1 |
On Tue, 27 Jul 2004, Greg Watson wrote: |
2 |
> If you're not already doing so, I recommend to disable password |
3 |
> interactive login and enforce key only logins. This will prevent some |
4 |
> of the ssh exploits, brute-force attacks, and general script kiddies. |
5 |
> |
6 |
> And as always, upgrade to the latest version of OpenSSH/OpenSSL. |
7 |
|
8 |
Another part of good strategy would be to use SSH on a different port - |
9 |
most of the tools/scripts in use now do a quick scan on known services and |
10 |
then move on if nothing is found. If someone is directly targeting your |
11 |
box, this won't help much of course. :-) Sometimes it's good to maintain |
12 |
a low profile on management services. |
13 |
|
14 |
|
15 |
|
16 |
-- |
17 |
gentoo-security@g.o mailing list |