[CentOS] One approach to dealing with SSH brute force attacks.
Patrick
flymooney at gmail.com
Wed Jan 30 19:59:31 UTC 2008
Brian Mathis wrote:
> @James:
> As for the "security through obscurity" post, you are missing the
> point. Changing the port number that SSH runs on is not "security
> through obscurity". Moving an already highly secure service to a
> different port so scanners don't hit it automatically is a different
> thing. This type of move is purely to reduce the amount of garbage in
> one's log file due to automated scans. However, I do agree that there
> are probably better ways to handle the situation, such as using rate
> limiting.
Not to mention that if there is a lot less "garbage", it is much easier
to catch
something trying to sneak in. So it does have an element of security to it.
Patrick
More information about the CentOS
mailing list