How to use this unique method of securing SSH |


Discover Server Security News

How to use this unique method of securing SSH

Learn about a unique and effective method of securing SSH to help lock down your Linux servers.

The other day I was thinking of ways to secure SSH that were a bit outside the norm. Let's face it, we've all configured SSH in /etc/ssh/sshd_config and /etc/ssh/ssh_config. We've blocked root login, we've set SSH to a non-standard port, we've installed fail2ban, and we've enabled SSH key authentication. What more can we do? 

That's where my train of thought sort of went off the tracks to come up with a non-standard method of blocking unwanted SSH traffic. What I came up with isn't revolutionary, nor is it a guaranteed fix for everything that ails remote logins.

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.