From port knocking to white-listing techniques, Sander Knape over at Code Project has written up some always-useful tips for securing your SSH configuration – most are simple measures that could really protect your environment in time of need, and it’s always good to review the frameworks you currently have in place.
Image: illiterate by Stephen
Are your SSH log files flooding with failing login attempts? I’ve seen many questions on websites such as Stackoverflow and Stackexchange from worried people that someone is actively targeting their servers with brute-force password logins attempts. Let me get one thing straight first: you are not special! It’s part of internet life: many botnets constantly attempt to login to servers. These can be random IP addresses or known ranges such as Amazon AWS EC2 instances or DigitalOcean droplets. There’s nothing much you can do about this except for making sure that your server is securely set up.
One of the key security measures you have to take is properly setting up your SSH configuration. If password login is enabled and you are using an insecure password, a brute-force method might give someone access to your server. In this blog post, I’ll discuss some methods for properly setting up SSH on your server.
Have an amazing project to share? Join the SHOW-AND-TELL every Wednesday night at 7:30pm ET on Google+ Hangouts.
Join us every Wednesday night at 8pm ET for Ask an Engineer!
Learn resistor values with Mho’s Resistance or get the best electronics calculator for engineers “Circuit Playground” – Adafruit’s Apps!
Maker Business — PBS Kids releases baby’s first HDMI dongle
Wearables — Spray on weather
Electronics — Switch Mode Power
Biohacking — FindAir One – Monitor Your Asthma
No comments yet.
Sorry, the comment form is closed at this time.