Which of these is more likely to be attacked? user@ssh_url.com:22, password or user@ssh_url.com:24, password
Of course that doesn't mean running SSH on a nonstandard port is useless. I do it too, it cuts down on log spam. But mostly just that.
-
-
Sure, if you get lucky you might stop or deter some attackers, but you should always assume that isn't the case.
-
Could you determine the port separately from the password though? If yes, 2^key_size + 2^16 (negligible) If no 2^(key_size +16)
- Show replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.