, however.

   Intentionally public servers (FTP, HTTP[S]) on standard
ports continue to get regular attention from apparent
malware: many ".php" things on the web server; many
domain-name related user-name/password guesses on FTP.




More information about the Info-vax mailing list