Which SSHd exploit would that be? to OpenSSH? Kevin
----- Original Message ----- From: "Rodrego Alverez" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Wednesday, April 03, 2002 2:12 AM Subject: [cobalt-security] sshd security tweaking > We seems to be among the many whose Cobalt RaQ4 has been hacked through the SSH exploit. > After a complete re-installation, we have secured the box a bit better this time (self-issued certificate for Cobalt admin interface, upgrade to OpenSSH 3.1 and such). > > Since I, as server admin, am the only person needing shell access, I was thinking of changing the port to which sshd listens to something more obscure, rather than the default 22. Does this help? > > Would it be done in the /etc/ssh/sshd_config file? It seems that every line in that file is commented out in the version of ssh I downloaded from http://pkgmaster.com/. > > I have uncommented the line to stop direct root login myself. I also uncommented the line listing just Protocal 2, but that caused an error when I tried logging in. Should I still attempt to turn off acceptance of SSH1 as well? > > Is this all done in the same config file? > > Thanks for advice! > Rod. > > > -- > > _______________________________________________ > Sign-up for your own FREE Personalized E-mail at Mail.com > http://www.mail.com/?sr=signup > > > _______________________________________________ cobalt-security mailing list [EMAIL PROTECTED] http://list.cobalt.com/mailman/listinfo/cobalt-security
