Secure entry into remote systems

Lai Zit Seng lzs at pobox.com
Wed May 19 13:45:10 UTC 2004


On Wed, 19 May 2004, Scot L. Harris wrote:

> In your place I would setup ssh.  The thing you need to make sure of is
> if you are using password authentication that all your passwords are
> good ones.  I believe you may want to lock down ssh to specific known
> hosts and keys.  Even if you need to administer multiple systems
> remotely use one to ssh to and then ssh from that one to the others.
> Also disable roots use of ssh so no one can go straight in as root.
> Means you will login as a normal user then su to root as needed.

Disable SSH version 1 protocol support too :) This is done in
/etc/ssh/sshd_config by including a line "Protocol 2".

Regards,

.lzs





More information about the fedora-list mailing list