Rumen Yotov wrote:
> Antonio Coralles wrote:
> 
> 
>>I'm running sshd on my personal computer to be able to log in from
>>different machines. To tighten security without disabling pam i've
>>created a user which is not in groop weel, and configured ssh to accept
>>logins for this user only. By the way all passwords on my system are
>>well choosen and should be invulnerable to dictonary attacs.
>>
>>
>>i would like to know if sshd is really secure as long as nobody who
>>shouldn't has the correct username and password.
>>
>>thanks
>>antonio
>> 
>>
> 
> Hi Antonio,
> Think this is more secure than the default setup, but it'll be better to
> try public-key auth.
> Generally speaking this is an auth with a public/private keys. Just edit
> your /etc/sshd_config, read the comments or google for sample config
> (don't have the links right now).
> HTH. Rumen

Here is a link to a series of articles written by Daniel Robbins (Gentoo
 developer and architect) about SSH key management and SSH security.

http://www-106.ibm.com/developerworks/library/l-keyc.html

I would also recommend looking into a script written by Mr. Robbins
called keychain (mentioned in the articles) for managing your SSH keys.

byron
-- 
[email protected] mailing list

Reply via email to