vonskippy wrote:
1, 2, or 20 IP's it's still the SAME box.
Don't waste public IP's on something as useless as "security thru obscurity".
While I do agree that by itself, splitting services like this is a "security thru obscurity" argument, it does have a certain merit if used as described above.
Assume my box has 2 IPs. I setup my web server on one IP, setup DNS to point all my domains at that IP. Then, I limit my ssh server to only listen on the other IP. The SSH server is still locked down to only allow key-based auth, not allow root login, etc etc.
With a setup like that, you are just as vulnerable to the random IP sweeping, but your vulnerability to those sweeps, since your ssh is key only, and you keep your web server up to date, is pretty close to zero.
The benefit to splitting the services is that Mr. Angry Hacker, having been offended by your inflammatory blog posts, has almost zero chance at discovering your second IP, cutting in half the number of services he can attempt to exploit as a method of harming your box.