Re: Securing SSH

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



Robert Spangler wrote on Wed, 26 Mar 2008 08:03:48 -0400:

> If you are going to use VPN then why not setup your remote site to use VPN and 
> bypass SSH altogether then?

There could be several reasons, for instance:
1. SSH is all what is necessary
2. it's probably easier to have *one* VPN and then be able to ssh to dozens of 
other machines instead of setting up VPN on all of them and running several VPN 
tunnels at once

> Bottom line is if you want to be secure don't use passwords for login.

Still doesn't stop those brute-force attacks. It just makes them fail. That's the 
point about moving port etc., not the security.

Kai

-- 
Kai Schätzl, Berlin, Germany
Get your web at Conactive Internet Services: http://www.conactive.com



_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
http://lists.centos.org/mailman/listinfo/centos

[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux