zentara has asked for the wisdom of the Perl Monks concerning the following question:
The article states
"The "standard" method of running the SSH server on port 22 is notoriously inadequate. OpenSSH, which is the SSH server on the majority of Linux installations, suffers from regular exploits of buffer overflow and other vulnerabilities, and you neither have the time to keep up with the patches nor want to make the effort -- you'd rather put up with not being able to access your files."
So I like using Net::EasyTCP which has a port password , and encrypted transfers, and I'm wondering how safe these type of perl scripts are? I know one of Perl's claims is "immunity from buffer-overflow-exploits", but are perl scripts really that safe from this type of attack?
I realize you can't stop a "denial of service" attack against the port, and the perl script could be written is a poor manner, which allows hackers to grab a shell. But other than that, is Perl more secure than SSH, while it's just sitting on a port listening?
|
|---|
| Replies are listed 'Best First'. | |
|---|---|
|
Re: Perl and TCP port security
by hardburn (Abbot) on Aug 11, 2004 at 13:03 UTC | |
|
Re: Perl and TCP port security
by Fletch (Bishop) on Aug 11, 2004 at 12:54 UTC | |
|
Re: Perl and TCP port security
by dave_the_m (Monsignor) on Aug 11, 2004 at 12:56 UTC | |
by beable (Friar) on Aug 11, 2004 at 23:10 UTC | |
by graff (Chancellor) on Aug 12, 2004 at 02:11 UTC | |
|
Re: Perl and TCP port security
by sgifford (Prior) on Aug 11, 2004 at 19:37 UTC |