On 12/7/05, Ben Halicki <ben.halicki@xxxxxxxxxxxxxxxxxxxxxxxx> wrote:
hey,
Do these things
Disable Root access
Disable Password Authentication
Disable Protocol 1
Allow these
Allow Users or Allow Groups
Modify
Port No 22 to some other port
For example
Port 36655
Protocol 2
PermitRootLogin no
AllowUsers john
MaxAuthTries 2
Well there are few other things which you can do with ssh as per your requirment.
Regards
Ankush Grover
Hi all,
I'm planning on configuring SSH for remote administration and was just
wondering if anyone has a few tips on securing it. How secure is it to have
an SSH port open and accessible via the Internet? I'll be using key-based
authentication only and disabling password authentication.
Any pointers would be greatly appreciated.
Thanks,
Ben Halicki
hey,
Do these things
Disable Root access
Disable Password Authentication
Disable Protocol 1
Allow these
Allow Users or Allow Groups
Modify
Port No 22 to some other port
For example
Port 36655
Protocol 2
PermitRootLogin no
AllowUsers john
MaxAuthTries 2
Well there are few other things which you can do with ssh as per your requirment.
Regards
Ankush Grover
--
fedora-list mailing list
fedora-list@xxxxxxxxxx
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list