On Thu 08 Jan 2015 at 22:36:46 +0100, Martin Steigerwald wrote:

> Am Donnerstag, 8. Januar 2015, 14:20:27 schrieb Jerry Stuckle:
> 
> > Just ensure you're using good security practices - don't allow root
> > login, use long, random passwords, etc.  I also use a random character
> > strings for the login ids, as well as passwords  - just one more thing
> > for the hackers to have to figure out how to get around.
> 
> Only allow SSH key based logins. Of course, only after you copied a public 
> key 
> onto the machine with ssh-copy-id.
> 
> And have SSH keys with *strong* passphrases, to protect against someone 
> stealing your key. Use ssh-agent wisely only on trusted machines.

SSH password logins are just as safe. 20 characters gives a strong
password for use on trusted machines. There is no need to worry about
it being stolen because it is in your memory,


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/09012015001632.a7c9236b8...@desktop.copernicus.demon.co.uk

Reply via email to