From port knocking to white-listing techniques, Sander Knape over at Code Project has written up some always-useful tips for securing your SSH configuration – most are simple measures that could really protect your environment in time of need, and it’s always good to review the frameworks you currently have in place.
Image: illiterate by Stephen
Are your SSH log files flooding with failing login attempts? I’ve seen many questions on websites such as Stackoverflow and Stackexchange from worried people that someone is actively targeting their servers with brute-force password logins attempts. Let me get one thing straight first: you are not special! It’s part of internet life: many botnets constantly attempt to login to servers. These can be random IP addresses or known ranges such as Amazon AWS EC2 instances or DigitalOcean droplets. There’s nothing much you can do about this except for making sure that your server is securely set up.
One of the key security measures you have to take is properly setting up your SSH configuration. If password login is enabled and you are using an insecure password, a brute-force method might give someone access to your server. In this blog post, I’ll discuss some methods for properly setting up SSH on your server.
Join us every Wednesday night at 8pm ET for Ask an Engineer!
Maker Business — HAX Hardware Trends 2017
Wearables — Stay put, paint!
Electronics — Clarify your supply
Biohacking — Nucleus 7 – A Native Cochlear Sound Processor for iPhone
No comments yet.
Sorry, the comment form is closed at this time.