On Wed, Feb 15, 2023 at 05:43:12PM +0100, Jan Just Keijser wrote:
> Having port 22 open on the internet is asking for bots & script kiddies to
> try and break in, but usually fail2ban takes care of it quite nicely.

Yes, and I you can report to abuseipdb.com -- that's why my main server has
port 22 open (and there are a few measures that make succeeding
authentification unlikely -- the remaining risk is a zero-day on SSH itself).

> and list it on a public webpage, so having a public wiki/web page stating
> "we run ssh on tcp port 2222 to confuse script kiddies" is not a very good
> way to hide your ssh service.

Also, I have one container which has a random port for SSH. It was discovered
by scanners in about one to two weeks. (*)

On a sensitive machine, I use port knocking. Or I hide services behind a
private OpenVPN network, depending. Which is also useful when the ISP no longer
offers port forwarding (CGNAT) for CPE.

(*) I read some litterature that scanning the whole ipv4 space for every
    TCP port takes about a day with a GBit/s or so optimized SYN sender.


_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to