Hacker News new | past | comments | ask | show | jobs | submit login

Don't do this. It adds almost no extra security and makes it hard for routers that prioritizes port 22 traffic as interactive.



Sure, it'll not stop dedicated manual intrusion attempts, but it will actually prevent a ton of automated bots from even just trying to connect with common passwords through SSH.


Which is irrelevant if you have any one of: strong passwords, no passwords, fail2ban


Which is relevant if you're one to actually look at your login attempt logs.



2222 is a dumb choice as an alternative port, it's both obvious and quite commonly used. I'm using a port on 4XXXX-range that's normally not used for anything and therefore not scanned by the bots unless all the 65536 ports are. The automated login attempts disappeared almost immediately, except for a few that were quickly blocked.

Now the logs are clean from automated login bots, the only thing left are real dedicated hacking attempts that is worth pursuing further.


It's what I do, you can't break in a door that doesn't exist, only those you know exist.


>Sure, it'll not stop dedicated manual intrusion attempts, but it will actually prevent a ton of automated bots

Doesn't take long to port scan a server.


Going back to the classics, is port knocking still a thing? (I've been out of this discussion for a while, serious question)


One of my freelance projects uses port knocking, but they're the only one I've worked with that have used it in recent years.


guess i'm going back to port 22...


I'm convinced too. Back to 22 we go.




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: