Security News > 2021 > October > How to use this unique method of securing SSH

How to use this unique method of securing SSH
2021-10-07 14:47

Jack Wallen offers up a different method of securing SSH that could be rather timely in helping to lock down your Linux servers.

The other day I was thinking of ways to secure SSH that were a bit outside the norm.

Let's face it, we've all configured SSH in /etc/ssh/sshd config and /etc/ssh/ssh config.

We've blocked root login, we've set SSH to a non-standard port, we've installed fail2ban and we've enabled SSH key authentication.

That's where my train of thought sort of went off the tracks to come up with a non-standard method of blocking unwanted SSH traffic.

So why give anyone the ability to access your remote servers via SSH? Again, I know this sounds crazy, but for some servers, this could be an ideal way of blocking incoming SSH attacks at certain times.


News URL

https://www.techrepublic.com/article/a-unique-method-of-securing-ssh/#ftag=RSS56d97e7

Related vendor

VENDOR LAST 12M #/PRODUCTS LOW MEDIUM HIGH CRITICAL TOTAL VULNS
SSH 9 2 8 6 1 17