On 2/9/06, Chris <[EMAIL PROTECTED]> wrote:
> On 07/02/06, David Scheidt <[EMAIL PROTECTED]> wrote:
> >
> > On Tue, Feb 07, 2006 at 12:40:22AM +0200, Atis wrote:
> > > On Sun, 5 Feb 2006 18:55:13 -0500
> > > David Scheidt <[EMAIL PROTECTED]> wrote:
> > >
> > > >
> > > > Nonsense.  There may be some people that only scan well-known ports,
> > > > but it's much more common to scan every port on a machine.  If you're
> > > > running a server on a non-standard port, an attacker will find it.
> > > >
> > >
> > > sure, but 99% of the time the machines attacking your server are zombies
> > > that do not care to do a full portscan. i suppose the purpose is to
> > > find other misconfigured, easy-to-hack computers on the network. by
> > > putting your services on non-standard ports you get rid of these
> > > mindless drones and don't pollute log files with useless garbage.
> > >
> > > now if somebody _does_ actually target your server in particular then
> > > this is definitely not the solution.
> > >
> > > anywayz, putting things on non-standard ports helps a lot, and is
> > > one of the first and easiest security measures an administrator
> > > may consider.
> > >
> >
> > Taking your clothes off and painting yourself blue is also one of the
> > first and easiest security measures to consider.  It's even more
> > effective, too.  I know of no machine that's been cracked that had a
> > wheel naked and painted blue.  I've seen lots running standard
> > services on non-standard ports.
> >
> > Security through obscurity doesn't work, it makes tracking down
> > other problems harder, and creates work to maintain non-standard
> > configurations.
>
>
> I understand his point, I see 2 types of problems we have to deal with.  The
> thousands of drones that scan for boxes that are vulnerable to a specific
> exploit, they will often scan ip ranges on a specific port and if its open
> see if its vulnerable.  For these types of intruders chnging ports is very
> effective since you would simply be skipped past on their scan, for most of
> us 99% of attempted intrusions are zombie based or some script a kid has
> downloaded of the web.
>
> The argument against changing ports is of course when you have a persistent
> hacker who wants in, he will of course scan all the ports and find the
> service and this type of protection is nullified.  In this scenario if you
> havent taken additional measures to secure the box then you may be in
> trouble,
>
> I personally move things like sshd of its normal port simply to stop my logs
> been flooded with brute force logins and since I am the only one who uses
> ssh there is no downside to it, I of course dont rely on this alone and keep
> my software up to date amongst other security measures it is simply an extra
> layer of skin on the onion.  For things like httpd I keep on port 80 as I
> think moving the port of that is more hassle then its worth.
I've seen someone mention how to move httpd to a non-reserved port (ie
8080), and let that change be transparent for the end-user by using
ipf. I dont know how, though.
>
> Chris
> _______________________________________________
> freebsd-questions@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-questions
> To unsubscribe, send any mail to "[EMAIL PROTECTED]"
>
_______________________________________________
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Reply via email to