[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20051008082133.GA15184@stupendous.org>
Date: Sat Oct 8 16:10:21 2005
From: jurjen at stupendous.org (Jurjen Oskam)
Subject: Interesting idea for a covert channel or I
justdidn't research enough?
On Sat, Oct 08, 2005 at 07:20:17AM +0530, Aditya Deshmukh wrote:
> Aren't these all different versions of portknocking ? All of
> them work untill someone outside can figure out the pattern of
> events - at most I would call this security by obscurity -
> Trivial to detect but good enough for some low security
> requirements
The intention of the case you quoted (opening up the SSH port) is to
deter casual portscanners or SSH version scanners. This way, my system
is much less likely to be on a list of hosts running SSH servers.
After the port is opened up, you get a regular, properly configured,
up-to-date SSH daemon.
--
Jurjen Oskam
Powered by blists - more mailing lists