Re: Secure entry into remote systems

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, 19 May 2004, Scot L. Harris wrote:

> In your place I would setup ssh.  The thing you need to make sure of is
> if you are using password authentication that all your passwords are
> good ones.  I believe you may want to lock down ssh to specific known
> hosts and keys.  Even if you need to administer multiple systems
> remotely use one to ssh to and then ssh from that one to the others.
> Also disable roots use of ssh so no one can go straight in as root.
> Means you will login as a normal user then su to root as needed.

Disable SSH version 1 protocol support too :) This is done in
/etc/ssh/sshd_config by including a line "Protocol 2".

Regards,

.lzs



[Index of Archives]     [Current Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [Yosemite Photos]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux