Vamsee Kanakala <vkanak...@...> writes:
> Try it - run a fairly popular website, it's own mail server and 
> look at the logs - you'll be greeted with constant barrage of login 
> attempts on common ports. Remapping ports is only the *first step* in 
> securing a server. Unless you like keeping your mail/ssh daemons 
> needlessly busy with bogus login attempts.

moving the service to other non-standard ports amounts to security by 
obscurity. there are several ways to limit those script attacks - more like 
security by design. for example, one could do rate limiting of incoming 
connections using iptables. to rate limit ssh connections to 3 per minute from 
any single ip address, one would do something like

iptables -I INPUT -p tcp --dport 22 -m state --state NEW -m recent --set
iptables -I INPUT -p tcp --dport 22 -m state --state NEW -m recent \
        --update --seconds 60 --hitcount 2 -j DROP

to deal with more severe / persistent attacks, one can use a package like 
fail2ban which affords more flexibility.

sriram

_______________________________________________
To unsubscribe, email [email protected] with 
"unsubscribe <password> <address>"
in the subject or body of the message.  
http://www.ae.iitm.ac.in/mailman/listinfo/ilugc

Reply via email to