sniffer/promisc detector

Michael.Dillon at radianz.com Michael.Dillon at radianz.com
Fri Jan 23 11:05:19 UTC 2004


>Mine too. So nmap sucks if you want to quickly identify daemons running 
on
>strange ports. No big deal. This discussion wasn't about nmap to start 
with.
>The point of the discussion was wether it made sense to run services on
>non-standard ports to deter cr4x0rs. And I feel it doesn't.

Actually, the point of the discussion was whether security 
through obscurity (A.K.A. camouflage techniques) is a legitimate
tool in the security arsenal.

>As long as a sshd yells "SSH-1.99" at you the moment you connect to it's
>port there's no hiding sshd.

Like I said, ... camouflage ...
It doesn't stop with port numbers. And if you do camouflage the real
SSH and run a honeypot on port 22 that looks like SSH, where do you
think the haxors will put their attention first? 

>A well-tuned iptables or equivalent, on the other hand, might hide the
>presence of daemons completely for anyone except the designated users. 
How
>is that for obscurity? 

Great idea. The whole point of camouflage and obscurity techniques
is to confuse observers/attackers and this fits the bill. 

I agree that security through obscurity should always be backed up
with real hardening where possible, but I also believe that multiple
techniques working in synergy is best.

--Michael Dillon





More information about the NANOG mailing list