Comment on Alternative to ClamAV?
peter@feddit.uk 1 year agoIt’s not any more difficult to get a virus on Linux than Windows. It comes down to experience as you said. I’ve been using Windows for my entire life and haven’t gotten a virus since I was 8. But all it takes is one mistake on both Windows and Linux, you accidentally leave a docker endpoint or ssh server exposed and insufficiently protected on Linux and you’re going to get a virus the same as if you accidentally opened a .pdf.exe on Windows.
Zeth0s@lemmy.world 1 year ago
Not at all. You leave a ssh port open, you don’t get a virus. Try it. Set up a raspberry pi, install ssh and leave the port open in your firewall. It is much less risky than exposing rdp (the most comparable windows protocol) on windows for instance.
It is a security risk, but absolutely not comparable of installing pdf.exe.
As said, try it now and tell me how it goes.
peter@feddit.uk 1 year ago
Glad you asked, I run a ssh honeypot and get multiple connections adding ssh keys, trying to run lockr, downloading shit every day.
Zeth0s@lemmy.world 1 year ago
Does the attack succeed? Never happened to me. You see bot trying, but really never seen succeeding irl. How is it configured?
XTL@sopuli.xyz 1 year ago
Also, antivirus is the wrong idea there. What you’d want is an intrusion detection and/or integrity checking system.
peter@feddit.uk 1 year ago
It’s configured to allow requests from connections using common default passwords. If it wasn’t a honeypot the requests would succeed. I don’t currently run an rdp honeypot but I did a few years back, iirc the rates were about the same with rdp being a little bit less. Which as I say, comes down to configuration and usage. If you misconfigure Linux you will get malware, same as Windows.
uranibaba@lemmy.world 1 year ago
Running a honey pot for SSH and sharing logs only proves that people try to attack you, it does not really tell if SSH as such is vulnerable or not. It is a honey pot, people gaining access if the whole point.
Having a locked down but exposed SSH access is something else.
peter@feddit.uk 1 year ago
You’re missing my point, a virus doesn’t have to infiltrate a completely secure system. It can come through you accidentally leaving your ssh insecure or any other service.