On Mar 28, 2008, at 9:12 PM, Dave Smith wrote:
In the past, I have used /etc/hosts.[deny|allow] to secure my SSH server by restricting access to a limited number of IP addresses. This has worked very well for me over the past 3 or 4 years, but now I need to allow access to a non-enumerable set of client IP addresses, so I am considering alternate methods. The first method on my list is to require key-based authentication (no passwords). Secondly, I'm thinking about using an alternate port (ie, 2222 instead of 22) simply to ward off automated botnet logins.

Does anyone see a problem with this? Any other ideas?

Is it non-enumerable because it is too large, or because you can't know all of them ahead of time?

If it is the second, I would suggest what is used on some of the servers I help admin. We use a dynamic whitelist of IP's that you can add your IP to by visiting an SSL webpage and doing a basic auth over SSL. If successful, that then adds your IP to the whitelist for accessing SSH and other non-public services.

Hope that helps.

Grant


/*
PLUG: http://plug.org, #utah on irc.freenode.net
Unsubscribe: http://plug.org/mailman/options/plug
Don't fear the penguin.
*/

Reply via email to