Comment on Alternative to ClamAV?
Zeth0s@lemmy.world 1 year agoNot at all. You leave a ssh port open, you don’t get a virus. Try it. Set up a raspberry pi, install ssh and leave the port open in your firewall. It is much less risky than exposing rdp (the most comparable windows protocol) on windows for instance.
It is a security risk, but absolutely not comparable of installing pdf.exe.
As said, try it now and tell me how it goes.
peter@feddit.uk 1 year ago
Glad you asked, I run a ssh honeypot and get multiple connections adding ssh keys, trying to run lockr, downloading shit every day.
Zeth0s@lemmy.world 1 year ago
Does the attack succeed? Never happened to me. You see bot trying, but really never seen succeeding irl. How is it configured?
XTL@sopuli.xyz 1 year ago
Also, antivirus is the wrong idea there. What you’d want is an intrusion detection and/or integrity checking system.
Zeth0s@lemmy.world 1 year ago
And disable password authentication as first step
peter@feddit.uk 1 year ago
It’s configured to allow requests from connections using common default passwords. If it wasn’t a honeypot the requests would succeed. I don’t currently run an rdp honeypot but I did a few years back, iirc the rates were about the same with rdp being a little bit less. Which as I say, comes down to configuration and usage. If you misconfigure Linux you will get malware, same as Windows.
Zeth0s@lemmy.world 1 year ago
Ok, than the experiment you are doing is to check how many attacks you can get over time… It is not really representative of a common use case. And again, this is not a virus. It is an successful attack from on a purposely misconfigured internet service. An antivirus is not needed. What is needed is basic configuration
uranibaba@lemmy.world 1 year ago
Running a honey pot for SSH and sharing logs only proves that people try to attack you, it does not really tell if SSH as such is vulnerable or not. It is a honey pot, people gaining access if the whole point.
Having a locked down but exposed SSH access is something else.
peter@feddit.uk 1 year ago
You’re missing my point, a virus doesn’t have to infiltrate a completely secure system. It can come through you accidentally leaving your ssh insecure or any other service.
uranibaba@lemmy.world 1 year ago
I get that a malware can get inside the worlds most secure system, if for example a user lets it in. What I am saying is that showing a honey pot in response to “ssh is more secure than a software that runs code without you giving consent and without your knowledge” not say anything, except what happens if someone gets in.