Learn 3 ways of hardening SSH access to your system to block would-be crackers

Full story »
lmfao's picture
Created by lmfao 6 years 12 weeks ago – Made popular 6 years 11 weeks ago
Category: High End   Tags:
stargrave's picture


6 years 12 weeks 14 hours 58 min ago


Public key authentication

Moreover, it is better to disable password login at all and leave only public key authentication possibility:

Humans are incapable of securely storing high-quality cryptographic keys, and they have unacceptable speed and accuracy when performing cryptographic operations. (They are also large, expensive to maintain, difficult to manage, and they pollute environment. It is astonishing that these devices continue to be manufactured and deployed. But they are sufficiently pervasive that we must design our protocols around their limitations).