I came across invaluable article on how to make Linux system that runs OpenSSH server to be even more secure. It’s written by 17-year-old (!!!) Peter Upfold from FOSSwire and covers the following simple steps:

  • fosswire logoDisable SSH protocol 1
  • Enable key-based logins
  • Don’t enable password-based logins
  • Don’t run on port 22
  • No remote root logins

I found these tips invaluable and sire that there is no doubt SSH-2 protocol remains the most common and safe method to access remote Linux or Unix system. The article is freely available here.

 

6 Comments

 

  1. January 11, 2008  3:12 am by inaequitas Reply

    You might also be interested in running denyhosts to make sure that even normal accounts don't get bruteforced. And while running on a non-standard port will save you from bots and worms, a dedicated would-be intruder will be fingerprinting all your ports for service banners anyway.

  2. December 27, 2010  12:46 pm by Mark Reply

    There is an online tool that can help you with this:
    http://www.secureopenssh.com/

  3. January 2, 2011  1:17 pm by Training Management Software Reply

    If you soon plan to open the floor to thoughts of the community on directions of eLearning it would be ideal.

  4. January 14, 2011  12:56 pm by wangjiang Reply

    I arrive on here all the time and am floored with the fresh information here.Thanks for making such a killer blog.

  5. January 26, 2011  12:45 pm by Jacquetta Behizadeh Reply

    high quality I am not sure I agree with some of the commenters here though! Wow is all I can say. Thanks again.. a wonderful

Leave a reply

 

Your email address will not be published.