Linux Format

Massively improve your SSH login security

SH keys can ease admin burdens, so we’re going to explain how to configure OpenSSH to S require SSH keys for login, tightening system security considerably, as well as enforce login via key only (as opposed to allowing keys or passwords) and how to disable root login via SSH (script kiddies love to scan for these and brute force them).

Root login using username and password will still work at the physical console (and out-of-band consoles). If an attacker has access to the console, it’s trivial to reboot and

You’re reading a preview, subscribe to read more.

More from Linux Format

Linux Format3 min read
Kernel Watch
Linus Torvalds announced the fourth RC (Release Candidate) for what will become Linux 6.9 in another few weeks. In his announcement, he noted that there was “Nothing particularly unusual going on this week – some new hardware mitigations may stand o
Linux Format2 min read
Specialist Tool Organisation
K ali works differently from the others as it has the security tools in the root of the app launcher. If you know what you’re looking for, the whole thing is searchable from the launcher. The ‘normal’ apps are located in the Usual Applications folder
Linux Format14 min read
Ubuntu at 20
Without Ubuntu, the current Linux landscape would be unrecognisable. Back in October 2004, the first 4.10 (2004.10) release of Ubuntu, with its intriguing Warty Warthog code name, leapt from obscurity to being one of the most downloaded Linux distrib

Related Books & Audiobooks