22

http://www.ibm.com

Learn 3 ways of hardening SSH access to your system to block would-be crackers

Full story »
lmfao's picture
Created by lmfao 4 years 14 weeks ago – Made popular 4 years 14 weeks ago
Category: High End   Tags:
stargrave's picture

stargrave

4 years 14 weeks 2 days 22 hours ago

1

Public key authentication

Moreover, it is better to disable password login at all and leave only public key authentication possibility:

Humans are incapable of securely storing high-quality cryptographic keys, and they have unacceptable speed and accuracy when performing cryptographic operations. (They are also large, expensive to maintain, difficult to manage, and they pollute environment. It is astonishing that these devices continue to be manufactured and deployed. But they are sufficiently pervasive that we must design our protocols around their limitations).