[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: is it rational to close the 139 port



On Sun, 29 Jul 2012, Brian wrote:
> used. But if it can be demonstrated that a twenty character password can
> be forced in a time-frame which makes sense I'll stop doing it and most

That depends.  Are you using any dictionary words or easy character
permutations thereof to make a pass-phrase?  If so, your 20-char password is
a lot weaker than what one might expect at first glance.

> And this is without enlisting any further help from rate-limiting with
> iptables, denyhosts, port knocking etc, all of which reduce worry but do
> not increase security.

Hmm, they do increase security against on-line brute-force attacks, although
it is a marginal increase.  And they're not part of the default, therefore
uninteresting: you can already tighten ssh up properly if you're not going
to go with the defaults.

> not because there are brute-force attempts on the account being made. If
> keys or a strong password are employed the root account is no more
> susceptible to be broken into than any other account.

Too many "ifs" when dealing with a default configuration.  As far as I'm
concerned, Debian should ship with root logins disabled, denying logins to
anyone not in the users group, x11 and agent forwarding disabled, and only
RSA-based and GSSAPI/kerberos auth enabled.

But this IS a very beaten old horse, and I am not going to bother with it.

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh


Reply to: