*urgh* thats why things go terribly wrong. 

Security by obscurity isn't save, wasnt and will never be, if you just dont 
want the LogEntrys, exclude it from your Syslog.

if you want to secure your SSH Service, try following steps:

 - if possible, use a seperate LAN (MGMT) and bind 
    your Service to this LAN only.
    if theres no physical seperated LAN, build a 
    virtual seperated LAN (IPSec, ...)
 - disable the weakest Authentication (Password)
 - enforce your Authentication (RSA Keys) by 
    limiting the usage (man sshd, look for from=)
 - enforce better policy in SSHD config, limit 
    retrys, ... for my understanding it doesnt 
    make sence to lockout root. there are enought 
    exploits to gain root access anyway.
 - if you still want to limit the IP/TCP access to  
    SSH Service, do it on your Router infront of 
    the Machine.

there are no 15 bricks to stumble over  for allowed access, its transparent for 
upgrades, and its even more secure as theres no forgotten dependency.

my 5 cents
Greetz mIke

Reply via email to