| ▲ | linsomniac 10 hours ago | ||||||||||||||||||||||||||||
I get what this post is saying, but I'm going to push back that "security through obscurity" isn't just something that people parrot without understanding. Obscurity provides, effectively, no security. There may be other benefits to the obscurity, but considering the obscurity a layer of your security is bad. I hope we all agree that moving telnet to another port provides no security (it's easily sniffable, easily fingerprintable). If it provides another benefit, use it, but don't think there's any security in it. For ~30 years I've moved my ssh to a non-standard port. It quiets down the logs nicely, people aren't always knocking on the door. But it's not a component of my security: I still disable password auth, disable root login, and only use ssh keys for access. But considering it security is undeniably bad. | |||||||||||||||||||||||||||||
| ▲ | an hour ago | parent | next [-] | ||||||||||||||||||||||||||||
| [deleted] | |||||||||||||||||||||||||||||
| ▲ | Aurornis 9 hours ago | parent | prev | next [-] | ||||||||||||||||||||||||||||
> but I'm going to push back that "security through obscurity" isn't just something that people parrot without understanding. I disagree on this. It's right up there with "premature optimization is the root of all evil" on the list of phrases that get parroted by a certain type of engineer who is more interested in repeating sound bites than understanding the situation. You can even see it throughout this comment section: Half of the top level comments were clearly written by people who didn't even read the first section of the article and are instead arguing with the headline or what they assumed the article says | |||||||||||||||||||||||||||||
| ▲ | elevation 9 hours ago | parent | prev | next [-] | ||||||||||||||||||||||||||||
> But it's not a component of my security You may not see it as “security“, but any entity that is actively monitoring their logs benefits when the false positives decrease. If I am dealing with 800 failed login attempts per minute I cannot possibly investigate all of them. But if failed logins are rare in my environment, I may be able to investigate each one. Obscurity that increases the signal to noise ratio is a force multiplier for active defense. | |||||||||||||||||||||||||||||
| ▲ | vlovich123 9 hours ago | parent | prev | next [-] | ||||||||||||||||||||||||||||
If port numbers were 64bit or 128bit, actually it would provide a meaningful amount of security through obscurity. Port numbers are easy to dunk on because it’s such a trivially small search space. | |||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||
| ▲ | spacemule 9 hours ago | parent | prev | next [-] | ||||||||||||||||||||||||||||
I would argue moving SSH to a non-standard port is security, but it's a different kind. By reducing the noise in logs, it reduces the workload on the human or agent reviewing the logs. So, you can detect an attack in progress or respond to an attack before it gets out of hand. With SSH on a standard port, the harmful malicious logs can blend in with the annoying malicious logs much better. | |||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||
| ▲ | logifail 7 hours ago | parent | prev [-] | ||||||||||||||||||||||||||||
> It quiets down the logs nicely, people aren't always knocking on the door. Q: If you've still done the right things - "disable[d] password auth, disable[d] root login, and only use ssh keys for access" - why do you care about how 'quiet' your logs are? | |||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||