Re: ssh: Permission denied

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Dylan Semler wrote:
...snip...

However, if you use an 8-digit password with capital and lowercase letters, numbers, and symbols, there are 8^( 26*2 + 10*2 + 20 ) = 8^92 = 1.21e83 possible passwords. Since ssh waits about a second after each incorrect password and there have been only 3.32e17 seconds in the history of the universe, it seems scritcly /impossible/ for a password to be guessed. So the risk must not be from password-bots. What is the risk then?
That is not the larger danger. The larger danger is that someone will find and publish an exploit for ssh2 as root That did happen to ssh1, and is why you should never allow ssh1 protocol to the Internet, ESPECIALLY if you allow root logins. ssh1 is still supported (thankfully) for compatibility with older systems. It is not meant to be used otherwise.

In that case if you allow root logins from ssh an exploiter can access your system as root, even without password guessing.

It is always best to avoid those possibilities. Turn off ssh1 and root access via ssh. See my other post in this thread for how to:

Also, right now I set up sudo so it doesn't prompt for passwords, so in effect, any user that logs in can become root. Is this very very bad as well?

Once a person is on your system, its too late. Its only a minor inconvenience for the hacker when you disallow sudo, but I do it anyway.

It is most common for a hacker to install a 'root kit' instead. There are still several that will work. And on older systems ... well he can just pick one. :)

By allowing open sudo, maybe a bud of yours will install a root kit for fun when you though he was playing on your new PS3 in there. :)


[Index of Archives]     [Current Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [Yosemite Photos]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux