SSH Security
Ankush Grover
ankush174 at gmail.com
Wed Dec 7 05:11:30 UTC 2005
On 12/7/05, Ben Halicki <ben.halicki at macquarietextiles.com.au> wrote:
>
> Hi all,
>
> I'm planning on configuring SSH for remote administration and was just
> wondering if anyone has a few tips on securing it. How secure is it to
> have
> an SSH port open and accessible via the Internet? I'll be using key-based
> authentication only and disabling password authentication.
>
> Any pointers would be greatly appreciated.
>
> Thanks,
>
> Ben Halicki
hey,
Do these things
Disable Root access
Disable Password Authentication
Disable Protocol 1
Allow these
Allow Users or Allow Groups
Modify
Port No 22 to some other port
For example
Port 36655
Protocol 2
PermitRootLogin no
AllowUsers john
MaxAuthTries 2
Well there are few other things which you can do with ssh as per your
requirment.
Regards
Ankush Grover
--
> fedora-list mailing list
> fedora-list at redhat.com
> To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://listman.redhat.com/archives/fedora-list/attachments/20051207/ad81f17a/attachment-0001.htm>
More information about the fedora-list
mailing list