On Fri, Feb 21, 2020 at 07:00:51 -0500,
Bob Goodwin <bobgoodwin@xxxxxxxxxxx> wrote:
I've been reading the thread about detecting hack attempts and I am
interested in in setting up "key based authentication" as described
[perhaps] in "https://docs.fedoraproject.org/en-US/Fedora/14/html/Deployment_Guide/s2-ssh-configuration-keypairs.html"
Suggestions, thoughts?
I like to require both a key and a password. (Key first to prevent password
guessing without access to a valid key.) I use a seperate key for each
device. It's not quite 2 factor, since the keys can be copied from a
compromised device. But it still provides protection in some cases where
just using a password could fail.
_______________________________________________
users mailing list -- users@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to users-leave@xxxxxxxxxxxxxxxxxxxxxxx
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/users@xxxxxxxxxxxxxxxxxxxxxxx