On Fri, 21 Feb 2020, 12:51 Frank Pikelner, <frank.pikel...@gmail.com> wrote:

> Take care with " backdoors", not a good idea. Port scanners ie "nmap"
> will find obfuscated servers running on different ports.
>
> On Fri, Feb 21, 2020 at 7:21 AM Michal Schorm <msch...@redhat.com> wrote:
> >
> > > In doing this is their danger of making an error and locking myself out
> > > of my computer, if so what to avoid?
> >
> > You can use dummy account for that, on both ends.
> >
> > You can force SSH (client) to only use keyes, instead of passwords.
> >
> > You can run SSH in a container, to learn how to set it up. If you
> > break thy system inside of the container, you can just restart it and
> > try again.
> >
> > You can try (never did this one) to run another SSH server on
> > different port - as a "backdoor". (Allow that port in firewall)
> >
> > Once you are confident, you can start using your intended client,
> > still with dummy server (either in a container or a dummy user
> > account).
> > After everything will work, you can attempt to switch to "production".
> >
> > If you are locking root account, set sudo permissions to another user
> account.
> >
> > Restart both devices on both ends (at once) to make sure you have
> > correct permanent configuration.
> >
> >
> >
> >
> >
> >
> >
> >
> >
> >
> >
> >
> >
> >
> > --
> >
> > Michal Schorm
> > Software Engineer
> > Core Services - Databases Team
> > Red Hat
> >
> > --
> >
> > On Fri, Feb 21, 2020 at 1:05 PM Bob Goodwin <bobgood...@fastmail.us>
> wrote:
> > >
> > > I've been reading the thread about detecting hack attempts and I am
> > > interested in in setting up "key based authentication" as described
> > > [perhaps] in
> > > "
> https://docs.fedoraproject.org/en-US/Fedora/14/html/Deployment_Guide/s2-ssh-configuration-keypairs.html
> "
> > >
> > > In doing this is their danger of making an error and locking myself out
> > > of my computer, if so what to avoid? I've made some catastrophic errors
> > > in the not very distant past that required a new system re-installation
> > > and would prefer not repeating that.
> > >
> > > Suggestions, thoughts?
> > >
> > > Bob
> > >
> > > --
> > > Bob Goodwin - Zuni, Virginia,
> > > Fedora Linux-31 XFCE
> > > _______________________________________________
>

You can enable 2FA as well, add AllowUsers to your sshd_config for
additional security.

Details on 2FA and Fedora can be found here
https://fedoramagazine.org/two-factor-authentication-ssh-fedora/


>
_______________________________________________
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org

Reply via email to