No, PLesk will not fail. Changing the SSH port is a great security measure.
But check before hand that the port is open in the firewall, and if you use fail2ban, you'd want to adjust the port there too.
Instructions are at the Plesk Helpcenter
Cheers,
Tom
Hi garcue,
Could you please clarify why you prefer change ssh port instead of using strong passwords and block brute-force bots with fail2ban?
Any computer security book you can find recommends such practices. Yes, I have applied it on my servers.That's "security through obscurity"
Who decided that's "good security practice"? You did?
A part of security is also intrusion detection, or maybe one day you have a break-in and need to evaluate the source, entry vector, damage and more it caused.If you really have proper security in place, the "security through obscurity" part doesn't really increase any security and just becomes a nuisance.
The funny part is that I don't have "gigs of logfiles" and am not getting bombarded because I took the time to put some real security in place.A part of security is also intrusion detection, or maybe one day you have a break-in and need to evaluate the source, entry vector, damage and more it caused.
Good luck browsing through gigs of logfiles, full of nonrelevant entries and false positivies, cause you are using well known ports that get bombarded by casual bots and script kiddies.
Maybe you should buy other books...
Read this first:
Security through obscurity - Wikipedia
One sentence is pivotal:
"recommends the usage of security through obscurity as a complementary part of a resilient and secure computing environment"
The problem is that it is rarely used as a "complementary part", but rather "instead of".
You can never stop with improving your security. It always ends in risk management.
Having "security through obscurity" in place always means that there is less effort done getting open security implemented. That's human behaviour.
If you really have proper security in place, the "security through obscurity" part doesn't really increase any security and just becomes a nuisance.
Beginning with "you, not knowing how to implement it"
Furthermore you don't need to change anything in your SSHD config. You can do this in iptables.
No program will be aware of that, neither does Plesk.
congratulations!!I don't have this from Wikipedia. Just looked it up for you as an easy referral.
I knew this long before Wikipedia existed.
Yeah sure, you know better how to do things, but assuming the most common case, we simply have a server that currently has port 22 open from everywhere, and maybe/possibly fail2ban active.The funny part is that I don't have "gigs of logfiles" and am not getting bombarded because I took the time to put some real security in place.
Something you don't feel the need of doing because you resorted to "security through obscurity" as an easy way out.
iptables -t nat -A PREROUTING -p tcp --dport 10022 -j REDIRECT --to-ports 22Why don't you tell the OP how to change the SSH-port without changing anything in sshd.conf