I think if you use double authentication (both keys and a password) and put
your SSH server on a different port then you are doing the best you can. You
hope to prevent a 0-day but you cannot fully protect yourself...


James

On Fri, Jul 10, 2009 at 7:06 PM, Rob Townley <rob.town...@gmail.com> wrote:

> On Fri, Jul 10, 2009 at 9:33 AM, Peter Kjellstrom<c...@nsc.liu.se> wrote:
> > On Friday 10 July 2009, Rob Kampen wrote:
> >> Coert Waagmeester wrote:
> > ...
> >> > it only allows one NEW connection to ssh per minute.
> >> >
> >> > That is also a good protection right?
> > ...
> >> Not really protection - rather a deterrent - it just makes it slower for
> >> the script kiddies that try brute force attacks
> >
> > Basically it's not so much about protection in the end as it is about
> keeping
> > your secure-log readable. Or maybe also a sense of being secure...
> >
> > It's always good to limit your exposure but you really have to weigh cost
> > against the win. Two examples:
> >
> > Limit from which hosts you can login to a server:
> >  Configuration cost: trivial setup (one iptables line)
> >  Additional cost: between no impact and some impact depending on your
> habits
> >  Positive effect: 99.9+% of all scans and login attempts are now gone
> >  Verdict: Clear win as long as the set of servers are easily identifiable
> >
> > Elaborate knocking/blocking setup:
> >  Configuration cost: significant (include keeping it up-to-date)
> >  Additional cost: setup of clients for knocking, use of -p XXX for new
> port
> >  Positive effect: "standard scans" will probably miss but not air tight
> >  Verdict: Harder to judge, I think it's often not worth it
> >
> > Other things worth looking into are, for example, access.conf
> (pam_access.so)
> > and ensuring that non-trivial passwords are used.
> >
> > my €0.02,
> >  Peter
> >
> > _______________________________________________
> > CentOS mailing list
> > CentOS@centos.org
> > http://lists.centos.org/mailman/listinfo/centos
> >
> >
>
> Virtual Networks are such as tinc-vpn.org or hamachi create an
> encrypted network only accessible to members of the virtual network.
> So if your server's virtual nic has an address of 5.4.3.2, then the
> only other host that may see your server would be your laptop with
> address 5.4.3.3.  No other internet hosts would even see 5.4.3.2...
> It is like IPSec, but much easier.
> _______________________________________________
> CentOS mailing list
> CentOS@centos.org
> http://lists.centos.org/mailman/listinfo/centos
>



-- 
http://www.goldwatches.com
_______________________________________________
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos

Reply via email to