Rumen Yotov wrote: > Antonio Coralles wrote: > > >>I'm running sshd on my personal computer to be able to log in from >>different machines. To tighten security without disabling pam i've >>created a user which is not in groop weel, and configured ssh to accept >>logins for this user only. By the way all passwords on my system are >>well choosen and should be invulnerable to dictonary attacs. >> >> >>i would like to know if sshd is really secure as long as nobody who >>shouldn't has the correct username and password. >> >>thanks >>antonio >> >> > > Hi Antonio, > Think this is more secure than the default setup, but it'll be better to > try public-key auth. > Generally speaking this is an auth with a public/private keys. Just edit > your /etc/sshd_config, read the comments or google for sample config > (don't have the links right now). > HTH. Rumen
Here is a link to a series of articles written by Daniel Robbins (Gentoo developer and architect) about SSH key management and SSH security. http://www-106.ibm.com/developerworks/library/l-keyc.html I would also recommend looking into a script written by Mr. Robbins called keychain (mentioned in the articles) for managing your SSH keys. byron -- [email protected] mailing list

