Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

If there's ever a TCP-based attack against the server, the non-standard port reduces the risk a little bit.


The risk reduction is negligible if someone is doing a portscan on your host. Connection attempts to non standard ports will eventually occur. The better solution is to use single packet authorization.[1]

1. http://cipherdyne.org/fwknop/


Yeah. It depends on how persistent they are. Using DROP on all closed ports may discourage some attackers. Others may remain undeterred.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: