vonskippy wrote:
People still setup SSH to use passwords???
It amazes me too. There is no excuse for falling to simple username/password dictionary attacks.
Here is a clue people:
Use SSH public key authentication
Limit keys to certain source ips if practical ( yes it does that )
Limit keys to certain commands if practical ( yes it does that too )
Disable root authentication or disable root password authentication
Don't use predictable usernames
Implement a decent password policy
Implement SSH connection rate limiting in iptables
Changing the SSH port isn't security. At best it reduces the rate of attacks
If you know enough to argue with the above ( like the people who say denyhosts is better than iptables rate limiting ) then do what you know to be right.