[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [cobalt-security] sshd security tweaking
- Subject: Re: [cobalt-security] sshd security tweaking
- From: "Kevin D" <kdlists@xxxxxxxxxxxxxxx>
- Date: Wed, 3 Apr 2002 16:45:24 -0500
- List-id: Mailing list for users to address network security on Cobalt products. <cobalt-security.list.cobalt.com>
Which SSHd exploit would that be? to OpenSSH?
Kevin
----- Original Message -----
From: "Rodrego Alverez" <rodalverez@xxxxxxxx>
To: <cobalt-security@xxxxxxxxxxxxxxx>
Sent: Wednesday, April 03, 2002 2:12 AM
Subject: [cobalt-security] sshd security tweaking
> We seems to be among the many whose Cobalt RaQ4 has been hacked through
the SSH exploit.
> After a complete re-installation, we have secured the box a bit better
this time (self-issued certificate for Cobalt admin interface, upgrade to
OpenSSH 3.1 and such).
>
> Since I, as server admin, am the only person needing shell access, I was
thinking of changing the port to which sshd listens to something more
obscure, rather than the default 22. Does this help?
>
> Would it be done in the /etc/ssh/sshd_config file? It seems that every
line in that file is commented out in the version of ssh I downloaded from
http://pkgmaster.com/.
>
> I have uncommented the line to stop direct root login myself. I also
uncommented the line listing just Protocal 2, but that caused an error when
I tried logging in. Should I still attempt to turn off acceptance of SSH1
as well?
>
> Is this all done in the same config file?
>
> Thanks for advice!
> Rod.
>
>
> --
>
> _______________________________________________
> Sign-up for your own FREE Personalized E-mail at Mail.com
> http://www.mail.com/?sr=signup
>
>
>