On Sun, 3 Feb 2008 07:27:12 -0800
Grant <[EMAIL PROTECTED]> wrote:

> > > Well thank you for that.  I had planned on setting up port
> > > knocking for ssh and cups but I guess I'm just as well off
> > > leaving them listening on 22 and 631?
> >
> > Fail2Ban, though a little intensive, seems to be a decent method for
> > avoiding unwanted SSH traffic while accepting trusted traffic.  I
> > have seen one deployment where it seems passably inconspicuous, at
> > least.
> >
> > Alternately, if you run SSH on an unusual port, you're unlikely to
> > see much Bot traffic.  I would recommend this, if you're concerned,
> > above port knocking myself -- relying on a complicated
> > "pre-authentication" method rather than / in addition to a remote
> > admin tool like SSH seems to be asking for problems.
> 
> Do you mean problems in the form of hassles? 

Yeah, hassles and potential misconfiguration, because if anything goes
wrong (rookie admin messes up knocking, for instance, on the
server/firewall) you can't log in from home and fix it, you have to
drive all the way out there to get in from the other side.  

Port knocking seems like a decent security method to me, especially if
it was running on the firewall and opened ports only to the knocking IP
-- in that case, it certainly wouldn't be obvious to any other computer
that the port had been opened.  

However, I tend to think it is more trouble than it's worth, and has a
tendency to make people think that they can be lazy about security
because 'intruders would have to port knock anyway'.  I tend to prefer
strong firewalls, strong passwords, and, potentially, RSA certs or
something to _really_ make sure.  

> So you're saying ssh
> running on an unusual port is good enough?

I'm no expert, but from my logs: SSH attempts (from bots in Shanghai
and the like) on port 22 number in the thousands, unexpected SSH
attempts on the nonstandard ports I run SSH on (actually it's
firewall-level port forwarding) have not yet been logged.  

It's kind of an "obscuring for security" argument, but I think it's a
good balance between goofy port knocking setups and just running plain
old SSH on 22.  

Of course, Nothing is a replacement for strong password enforcement,
and if the systems are important, I would probably require certificates
as well.  

And again, I stress that I'm no expert.  I have been using nonstandard
ports and the Bots seem none the wiser, but I can still log in on those
ports from any computer without having to aquire and configure port
knocking clients.  

> > > As for printing from lpr to cups across the internet, I should be
> > > encrypting that data shouldn't I?  Nothing too sensitive but it
> > > sounds like a good thing to do.  It looks like cups can use ssl
> > > but I don't see any mention of it in man lpr.
> >
> > SSH Tunneling and VPN come to mind too, but I must ask - what good
> > is printing a physical document across the net, unless the printer
> > is still only a little way away, and if so, what is it doing behind
> > a public network? I am curious about this deployment.
> 
> I'd be happy to tell you more but I'm not sure what you mean.  "Still
> only a little way away"?
> 

Thinking of all the times I printed something, I cant think of many
situations when I didn't have to walk over to the printer after
printing, grab the printout, and carry it to the intended destination.  

I can imagine situations where you'd want to print invoices and the
like at front offices or even remote storefronts and locations, but
wouldn't you want a VPN up between your remote offices anyway?  



-- 
[email protected] mailing list

Reply via email to