Re: Securing SSH

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



iptables, disallow root login via ssh, no valid shell for users that
don't need one, strong passwords, keys would be a good start.

Mike


On Tue, Mar 25, 2008 at 11:48 AM, Tim Alberts <talberts@xxxxxxxxxxxxx> wrote:
> So I setup ssh on a server so I could do some work from home and I think
>  the second I opened it every sorry monkey from around the world has been
>  trying every account name imaginable to get into the system.
>
>  What's a good way to deal with this?
>
>  _______________________________________________
>  CentOS mailing list
>  CentOS@xxxxxxxxxx
>  http://lists.centos.org/mailman/listinfo/centos
>
_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
http://lists.centos.org/mailman/listinfo/centos

[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux