Re: Ideas for stopping ssh brute force attacks

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



In article <c077d2020807220540u6ecbaa30tc3409678737dc74e@xxxxxxxxxxxxxx>,
Michael Semcheski <mhsemcheski@xxxxxxxxx> wrote:
> 
> How do you get the keys to the server the first time after they're
> generated?  Its kind of the chicken and an egg problem without the
> password authentication -- that's why I still have passwords turned on
> (but require __very__ strong passwords.)

I start off with password authentication enabled, then scp my authorized_keys
file to the server, check my keys work, and then disable passwords in sshd.

Cheers
Tony
-- 
Tony Mountifield
Work: tony@xxxxxxxxxxxxx - http://www.softins.co.uk
Play: tony@xxxxxxxxxxxxxxx - http://tony.mountifield.org
_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
http://lists.centos.org/mailman/listinfo/centos

[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux