i want to remotely ssh to my home server, and I was wondering if I could just forward port 22 with disabling password login and use pubkey authentication will be safe enough?

  • @OujiiB
    link
    fedilink
    English
    17 months ago

    only logs will be real people.

    There are bots that scan for open ports in minutes.

    • @Karyo_TenB
      link
      fedilink
      English
      17 months ago

      But then it’s blatantly obvious and you can behavior block.

      • @dal8mocB
        link
        fedilink
        English
        17 months ago

        Which is easily defeated by using one block of ip addresses to gather data and another block for actually trying to exploit found ports. Unless you block the whole AS. If the attacker only uses one system with one ip they probably wouldn’t have the resources to get past ssh anyway.

        • @Karyo_TenB
          link
          fedilink
          English
          17 months ago

          Behavior blocking can be done across many IPs.

          If you have one IP that scans port 10000, the other port 10001, and thousands of other IPs scanning just 1 port it’s still blatantly obvious.

          And if they want to scan in a less obvious manner they need to do this spaced by days.

    • @pentesticalsB
      link
      fedilink
      English
      17 months ago

      Yes but most bots are scanning for common ports. It’s far too slow to scan 65k ports on every host. Even things like shodan only scan a handful of common ports. But you can test this yourself, expose SSH on a port number in 20-40ks, I’ve seen several weeks without a single probe.

      If you’ve ever done mass scanning you know that’s minutes is not going to to be a full scan and if you are trying to do 65k ports in a few minutes, your results will not be accurate.