SSH Security

Ankush Grover ankush174 at gmail.com
Wed Dec 7 05:11:30 UTC 2005


On 12/7/05, Ben Halicki <ben.halicki at macquarietextiles.com.au> wrote:
>
> Hi all,
>
> I'm planning on configuring SSH for remote administration and was just
> wondering if anyone has a few tips on securing it.  How secure is it to
> have
> an SSH port open and accessible via the Internet?  I'll be using key-based
> authentication only and disabling password authentication.
>
> Any pointers would be greatly appreciated.
>
> Thanks,
>
> Ben Halicki


hey,

Do these things

Disable Root access
Disable Password Authentication
Disable Protocol 1

Allow these
Allow Users or Allow Groups

Modify
Port No 22 to some other port



For example

 Port 36655
 Protocol 2
PermitRootLogin no
AllowUsers john
MaxAuthTries 2

Well there are few other things which you can do with ssh as per your
requirment.

Regards

Ankush Grover


--
> fedora-list mailing list
> fedora-list at redhat.com
> To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://listman.redhat.com/archives/fedora-list/attachments/20051207/ad81f17a/attachment-0001.htm>


More information about the fedora-list mailing list