On Mon, Oct 11, 2010 at 16:31, justin randell <[email protected]> wrote:

> unless there's some really good reason not to, i'd strongly advise
> securing your ssh so that it's public-key only. i've seen too many
> places that rely on limiting the amount of ssh attempts get hacked to
> put any faith in that method any more.
>

It's also sane to start locking down where you accept SSH from - if
its only used for administrators, then only allow SSH from your admin
subnets.
-- 
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html

Reply via email to