> -----Original Message-----
> From: Alan McKinnon [mailto:[EMAIL PROTECTED]
> Sent: 22 February 2007 17:33
> To: [email protected]
> Subject: Re: [gentoo-user] OT - Some miscellanous questions about hack
> attacks and dealing with them
> 
> By far the most common attack vector is weak user names and passwords 
> accessed via ssh. Solution is a sensbile password policy, or 
> allow ssh 
> access only via keys.
> 

I agree. Until I have the time and effort to set up key based authentication I 
have disabled root logon via SSH and set all users passwords to 10 to 15 random 
character passwords.

Check /var/log/secure.log on any webserver. On both of mine I see lots (and I 
mean thousands) of attacks where people try common user names and weak 
passwords (apache, awstats, mysql, admin, etc and common forenames... )

Running SSH on a port other than 22 is possible and potentially more secure.

--
djn

I do not represent anyone else in emails I send to this list.
--
[email protected] mailing list

Reply via email to