[CentOS] Securing SSH

Tue Mar 25 17:08:09 UTC 2008
Tim Alberts <talberts at msiscales.com>

Mike Kercher wrote:
> iptables, disallow root login via ssh, no valid shell for users that
> don't need one, strong passwords, keys would be a good start.
>
> Mike
>
>   
iptables..add the ip of the attack source to reject?  They keep moving 
IP, this is very time consuming (but I am doing it).  I don't allow root 
login.  I think I got a good password, and I got keys setup so I know 
I'm talking to my server.