Darrin Chandler wrote:
> On Thu, Feb 22, 2007 at 09:43:21PM -0700, Jon M. Hanson wrote:
>> I'm guessing they got in through some kind of guest account you have
>> setup (but maybe didn't know about) or another common account name with
>> a weak password. I constantly watch my system logs and several times a
>> week I'll get a ton of attempts to try to brute force passwords to
>> various accounts through SSH.
>
> It's quite possible. I get those same attempts, and pretty much everyone
> else does too. In response, some people set up elaborate schemes (port
> knockers and whatnot) in order to protect themselves. It's not as secure
> as they think. Allowing password authentication with good passwords is
> bad. Allowing it when your password is 'golfnut' is asking for trouble.
> Yes, even if you spell it 'g01FnuT'. (Ok, how many of you winced just
> now because I guessed your password or got close?)
>
> Those of you out there running sshd, PLEASE consider using ssh-keygen
> and using the key pairs for authentication *instead* of passwords, and
> setting "PasswordAuthentication no" in your config. It really is pretty
> easy, and really will make your system safer. Of course that's not all
> there is to security, but I've seen many people have otherwise secure
> systems, with everything patched and up to date, and allow password auth
> with weak passwords. It's like putting bars on your windows and leaving
> the front door open.
>
This sounds like a nice mini-presentation (howto) for a meeting.
--
-Eric 'shubes'
---------------------------------------------------
PLUG-discuss mailing list -
PLUG-discuss@lists.plug.phoenix.az.us
To subscribe, unsubscribe, or to change you mail settings:
http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss