News: How to use this unique method of securing SSH


Discover Server Security News

How to use this unique method of securing SSH

Learn about a unique and effective method of securing SSH to help lock down your Linux servers.

The other day I was thinking of ways to secure SSH that were a bit outside the norm. Let's face it, we've all configured SSH in /etc/ssh/sshd_config and /etc/ssh/ssh_config. We've blocked root login, we've set SSH to a non-standard port, we've installed fail2ban, and we've enabled SSH key authentication. What more can we do? 

That's where my train of thought sort of went off the tracks to come up with a non-standard method of blocking unwanted SSH traffic. What I came up with isn't revolutionary, nor is it a guaranteed fix for everything that ails remote logins.

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.