[CentOS] Securing SSH
Daniel Andrzejewski
andrzeje at cs.utk.eduFri Mar 28 17:39:44 UTC 2008
- Previous message: [CentOS] Securing SSH
- Next message: [CentOS] Securing SSH
- Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
Tim Alberts wrote: > So I setup ssh on a server so I could do some work from home and I think > the second I opened it every sorry monkey from around the world has been > trying every account name imaginable to get into the system. > > What's a good way to deal with this? > > _______________________________________________ > CentOS mailing list > CentOS at centos.org > http://lists.centos.org/mailman/listinfo/centos ~> cat sshd_config ... IgnoreRhosts yes PermitEmptyPasswords no UsePAM yes Use PAM (Pluggable Authentication Modules). Did anyone mention it here? http://www.kernel.org/pub/linux/libs/pam/whatispam.html "Basically, it is a flexible mechanism for authenticating users." Regards, Daniel -- Daniel Andrzejewski student IT Administrator Elec Engr & Comp Science University of Tennessee (865) 974 - 4388 (work) "Investment in knowledge always pays the best interest" Benjamin Franklin --
- Previous message: [CentOS] Securing SSH
- Next message: [CentOS] Securing SSH
- Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
More information about the CentOS mailing list