Quantcast
Channel: All EdgeRouter posts
Viewing all articles
Browse latest Browse all 60861

Re: OpenVPN site-to-site tunnel - ERLite to ERLite - best vpn throughput settings?

$
0
0

3rdcoastnet wrote:

There are a million ways to skin a cat, and tons of more secure strategies

[..]

I know personally I was being attacked CONSTANTLY on port 22 on a public DMZ server.  Simply changing the port stopped those attacks after a short while.  This isn't "Security by obscurity" (that would be just changing the port and leaving it unsecured, and if thats how we define it, then technically a password is security by obscurity), but rather this is a very simple way to protect against 99% of scanning attacks.

 


I agree, there are lots of strategies. But security by obscurity - this means simply changing ports, no matter if the login itself is secured or not - is the least effective of them all. You might block 99% of scanning attacks, but they are blocked by strong passwords as well because they use standard logins like ubnt/ubnt and I'm pretty sure most of them use the very same dictionary........ Scripts like denyhosts, fail2ban and similar, block failed logins on x attempts by hosts.deny file. Try a dictionary attack with 3 attempts Man Wink

The only real benefit when changing ports is a smaller log file but with denyhosts in place, you get only a fraction of the log entries than without it - a single dictionary attack can produce hundreds of entries, with denyhosts it's max 3 (depends on configuration).

 

Especially when talking to unexperienced users, it is kind of dangerous to recommend a port change because they tend to think "ok, now I changed the port and can leave my easy-to-remember-login admin/admin."

 

The very first action to take when securing a system is to make the login safe, strong password, certificates, white/black lists and stuff like that. The very last action to take is to change the port if you know what you are doing. If a tool you use doesn't support custom ports or the local firewall blocks outgoing custom ports, you're screwed..

 

However, we should continue the discussion about security in a new thread if desired.

 

 

 

Now back to topic: : Did you test only ER <--www--> ER? If so, is it possible to test ER <--LAN--> ER like in this thread? The thing is, if a direct LAN connection grants IPsec speeds above 100 Mbit/s, it's unlikely the ER has a problem itself (like high cpu usage or so). Then it's probably a problem with the internet connection. Maybe there is some packet loss at the provider involved, reducing the throughput. As  mentioned, FTP should basically grant full speed as it is unencrypted and as long as the FTP server can provide enough bandwidth, transfer rates should almost be maxxed out. You could try public iperf servers as well - as long as they are fast enough themselves. See this list: click


Viewing all articles
Browse latest Browse all 60861

Trending Articles