AW: [suse-security] SSH Authentication

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi !
- --> You can tell the SSH deamon not to accept passwords. See /etc/ssh/sshd_config Set: PubkeyAuthentication yes PasswordAuthentication no If you allow only port 22 (SSH) from outside, then you can only login to the computer by using an SSH public key.
- --> But if computer A is not hacked, it is easier to brute-force crack machine B when "only" guessing a password than if the attacker has to guess a 2048bit private key. So as suggested before, if you are worried about the security of the private keys, create them with a password. Bye, Armin - -- Am Hasenberg 26 office: Institut für Atmosphärenphysik D-18209 Bad Doberan Schloss-Straße 6 Tel. ++49-(0)38203/42137 D-18225 Kühlungsborn / GERMANY Email: schoech@iap-kborn.de Tel. +49-(0)38293-68-102 WWW: http://armins.cjb.net/ Fax. +49-(0)38293-68-50 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQE92Q3MG8Xv4GxznLoRAmJBAJ9O161EvxWFWwvEyJ5mB8ZHJjsquACdEDzR VIDK/u7Z2pLUdy0VcoICxPk= =5jCF -----END PGP SIGNATURE-----

Keyexchange works the way the connected pc has an own randomly build key. With the copied key he/she cannot do anything, unless the key is not encrypted with any password. 2048 Bit is secure, but it needs more cpu-time to decode any transmissions. With this your bandwith with ssh is smaller. The only way to get in is to steal both keys by hacking one of your clients. Then he/she can fake ip/hostname and can log in, but there is a chance 1:1.000.000 that this will happen. Another method is to sniff your network with tools like dsniff (even gets secure connections somehow). All those hacking stuff is quite to much to do. Normally you will be safe, if there is no crond job that is done serveal times by key-exchange authentification. If you want extra security change the allowed hosts in /etc/hosts.allow to only allow a range of hosts/ips connect. See tcpd(8) and hosts_access(5) for a description of /etc/hosts.allow. Don't use a key without a passphrase or anyone who has your key can login from everywhere! The key exchange works fine for me to shutdown a server over ssh from the script started by a usv. Therefor I don't need a second serial module for my usv. This is only done, if we got total power down (we had it only one time yet). Philippe
participants (3)
-
Armin Schöch
-
Philippe Vogel
-
Ulrich Roth