lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <Pine.GSO.4.43.0412211348210.24574-100000@tundra.winternet.com> From: dufresne at winternet.com (Ron DuFresne) Subject: OpenSSH is a good choice? On Tue, 21 Dec 2004, ALD, Aditya, Aditya Lalit Deshmukh wrote: > I am going to install OpenSSH in one of my servers, but I want to make > >sure it is secure. > >Does anybody know about vulnerabilites on OpenSSH, if yes, would you > >like to suggest me another remote secure shell ? > > There is a strong possibility that open port 22 will start attracting script > kiddies from the net like a dead animal attracts flies..... > > Openssh or any version of ssh does not have any holes in it right now but > new holes are being discovered all the time. The best bet is to implement > some thing like port knocking to avoid this sort of direct expoosure to the > net or atleast run it on a non std port the non std port advice is not worth much, security through obscurity kinda thing. Prot knocking can still discover the protocol on the far end in many cases, with the proper tools. Better yet, set limits as to who can connect to the ssh port, in both /etc/hosts.allow <tcpd> and your firewall rules. Makes port knocking much less revealing and much less a concern where sshd lives... And while maintaining openssh, remember, you are also maintaining and monitoring openssl for any issues as well. So this needs to also be processed in the monitor/patch maint cycles. Thanks, Ron DuFresne -- "Sometimes you get the blues because your baby leaves you. Sometimes you get'em 'cause she comes back." --B.B. King ***testing, only testing, and damn good at it too!*** OK, so you're a Ph.D. Just don't touch anything.
Powered by blists - more mailing lists