Hacker Newsnew | past | comments | ask | show | jobs | submit | schlonger0009's commentslogin

Why used? what are you using now?


I agree!

Also, it's "Slow is smooth and smooth is fast".




Does it matter, though? You can easily scan out the correct SSH port.


Depends on how well programed the bot is I guess. Personaly I use the encrypted packet port knocking package fwknop on my home server to hide the ssh port until I need it.


Scanning all 65k ports takes time. Those aren't targeted attacks, just bots connecting to every 22 ports they can find


You can setup a VPN (or head/tailscale) and confine your "real" sshd there, and leave one of these tarpits in the open for fun and profit.


The point of this isn't to hide your actual SSH service, but to tie up resources for those who are somewhat blindly scanning/connecting to any open SSH port.


Scanning all 65k ports takes time. Those aren't targeted attacks, just bots connecting to every 22 ports they can find


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: