Re: securing a remotely hosted machine

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



2010/8/22 Robert Spangler <mlists@xxxxxxxxxxxxxxxx>:
> On Friday 20 August 2010 10:55, Brunner, Brian T. wrote:
>
>> 2: Log-ins through firewall allowed only from approved IPs/MACs
>> regardless of possession of correct password.
>
> One can never guarantee that they will be a at the approved IP/MAC Address
> when issues arise.  For this reason I would use SSH-Keys for access to the
> machine.  I would also move the port to something other then the default port
> and block 22 at the firewall.  After that I would run something like fail2ban
> and drop any IP Address that fails to log in on the new port should that port
> be discovered by unauthorized persons.

read cis redhat tuning manual, it is really good.

--
Eero
_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
http://lists.centos.org/mailman/listinfo/centos



[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux