Security News > 2021 > October > How to use this unique method of securing SSH
Jack Wallen offers up a different method of securing SSH that could be rather timely in helping to lock down your Linux servers.
The other day I was thinking of ways to secure SSH that were a bit outside the norm.
Let's face it, we've all configured SSH in /etc/ssh/sshd config and /etc/ssh/ssh config.
We've blocked root login, we've set SSH to a non-standard port, we've installed fail2ban and we've enabled SSH key authentication.
That's where my train of thought sort of went off the tracks to come up with a non-standard method of blocking unwanted SSH traffic.
So why give anyone the ability to access your remote servers via SSH? Again, I know this sounds crazy, but for some servers, this could be an ideal way of blocking incoming SSH attacks at certain times.
News URL
https://www.techrepublic.com/article/a-unique-method-of-securing-ssh/#ftag=RSS56d97e7