Re: SSH attacks from china

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



Andreas Rogge wrote:
> Am Donnerstag, den 23.07.2009, 19:45 +0100 schrieb Miguel Medalha:
> > I moved the ssh port from the standard 22 to a high port. The attempts 
> > to break into my servers disappeared. The logs are clean now. I would 
> > advise you to do the same. Choose a high (> 1024) unused port and 
> > configure the clients accordingly.
> > 
> *cough*
> A port > 1024 for SSH? Actually that means that if your sshd dies every
> normal user can start to listen on that port with watever they want.
> Of course, there is still the host key. However, AFAICT most normal
> users just ignore host key changes...

I just do a portforward on the firewall to achieve that -> port 12345 on
the fw goes to 22 on the host :)

Cheers,

Ralph

Attachment: pgpgRHAXv8nzA.pgp
Description: PGP signature

_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
http://lists.centos.org/mailman/listinfo/centos

[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux