BLU Discuss list archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Discuss] vnc
- Subject: [Discuss] vnc
- From: dsr at randomstring.org (Dan Ritter)
- Date: Thu, 28 Aug 2014 12:57:36 -0400
- In-reply-to: <e0e087b00e6b48f5ac53d81f1df7b74e@CO2PR04MB684.namprd04.prod.outlook.com>
- References: <53F9F6B9.4060505@stephenadler.com> <20140824161132.GE14848@randomstring.org> <be314521ab6bebb6add54d706b042f01.squirrel@mail.mohawksoft.com> <53FA1C3B.70908@gmail.com> <cb98ac9a77c99dd9313c5b1503d30ee1.squirrel@mail.mohawksoft.com> <e0e087b00e6b48f5ac53d81f1df7b74e@CO2PR04MB684.namprd04.prod.outlook.com>
On Thu, Aug 28, 2014 at 04:51:20PM +0000, Edward Ned Harvey (blu) wrote: > > From: discuss-bounces+blu=nedharvey.com at blu.org [mailto:discuss- > > bounces+blu=nedharvey.com at blu.org] On Behalf Of > > markw at mohawksoft.com > > > > SSH is a very BAD thing to open up to the free internet. BAD BAD BAD. > > Once in, you are in. Shell access is dangerous. > > Blanket statement. > > The actual truth is: SSH *can* be bad to open up to the internet, but it doesn't take rocket science to make it good and secure. > > First and foremost, disable all forms of authentication other than key-based. Even if you have a complex randomly generated password, you'd have to get something like 128-ish bits of entropy into that password to make it secure from brute force attacks. In that case, you'll never memorize it and you might as well just use keys. Ensure your keys are 2048 or 3072 bits (or 4096). Also, by merely allowing password based authentication, script kiddies out there will attempt to brute force attack you. (Just watch your logs and see.) This hogs your internet and CPU significantly, even if you have a sufficiently complex password to make yourself actually secure from breach. Even though I agree with all this, I have to point out that many experiments have concluded that English sentences contain about 1.1 bits of entropy per character, and so it is not completely unreasonable to create and memorize a 120 character sentence to use as a password. The problem, really, is getting the balance right between using it often enough not to forget it (and thus want to write it down) and using it so often that it becomes an impediment to access merely because of the length of time it takes you to type it. People. People are the problem. -dsr-
- Follow-Ups:
- [Discuss] vnc
- From: richard.pieri at gmail.com (Richard Pieri)
- [Discuss] vnc
- From: blu at nedharvey.com (Edward Ned Harvey (blu))
- [Discuss] vnc
- References:
- [Discuss] vnc
- From: adler at stephenadler.com (Stephen Adler)
- [Discuss] vnc
- From: dsr at randomstring.org (Dan Ritter)
- [Discuss] vnc
- From: markw at mohawksoft.com (markw at mohawksoft.com)
- [Discuss] vnc
- From: richard.pieri at gmail.com (Richard Pieri)
- [Discuss] vnc
- From: markw at mohawksoft.com (markw at mohawksoft.com)
- [Discuss] vnc
- From: blu at nedharvey.com (Edward Ned Harvey (blu))
- [Discuss] vnc
- Prev by Date: [Discuss] vnc
- Next by Date: [Discuss] vnc
- Previous by thread: [Discuss] vnc
- Next by thread: [Discuss] vnc
- Index(es):