Guspaz wrote:
Just set an exceptionally long and randomized SSH password for Lish... Lish might listen on known ports, but it's not running on your machine. That's like complaining that the Linode manager runs on port 80. That and everything SHOULD run on known ports. Putting services on non-standard ports is false security.
While I agree that ssh on a non-standard port isn't really security, it makes it easier to detect attacks (less botnet traffic). But that's hardly the point. I'm not asking for Linode to move to a non-standard port. IP filtering of valid source IP's (where a user can connect from, not over which port) was the only traffic related modification I requested.
Also, I HAVE an exceptionally long and randomized lish password, but that isn't as secure as an SSH key WITH an exceptionally long randomized password.
Basically what you are doing is telling me what the definition of "good enough" should be in my feature request. It might be good enough for you (and I mean that honestly), but if it's possible I would like the ability to lock it down a bit more. Those are my use case wishes, and just because they aren't yours doesn't mean they aren't valid.
EDIT:
Also, not to get off topic, but the Linode Manager running on port 80 is not a problem. The fact that I don't know whether there is any lockout system or how many failed login attempts before it sends them a notice is. It really isn't clear to me how vulnerable the manager is to attacks.
Please keep in mind that I'm a huge fan of my Linode service thus far. I'm not bashing the service, but I think this is something that would make it better.