On Sat, Apr 21, 2007 at 07:43:23AM +0300, Nick Demou wrote: > On 4/21/07, Jeff D <[EMAIL PROTECTED]> wrote: > >On Fri, 20 Apr 2007, Nick Demou wrote: > >[...] > >> > >> Any other idea of simple measures that will keep as many attackers > >> away from the one and only service that is listening to the Internet? > >> [...] > > > >I'm not sure if this fits what you are looking for or not: > >http://www.cipherdyne.org/fwknop/ > > > >This does single packed authentication, you send a specially crafted packet > >to the server, through a client app though, and it opens up the firewall > >for you for a specified amount of time and closes it back up after you > >are done. > > Thanks, it's what I was looking for. Allthough it does have the > drawback of requiring a special client to knock the server as you > noted. This, however, is the sideeffect of making the implementation > much more robust and not relying on security by obscurity. To be > honest I prefer the convenience of connecting without a special client > but I allready thought of an easy way to make fwknop ... less secure > (always easier than the oposite :)
Despite being security-through-obscurity, it *is* possible to run https
and ssh on the same port, via a proxy:
http://sourceforge.net/projects/ssh-ssl-proxy/
It is not designed for what you have in mind - but at least casual
scanners could well see an https server instead of SSH...
Disclaimer: yes: i wrote it. This is blatant advertsing. Hope it's usefull
--
Karl E. Jorgensen
[EMAIL PROTECTED] http://www.jorgensen.org.uk/
[EMAIL PROTECTED] http://karl.jorgensen.com
==== Today's fortune:
Just when you thought you were winning the rat race, along comes a faster rat!!
signature.asc
Description: Digital signature

