On Sun, 3 Feb 2008 07:27:12 -0800 Grant <[EMAIL PROTECTED]> wrote: > > > Well thank you for that. I had planned on setting up port > > > knocking for ssh and cups but I guess I'm just as well off > > > leaving them listening on 22 and 631? > > > > Fail2Ban, though a little intensive, seems to be a decent method for > > avoiding unwanted SSH traffic while accepting trusted traffic. I > > have seen one deployment where it seems passably inconspicuous, at > > least. > > > > Alternately, if you run SSH on an unusual port, you're unlikely to > > see much Bot traffic. I would recommend this, if you're concerned, > > above port knocking myself -- relying on a complicated > > "pre-authentication" method rather than / in addition to a remote > > admin tool like SSH seems to be asking for problems. > > Do you mean problems in the form of hassles?
Yeah, hassles and potential misconfiguration, because if anything goes wrong (rookie admin messes up knocking, for instance, on the server/firewall) you can't log in from home and fix it, you have to drive all the way out there to get in from the other side. Port knocking seems like a decent security method to me, especially if it was running on the firewall and opened ports only to the knocking IP -- in that case, it certainly wouldn't be obvious to any other computer that the port had been opened. However, I tend to think it is more trouble than it's worth, and has a tendency to make people think that they can be lazy about security because 'intruders would have to port knock anyway'. I tend to prefer strong firewalls, strong passwords, and, potentially, RSA certs or something to _really_ make sure. > So you're saying ssh > running on an unusual port is good enough? I'm no expert, but from my logs: SSH attempts (from bots in Shanghai and the like) on port 22 number in the thousands, unexpected SSH attempts on the nonstandard ports I run SSH on (actually it's firewall-level port forwarding) have not yet been logged. It's kind of an "obscuring for security" argument, but I think it's a good balance between goofy port knocking setups and just running plain old SSH on 22. Of course, Nothing is a replacement for strong password enforcement, and if the systems are important, I would probably require certificates as well. And again, I stress that I'm no expert. I have been using nonstandard ports and the Bots seem none the wiser, but I can still log in on those ports from any computer without having to aquire and configure port knocking clients. > > > As for printing from lpr to cups across the internet, I should be > > > encrypting that data shouldn't I? Nothing too sensitive but it > > > sounds like a good thing to do. It looks like cups can use ssl > > > but I don't see any mention of it in man lpr. > > > > SSH Tunneling and VPN come to mind too, but I must ask - what good > > is printing a physical document across the net, unless the printer > > is still only a little way away, and if so, what is it doing behind > > a public network? I am curious about this deployment. > > I'd be happy to tell you more but I'm not sure what you mean. "Still > only a little way away"? > Thinking of all the times I printed something, I cant think of many situations when I didn't have to walk over to the printer after printing, grab the printout, and carry it to the intended destination. I can imagine situations where you'd want to print invoices and the like at front offices or even remote storefronts and locations, but wouldn't you want a VPN up between your remote offices anyway? -- [email protected] mailing list

