In SN1030, Steve suggested IP Filtering (blocking all incoming traffic except for whitelisted IPs) as an excellent way to lock down external exposure. This sounds great, but I'm not sure how this would work if the incoming traffic is from a provider that does not provide static IPs. For example, If I want to be able to ssh into a network from another location with rotating IP addresses, the filter would need constant updating.
As an alternative, would using a sequence of port accesses be a robust way to filter access? For example, by default no incoming traffic would be passed through. But if a sequence of attempted port accesses matched "key", then access would be opened for a specified period of time.
Example: "key" port sequence: 22222, 55555, 33333. If an incoming IP address attempted ssh on these ports in this order within 10 seconds, then connections from that IP would be passed through for 10 minutes. Requests to 22222 and 55555 would be logged but not accepted. Otherwise no access. The 10 seconds/10 minutes windows would be specified with the key.
I am not sure how easy this would to implement on a router or linux server, but it seems like it would be as robust as IP filtering and it does not require preset fixed IP whitelists.
If others agree, what would be the simplest way to implement this - ideally on a gateway or gateway adjacent router? And not just for ssh, but for various types of traffic.
As an alternative, would using a sequence of port accesses be a robust way to filter access? For example, by default no incoming traffic would be passed through. But if a sequence of attempted port accesses matched "key", then access would be opened for a specified period of time.
Example: "key" port sequence: 22222, 55555, 33333. If an incoming IP address attempted ssh on these ports in this order within 10 seconds, then connections from that IP would be passed through for 10 minutes. Requests to 22222 and 55555 would be logged but not accepted. Otherwise no access. The 10 seconds/10 minutes windows would be specified with the key.
I am not sure how easy this would to implement on a router or linux server, but it seems like it would be as robust as IP filtering and it does not require preset fixed IP whitelists.
If others agree, what would be the simplest way to implement this - ideally on a gateway or gateway adjacent router? And not just for ssh, but for various types of traffic.
Last edited:
