SSH can also be configured with SPA (Single Packet Authentication) which
makes it behave in a "stealthy" (I hate that term) fashion.

As for the argument, the only real weakness with SSH is that is configured
to use passwords by default which lends itself to brute force attacks.
 This is mitigated by disabling passwords and using ssh keys (which means
that the security of the private key is point of failure).  When using SSH
keys you have a public and private keys.  A lot of the VPNs that I have
seen use PSK (pre-shared keys) which are less secure and harder to manage.

In addition to the above you could also use fail2ban to monitor repeated
failures and/or use iptables to rate limit the number of connections.
 Essentially SSH is only less secure when it is configured to be less
secure.

It is very important that you know what VPN technology is being discussed.
 VPN is a pretty generic term with many implementations, the majority of
which are insecure.  Basically if your discussion partners are not
specifically talking about IPSec or SSL (OpenVPN is an SSL style VPN) then
they are full crap.  SSH simply smokes older VPN technologies like PPTP and
L2TP (recent successful attacks have rendered PPTP and L2TP as pretty much
useless these days).  It should also be noted that proprietary SSL VPNs may
or may not be secure, it depends entirely on the implementation.

One final note, rarely the choice is between SSH and a VPN.  They are
different technologies that solve different problems.  SSH is a very robust
and flexible tool so that it can often be made to do tasks that could also
be accomplished by a dedicated VPN.  The choice ultimately depends on the
context of the problem being solved.

At work we are moving to a custom built SSH solution due to
the fragility of IPSec (routers and NAT devices do not always have IPSec
passthrough enabled).

On Fri, Oct 5, 2012 at 4:35 PM, Anand Singh <[email protected]> wrote:

> My preference is to use OpenVPN because you're not exposing the remote
> network directly since the tunnel is created on a virtual subnet that does
> not exist on either the local or remote network.  Another benefit is that
> you can control which parts of the remote network you want to expose.  For
> example, If the remote LAN is configured on 10.0.0.0/22 and you want to
> permit access to a file server or printers on 10.0.3.1/24, you can do
> that without exposing servers on a different part of the subnet, which is
> especially effective with VLANs.  Revoking certificates from the OpenVPN
> server is also easier to manage than revoking SSH certificates (you are
> using cert auth, right?).  OpenVPN also gives you control over whether you
> want to allow local DNS, or to force all traffic including DNS through the
> tunnel.  OpenSSH will respond if someone guesses the listening port, unlike
> OpenVPN which can be configured for stealthy operation even if you leave it
> on the default port.
>
> Anand.
>
> On Fri, Oct 5, 2012 at 3:56 PM, caziz <[email protected]> wrote:
>
>> Hi All,
>>
>>   I've been part of a debate where admins asserted that vpn is more secure
>> than ssh. I don't get it and haven't found any good refs from my Google
>> searches.
>>
>>  Opinions?  (Knowledgeable ones preferred).
>>
>> Thanks,
>> Chris
>>
>>
>> _______________________________________________
>> clug-talk mailing list
>> [email protected]
>> http://clug.ca/mailman/listinfo/clug-talk_clug.ca
>> Mailing List Guidelines (http://clug.ca/ml_guidelines.php)
>> **Please remove these lines when replying
>>
>
>
> _______________________________________________
> clug-talk mailing list
> [email protected]
> http://clug.ca/mailman/listinfo/clug-talk_clug.ca
> Mailing List Guidelines (http://clug.ca/ml_guidelines.php)
> **Please remove these lines when replying
>
_______________________________________________
clug-talk mailing list
[email protected]
http://clug.ca/mailman/listinfo/clug-talk_clug.ca
Mailing List Guidelines (http://clug.ca/ml_guidelines.php)
**Please remove these lines when replying

Reply via email to