<div dir="ltr"><div class="gmail_default" style="font-size:small">All,</div><div class="gmail_default" style="font-size:small"><br></div><div class="gmail_default" style="font-size:small">I have a server that I had to open to the world for ssh. It's getting a lot of brute-force hits, although I've managed to bring it down to an "acceptable" level by using a suitable level of paranoia in denyhosts. Obviously I'd rather not have these hits at all.</div>
<div class="gmail_default" style="font-size:small"><br></div><div class="gmail_default" style="font-size:small">I often hear the suggestion made that I should be using a non-standard port for ssh to reduce such attacks. I wonder though what the real value of this would be, since would a portscan not reveal the open port to would-be hackers anyway?</div>
<div><br></div><div><div class="gmail_default" style="font-size:small">I've heard it said that unwanted ssh hits have been reduced to zero by changing the port from 22 to something else. Of course I can test the hypothesis by simply changing the port, but I'd like to hear some opinions on this question before doing so.</div>
<div class="gmail_default" style="font-size:small"><br></div><div class="gmail_default" style="font-size:small">ed</div><br></div>-- <br><div dir="ltr">Edward Holcroft | Madsen Kneppers & Associates Inc.<br>11695 Johns Creek Parkway, Suite 250 | Johns Creek, GA 30097<br>
O (770) 446-9606 | M (770) 630-0949</div>
</div>
<br>
<span style="font-family:arial"><font size="2">MADSEN, KNEPPERS & ASSOCIATES USA, MKA Canada Inc. WARNING/CONFIDENTIALITY NOTICE: This message may be confidential and/or privileged. If you are not the intended recipient, please notify the sender immediately then delete it - you should not copy or use it for any purpose or disclose its content to any other person. Internet communications are not secure. You should scan this message and any attachments for viruses. Any unauthorized use or interception of this e-mail is illegal.</font></span>