<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://hackepedia.org/index.php?action=history&amp;feed=atom&amp;title=DefenseInDepth</id>
	<title>DefenseInDepth - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://hackepedia.org/index.php?action=history&amp;feed=atom&amp;title=DefenseInDepth"/>
	<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=DefenseInDepth&amp;action=history"/>
	<updated>2026-05-08T17:28:09Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.45.3</generator>
	<entry>
		<id>https://hackepedia.org/index.php?title=DefenseInDepth&amp;diff=2570&amp;oldid=prev</id>
		<title>Franks: changed ssh case sensitivity</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=DefenseInDepth&amp;diff=2570&amp;oldid=prev"/>
		<updated>2006-02-15T03:57:32Z</updated>

		<summary type="html">&lt;p&gt;changed ssh case sensitivity&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 20:57, 14 February 2006&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot;&gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;A common security practice is known as &amp;quot;defense in depth.&amp;quot;  This comes from a military term of the same name (See [[wikipedia:Defense_in_depth]] for historical details).&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;A common security practice is known as &amp;quot;defense in depth.&amp;quot;  This comes from a military term of the same name (See [[wikipedia:Defense_in_depth]] for historical details).&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;The basic premise is to avoid a single point of failure when defending your systems and network against attackers.  This typically means that network traffic must be allowed to pass through multiple checks, in multiple locations within your network.  For example, an inbound [[&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;SSH&lt;/del&gt;]] session must pass through many tests before the server process even starts the user authorization mechanism:&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;The basic premise is to avoid a single point of failure when defending your systems and network against attackers.  This typically means that network traffic must be allowed to pass through multiple checks, in multiple locations within your network.  For example, an inbound [[&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Ssh&lt;/ins&gt;]] session must pass through many tests before the server process even starts the user authorization mechanism:&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;# Access control lists on the border [[router]].&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;# Access control lists on the border [[router]].&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;# One or more rules on a network firewall.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;# One or more rules on a network firewall.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Franks</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=DefenseInDepth&amp;diff=1896&amp;oldid=prev</id>
		<title>Hawson: Initial page</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=DefenseInDepth&amp;diff=1896&amp;oldid=prev"/>
		<updated>2005-10-27T00:16:34Z</updated>

		<summary type="html">&lt;p&gt;Initial page&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;A common security practice is known as &amp;quot;defense in depth.&amp;quot;  This comes from a military term of the same name (See [[wikipedia:Defense_in_depth]] for historical details).&lt;br /&gt;
&lt;br /&gt;
The basic premise is to avoid a single point of failure when defending your systems and network against attackers.  This typically means that network traffic must be allowed to pass through multiple checks, in multiple locations within your network.  For example, an inbound [[SSH]] session must pass through many tests before the server process even starts the user authorization mechanism:&lt;br /&gt;
# Access control lists on the border [[router]].&lt;br /&gt;
# One or more rules on a network firewall.&lt;br /&gt;
# In large networks, perhaps additional router and firewall ACLs.&lt;br /&gt;
# A host-based firewall.&lt;br /&gt;
# [[TCP Wrappers]], also running on the destination host.&lt;br /&gt;
# Any additional application-level access controls (such as Allow/Deny rules in [[Apache]]).&lt;br /&gt;
&lt;br /&gt;
Once the network traffic has run this gauntlet of tests, the SSH session is allowed to actually begin, and the user may &amp;#039;&amp;#039;attempt&amp;#039;&amp;#039; to [[authenticate]].&lt;br /&gt;
&lt;br /&gt;
The advantage to using defense in depth is that multiple failures or misconfigurations are required to cause problems.  If, for example, the border router has few, if any, restrictions on traffic flow, the network firewall, or host firewall, or tcpwrappers, or an application restriction can stop non-permitted traffic.&lt;br /&gt;
&lt;br /&gt;
The disadvantage, obviously, is that of complexity.  Since the most common (and safest) policy is to [[DefaultDeny|deny everything not explicitly permitted]], each and every place that can restrict traffic must be correctly configured.  This can be very frustrating during initial configurations.&lt;/div&gt;</summary>
		<author><name>Hawson</name></author>
	</entry>
</feed>