With my host being public to internet, security now is the most concerning than it ever was.
So, first step, using one time password when login with ssh.
$ sudo apt-get install libpam-otpw
--- /etc/ssh/sshd_config ---
UsePrivilegeSeparation no
ChallengeResponseAuthentication yes
--- /etc/pam.d/sshd ---
#@include common-auth
auth required pam_otpw.so
session optional pam_otpw.so
~ $ optw-gen # Save the output!
$ sudo /etc/init.d/ssh restart
And here is some other tips:
http://www.ibm.com/developerworks/cn/aix/library/au-sshlocks/index.html?ca=drs-
So, first step, using one time password when login with ssh.
$ sudo apt-get install libpam-otpw
--- /etc/ssh/sshd_config ---
UsePrivilegeSeparation no
ChallengeResponseAuthentication yes
--- /etc/pam.d/sshd ---
#@include common-auth
auth required pam_otpw.so
session optional pam_otpw.so
~ $ optw-gen # Save the output!
$ sudo /etc/init.d/ssh restart
And here is some other tips:
http://www.ibm.com/developerworks/cn/aix/library/au-sshlocks/index.html?ca=drs-
本文介绍了一种通过使用一次性密码(OTP)来增强SSH登录安全性的方法。文章详细描述了如何安装并配置必要的软件包,如libpam-otpw,并调整sshd_config文件设置以启用Challenge Response验证。此外,还提供了重启SSH服务的方法及额外的安全建议。
4486

被折叠的 条评论
为什么被折叠?



