On Wed, 29 Sep 2004 16:08:53 -0500, Jacob S <[EMAIL PROTECTED]> wrote:
> On Wed, 29 Sep 2004 21:55:59 +0200
> Matthijs <[EMAIL PROTECTED]> wrote:
> 
> > In the dutch computer magazine C't, I read an article a few months ago
> > about protecting your computer using a port knocking system. If I
> > remember correctly, you can close a port (your SSH port, for example)
> > and only open it when a pre-defined pattern of access attempts on a
> > pre-defined port (unused for applications) is applied. The SSH port
> > can then be set to open in your firewall, perhaps only for the
> > IP-adress that performed the knocking sequence.
> 
> hmm... You're right, it's not what I'm looking for, but it still sounds
> like a good concept. I'd be interested in learning more about that, if
> not for this use with ssh, I have a couple other applications it could
> work with on servers.

Quick pro-cons: pro: if a remote root exploit for ssh is found, you
aren't vulnerable unless the attacker knows your port-knocking code.
pro-ish: a portscan doesn't show an ssh service running (which you
might like). cons: you need to have software which supports port
knocking to open up the port, which you may not have to hand in say
e.g. a friends house, an internet cafe. con: depending on
implementation, you might be vulnerable to exploits in the
port-knocking daemon (so a tradeoff with the first pro).


-- 
Jon Dowland
[EMAIL PROTECTED]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to