1 |
Good Morning Folks: |
2 |
|
3 |
I have been doing some reading over the last day or two about a SSH bot |
4 |
attack that is occurring in some places. I will be the first to admit |
5 |
that I have been a bit lax with my ssh security (allowing root logins |
6 |
etc). This problem has inspired me to get things cleaned up, and flying |
7 |
right again. I have already modified my ssh config to prevent root |
8 |
logins via ssh, so that hole is closed. In talking to a friend |
9 |
yesterday, he suggested using key based authentication to further |
10 |
protect my servers, which sounds like a great idea. The problem is that |
11 |
I have no idea how to set it up. A google search turned up the Gentoo |
12 |
pages on keychain, which does not sound exactly like what he was talking |
13 |
about (he mentioned a key carried on a JUMP drive (usb stick)) |
14 |
|
15 |
I am using gentoo (and fedora (soon to be converted) servers) and PUTTY. |
16 |
If someone can offer suggestions, or point me in the right direction, I |
17 |
would be most appreciative. |
18 |
|
19 |
Timothy A. Holmes |
20 |
IT Manager / Network Admin / Web Master / Computer Teacher |
21 |
|
22 |
Medina Christian Academy |
23 |
A Higher Standard... |
24 |
|
25 |
Jeremiah 33:3 |
26 |
Jeremiah 29:11 |
27 |
Esther 4:14 |
28 |
|
29 |
|
30 |
-- |
31 |
gentoo-user@g.o mailing list |