mw44118 wrote:
So I just disabled ssh as root. Am considering switching to public keys rather than passwords for logins.
Your security skill has increased by +1, it will increase again when pubkey auth is enabled and password logins are disabled.
From a recent
post:
* Don't use the same passwords everywhere
* Create seperate user accounts for almost everything (ref rule 1)
* Limit those user accounts, strictly.
* Use pubkey auth for all ssh logins, disallow root, (ref rule 3), allow logins only from a small range of IP (try to get a static from your ISP), only allow your user to login via ssh from your IP address.
* Limit your external servers, learn /etc/hosts.allow and /etc/hosts.deny
* Learn IPtables, or setup an easy bash interface.
* Install one of the hundred brute-force/dictionary attack blockers (fail2ban, denyhosts, etc)
* Seperate your mysql users and only give them rights enough on their own databases to do just they things they need to do.
* Use good and well tested software, bleeding edge isn't always the best choice.
This is just generic basics, there is plenty more.