On Mon, Oct 11, 2010 at 16:31, justin randell <[email protected]> wrote:
> unless there's some really good reason not to, i'd strongly advise > securing your ssh so that it's public-key only. i've seen too many > places that rely on limiting the amount of ssh attempts get hacked to > put any faith in that method any more. > It's also sane to start locking down where you accept SSH from - if its only used for administrators, then only allow SSH from your admin subnets. -- SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/ Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html
