lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
From: dufresne at winternet.com (Ron DuFresne)
Subject: OpenSSH is a good choice?

On Tue, 21 Dec 2004, ALD, Aditya, Aditya Lalit Deshmukh wrote:

> I am going to install OpenSSH in one of my servers, but I want to make
> >sure it is secure.
> >Does anybody know about vulnerabilites on OpenSSH, if yes, would you
> >like to suggest me another remote secure shell ?
>
> There is a strong possibility that open port 22 will start attracting script
> kiddies from the net like a dead animal attracts flies.....
>
> Openssh or any version of ssh does not have any holes in it right now but
> new holes are being discovered all the time. The best bet is to implement
> some thing like port knocking to avoid this sort of direct expoosure to the
> net or atleast run it on a non std port


the non std port advice is not worth much, security through obscurity
kinda thing.  Prot knocking can still discover the protocol on the
far end in many cases, with the proper tools.  Better yet, set limits as
to who can connect to the ssh port, in both /etc/hosts.allow <tcpd> and
your firewall rules.  Makes port knocking much less revealing and much
less a concern where sshd lives...

And while maintaining openssh, remember, you are also maintaining and
monitoring openssl for any issues as well.  So this needs to also be
processed in the monitor/patch maint cycles.

Thanks,

Ron DuFresne
-- 
"Sometimes you get the blues because your baby leaves you. Sometimes you get'em
'cause she comes back." --B.B. King
        ***testing, only testing, and damn good at it too!***

OK, so you're a Ph.D.  Just don't touch anything.



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ