User Tools

Site Tools


securing_remote_ssh_access

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revisionBoth sides next revision
securing_remote_ssh_access [2013/01/05 06:07] – [Disable Root Logins] 206.174.106.118securing_remote_ssh_access [2013/01/05 06:10] – [Port 22] 206.174.106.118
Line 27: Line 27:
 The default SSH port 22 is where anything and everything will try when looking for Linux and Unix hosts to compromise.  The default SSH port 22 is where anything and everything will try when looking for Linux and Unix hosts to compromise. 
  
-If you currently have port 22 open to the world, as root ''tail -f /var/log/secure'' to see who passing by has been "knocking on your door". ''Ctrl C'' to exit.+If you currently have port 22 open to the world, as root ''tail -f /var/log/secure'' to see who passing by has been "knocking on your door", you'll more than likely see attempts scrolling by. ''Ctrl C'' to exit.
  
 Using a non-standard port will avoid most of the attention. In this example we'll use port 22500. Any high port number of your choice is generally OK. Using a non-standard port will avoid most of the attention. In this example we'll use port 22500. Any high port number of your choice is generally OK.
securing_remote_ssh_access.txt · Last modified: 2013/01/28 17:55 by 142.103.194.1