On 15.02.23 17:43, Jan Just Keijser wrote:
On 15/02/2023 14:12, Stefanie Leisestreichler wrote:
On 15.02.23 13:54, Jan Just Keijser wrote:
sure, I use them , I even manage a few that offer such access to
students and employees.
Do I trust that host? no, it is monitored very intensively and it's
purely a "jumphost" with chroot sandboxes for the people logging in.
Which leads to the question: Do you focus with same caution to an
exposed openvpn service or is this more specific for those sshd?
this is actually starting to sound like we're doing your homework ....
Let's stop here. Do not waste your time with me any more. I do not need
YOU to do my homework. I know you are a valuable person of this
community maybe you just had a bad day.
Like Marc Schaefer wrote, for OpenVPN it is a bit different, as you can
run it over UDP which makes it a little easier to hide.
Having port 22 open on the internet is asking for bots & script kiddies
to try and break in, but usually fail2ban takes care of it quite nicely.
However, sometimes it is necessary to open up this port as I've seen
sites which allow outbound access on tcp port 22 only, not on a random
port like 22222 - plus, when offering public access for students you
have to document and list it on a public webpage, so having a public
wiki/web page stating "we run ssh on tcp port 2222 to confuse script
kiddies" is not a very good way to hide your ssh service.
JJK
_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users