AtomicDog wrote:
mosdl wrote:
Did you change the ssh port to be something random?
I also didn't think it was getting me any extra security because an attacker could just nmap the machine and discover the port anyway. Since I am using public key auth, I think using a non standard port was only providing me a reduction in log reports and I didn't find it worth it.
Technically, you aren't getting any additional security, but security through obscurity can help. I ALWAYS change my SSH port because the problem isn't just those people who are trying to guess passwords that are problems.
What happens if there is a vulnerability that allows an attacker to bypass all authentication? Having SSH on port 22 would probably cause your system to be compromised almost immediately. You wouldn't have that same worry if it was on another port.
Also, it helps you prioritize. If I am running SSH on a different port then I have fewer attacks against SSH. It is those who find SSH on another port that I would worry about more. I would take information obtained from SSH and start blocking them at the firewall immediately. SSH attacks on ports other than 22 rank much higher on my "oh crap" list than standard port 22 attacks. If you don't run SSH on another port you are going to have a lot of noise.
AtomicDog wrote:
I had to configure my PuTTY configurations to all connect to the other port, and the protocol would not be displayed by name in netstat -l, etc...
You can save your connection information in PuTTY. I run SSH on a different port and I don't have to type it in every time. Just once.
Don't rely on the service information in netstat. Doing so can cause you to assume things that aren't true. I might see SSH listening in netstat when I am really running a web server on port 22. If you really want the service names to work, edit the /etc/services file and netstat will show the correct name.