[CentOS] One approach to dealing with SSH brute force attacks.
Patrick
flymooney at gmail.comWed Jan 30 19:59:31 UTC 2008
- Previous message: [CentOS] One approach to dealing with SSH brute force attacks.
- Next message: [CentOS] One approach to dealing with SSH brute force attacks.
- Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
Brian Mathis wrote: > @James: > As for the "security through obscurity" post, you are missing the > point. Changing the port number that SSH runs on is not "security > through obscurity". Moving an already highly secure service to a > different port so scanners don't hit it automatically is a different > thing. This type of move is purely to reduce the amount of garbage in > one's log file due to automated scans. However, I do agree that there > are probably better ways to handle the situation, such as using rate > limiting. Not to mention that if there is a lot less "garbage", it is much easier to catch something trying to sneak in. So it does have an element of security to it. Patrick
- Previous message: [CentOS] One approach to dealing with SSH brute force attacks.
- Next message: [CentOS] One approach to dealing with SSH brute force attacks.
- Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
More information about the CentOS mailing list