Jason Cooper wrote:

Bad move. Exposing a single port to the internet is more than enough. I

also only expose a few ports (including ssh) to the net.  My logs are
full of knucklehead script kiddies trying to get in through ssh.  At a
minimum, disallow root login, and listen on a port other than 22.  (At
least on the net-facing side).  Also, set AllowUsers to just yourself.

btw - all those log entries were when I was listening on port 22...


I understand your concerns - I had _exactly_ those concerns too - and yes - I can see script kiddy evidence in my logs too.

I've disabled remote root login - and in fact only one user can authenticate via SSH - and that user can't do so using only a password. I can't easily move to a non-standard port though (as I want to access it from sites which only allow outbound connections to port 22 (don't ask me why!)) and in any case - I know I get port-scanned and security through an obscure port number is likely to be as effective as a chocolate tea-pot. I suppose I could constrain the IP addresses of hosts which can connect... but I'm not entirely sure that the trade-off between usefulness to me and improved security makes that worthwhile...

I realise I run the risk of being compromised if another exploit is found in SSH - but my fingers are firmly crossed there... I'm trusting for now that I can keep my keys safe and that there isn't a SSH back-door... Time will tell I suppose.

I understand that I need a stringent firewall in order to make sure my wireless connection can only effect connection to the SSH service.


-- gentoo-user@gentoo.org mailing list



Reply via email to