[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <Pine.GSO.4.43.0412211348210.24574-100000@tundra.winternet.com>
From: dufresne at winternet.com (Ron DuFresne)
Subject: OpenSSH is a good choice?
On Tue, 21 Dec 2004, ALD, Aditya, Aditya Lalit Deshmukh wrote:
> I am going to install OpenSSH in one of my servers, but I want to make
> >sure it is secure.
> >Does anybody know about vulnerabilites on OpenSSH, if yes, would you
> >like to suggest me another remote secure shell ?
>
> There is a strong possibility that open port 22 will start attracting script
> kiddies from the net like a dead animal attracts flies.....
>
> Openssh or any version of ssh does not have any holes in it right now but
> new holes are being discovered all the time. The best bet is to implement
> some thing like port knocking to avoid this sort of direct expoosure to the
> net or atleast run it on a non std port
the non std port advice is not worth much, security through obscurity
kinda thing. Prot knocking can still discover the protocol on the
far end in many cases, with the proper tools. Better yet, set limits as
to who can connect to the ssh port, in both /etc/hosts.allow <tcpd> and
your firewall rules. Makes port knocking much less revealing and much
less a concern where sshd lives...
And while maintaining openssh, remember, you are also maintaining and
monitoring openssl for any issues as well. So this needs to also be
processed in the monitor/patch maint cycles.
Thanks,
Ron DuFresne
--
"Sometimes you get the blues because your baby leaves you. Sometimes you get'em
'cause she comes back." --B.B. King
***testing, only testing, and damn good at it too!***
OK, so you're a Ph.D. Just don't touch anything.
Powered by blists - more mailing lists