[Discuss] vnc

Edward Ned Harvey (blu) blu at nedharvey.com
Thu Aug 28 12:51:20 EDT 2014


> From: discuss-bounces+blu=nedharvey.com at blu.org [mailto:discuss-
> bounces+blu=nedharvey.com at blu.org] On Behalf Of
> markw at mohawksoft.com
> 
> SSH is a very BAD thing to open up to the free internet. BAD BAD BAD.
> Once in, you are in. Shell access is dangerous.

Blanket statement.

The actual truth is:  SSH *can* be bad to open up to the internet, but it doesn't take rocket science to make it good and secure.

First and foremost, disable all forms of authentication other than key-based.  Even if you have a complex randomly generated password, you'd have to get something like 128-ish bits of entropy into that password to make it secure from brute force attacks.  In that case, you'll never memorize it and you might as well just use keys.  Ensure your keys are 2048 or 3072 bits (or 4096).  Also, by merely allowing password based authentication, script kiddies out there will attempt to brute force attack you.  (Just watch your logs and see.)  This hogs your internet and CPU significantly, even if you have a sufficiently complex password to make yourself actually secure from breach.

Assuming you want to disable password authentication (and everything other than public key)
    This helps you generate a complete list:
        man sshd_config | grep Authentication

    sudo vi /etc/ssh/sshd_config
        Add, or change, the following lines:

        ChallengeResponseAuthentication no
        GSSAPIAuthentication no
        HostbasedAuthentication no
        KbdInteractiveAuthentication no
        KerberosAuthentication no
        PasswordAuthentication no
        PubkeyAuthentication yes
        RhostsRSAAuthentication no
        RSAAuthentication no




More information about the Discuss mailing list