Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

That seems like overkill. I just disable password authentication, and use SSH public keys only. It prevents brute force attacks completely.



It's not for security, it's public service and entertainment


This, and move the endpoint on an uninteresting port to lower the noise in the logs


I suppose it may do that, but naïvely switching to an alternate port may lull one into a false sense of security: https://utcc.utoronto.ca/~cks/space/blog/sysadmin/SSHAltPort...

Shodan will find and fingerprint you easily enough.


In theory. I have a server running on a weird port, but with fail2ban just in case. I haven't had even a blip of an attempt on it.


... and avoid automated attacks in case a 0-day in the pre-authentication OpenSSH server code shows up


If there’s a preauth RCE in ssh, I’m sure threat actors will start scanning non default ports once their hornets have hit critical mass.




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: