vonskippy wrote:
Because security thru assumed obscurity isn't (hint: they're called port scans).
And some people don't have static IP's or need to access their systems while on the road so a "trusted IP" isn't always available.
Here's the funny thing, though.
If you're being targetted by an attacker then, yes, a port scan will expose the port anyway. BUT if you're just seeing random internet noise then simply changing the port will stop this because your random zombie doesn't port scan before hand (it takes too long, especially if you DROP traffic).
This means that you're not wasting CPU cycles negotiating SSL; you're not wasting disk space on logs, CPU on fail2ban or similar, resources on accepting connections etc etc.
It's a very very small win, but it is a win
