Morgan Storey <[email protected]> writes:

> I am a big fan of the denyhosts package, it can warn you via email or sms
> gateway and lock IP's out on x number of failed attempts.

I am not sure I care that much about knowing every time a robot gets
banned. ;)  Anyway, I found the distributed nature of denyhosts a much more
valuable service: it allows you to detect, in conjunction with others, hostile
machines *before* they have a chance to abuse your systems.

> There is also port knocking that I have found useful for remote support, but
> it is too difficult for end users I think.

It probably is, and given that there is *zero* security difference[1] between
any of the current "port knocking" and using some other solution that uses
user authentication to open the firewall for other remote access.

So, using something more user-friendly is probably a better strategy if you do
want to open SSH inbound only if someone authenticates somewhere else first.

Regards,
        Daniel

Footnotes: 
[1]  ...or a security difference in favour of the non-"port knocking"
     solutions, since they have better tested, audited and validated code, or
     the scope to do more in terms of security.

-- 
✣ Daniel Pittman            ✉ [email protected]            ☎ +61 401 155 707
               ♽ made with 100 percent post-consumer electrons
   Looking for work?  Love Perl?  In Melbourne, Australia?  We are hiring.
--
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html

Reply via email to