Re: SSH attacks from china

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



Am Donnerstag, den 23.07.2009, 19:45 +0100 schrieb Miguel Medalha:
> I moved the ssh port from the standard 22 to a high port. The attempts
> to break into my servers disappeared. The logs are clean now. I would
> advise you to do the same. Choose a high (> 1024) unused port and
> configure the clients accordingly.
>
*cough*
A port > 1024 for SSH? Actually that means that if your sshd dies every
normal user can start to listen on that port with watever they want.
Of course, there is still the host key. However, AFAICT most normal
users just ignore host key changes...

Regards,
Andreas

Hi,

Using a non default port is not the solution, because history has learned 
that security by obscurity never worked.....
for using a high port I agree with Andreas.


We came to the conclusion that for US there are 2 ways to keep SSH access 
"relative" safe:
1: Use Iptables or other firewall in front of server,  to only allow a 
selected group of "trusted" Ip's to access the server trough SSH.
2: Enforce Public / Private key Authentication, so that only the users with 
a valid key can access the server.

And:
3: Deny remote root access, limit who can do su - root

For some people, maybe portnocking is an option. But I don't know how easy / 
difficult that is to circumvent.

If you use SSH only for server managemt, and doing that only from a limited 
amount of pubic IP addresses,  option 1 is the most easy way to go. But if 
you're are an ISP, allowing SSH of SFP access to the host  then, option 1 
impossible to use, and option 2  is probably to  diffucult for your 
clients......

My conclusion was at the time I made the assesment:
If possible, limit Server management to a limited set off public Ip 
adresses, for sentive systems enforce Public privat key authentication
If above is not possible, Enforce Public / Private Key authentication.
Do not allow remote root access.

regards,

John




_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
http://lists.centos.org/mailman/listinfo/centos

[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux