Re: MAC addresses

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Sat, 2004-09-11 at 20:54, Jason Opperisano wrote:
>
> On Sat, 2004-09-11 at 20:26, Darren Kirby wrote:
> > I will look into this. I assume however that I would need to keep port 23 open 
> > for everyone on the public side for this to work. I was hoping to drop the 
> > packets from everyone except my notebook, hence the original question. Is 
> > there no way to do this?
> 
> if you're looking for a secure way to manage your firewall from the
> internet without allowing "-s 0/0 --dport 22" type access; you probably
> want to setup some sort of VPN access for yourself.

A VPN is probably overkill as SSH is already a VPN (strong built in
authentication and encryption. Heck, I'll take Blowfish over 3DES or AES
for privacy any day of the week :). Two other options come to mind:

1) Bind SSH to a non-standard port
Yes someone doing a full port scan can still find it, blah, blah, blah.
I've been running this for years and have yet to receive a single
non-authorized connect to the port that has actually performed an SSH
handshake.

2) Setup port knocking
http://www.linuxjournal.com/article.php?sid=6811
I know a few people that have set this up with great success. Sure its
vulnerable to replay, but since we're talking SSH that's not really a
problem. Great way to expose ports to only certain users.

So with either option you still want to use public/private keys or
strong passwords with SSH. They are designed to simply mask the service
from all the SSH scanning that's running around the Internet.

HTH,
Chris




[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux