[Gllug] ssh brute force attacks

Bruce Richardson itsbruce at workshy.org
Tue Dec 9 09:42:19 UTC 2008


On Tue, Dec 09, 2008 at 08:54:04AM +0000, Hari wrote:
> > Not necessarily.  One way to implement port knocking is to have an
> > invisible firewalling bridge between your endpoint and the outside
> > world.  This can inspect incoming connection attempts and alter firewall
> > rules accordingly if it sees the right pattern.  No need for any extra
> > open ports.
> >   
> Technically true, but I wouldn't run the extra box just for that... I 
> actually like conserving energy now I've gotten in to it...

Don't run it just for that: run it for the fact that the firewall box is
extremely difficult to detect or tamper with.


-- 
Bruce

I unfortunately do not know how to turn cheese into gold.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 204 bytes
Desc: Digital signature
URL: <http://mailman.lug.org.uk/pipermail/gllug/attachments/20081209/a3b75f90/attachment.pgp>
-------------- next part --------------
-- 
Gllug mailing list  -  Gllug at gllug.org.uk
http://lists.gllug.org.uk/mailman/listinfo/gllug


More information about the GLLUG mailing list