Securing Your Asterisk Server, Part 2 - page 2
Locking Down OpenSSH
A second way to tighten up remote SSH access is to use public-key authentication.
This protects your system passwords because you authenticate with a cryptographic
key, instead of using a login/password. (See Resources to learn how to do this.) In addition to disabling root logins, you should also
disable password authentication with this line in
Now you can sit back and laugh at brute-force SSH attacks, because they simply won't work.
- 1Linux Top 3: Alpine Linux 3.4, deepin 15.2 and Linux Lite 3.0
- 2Linux 4.7 Set to Boost Live Patching, Security and Power Management
- 3Linux 4.6 Charred Weasel adds USB 3.1 Support
- 4Linux Top 3: OpenIndiana 2016.04, Ubuntu 16.04 and Debian's New Leader
- 5Linux Top 3: KaOS 2016.04, TurnKey 14.1 and pfSense 2.3