YNOT
  • Home
  • Industry News
    • Adult Business News
    • Adult Novelty News
    • YNOT Magazine
    • EU News
    • Opinions
    • Picture Galleries
  • PR Wire
    • Adult Company News
    • Adult Retail News
    • Adult Talent News
    • Adult Videos News
  • Podcasts
  • Industry Guides
    • Adult Affiliate Guide
    • Affiliate Marketing for Beginners
    • Top Adult Traffic Networks
    • Top Adult PR Agents
    • Funding an Adult Business
  • Business Directory
    • View Categories
    • View Listings
    • Submit Listing
  • Newsletters
  • Industry Events
    • Events Calendar
    • YNOT Cam Awards | Hollywood
    • YNOT Awards | Prague
    • YNOT Cammunity
    • YNOT Summit
    • YNOT Reunion
  • Login with YNOT ID

Imperative: Make SSH as Hard as a Steel Trap

Posted On 13 Apr 2016
By : Daniel Abrams

CyberSecurityBy Daniel Abrams
Special to YNOT

In the previous security article, I discussed FTP security. This time around, I will discuss hardening your Secure Socket Shell.

SSH is a network protocol that provides administrators and webmasters with a secure way to access a server using a client like Putty or SecureCRT, to name but two.

People tend to take SSH for granted. They see the “Secure” in SSH and assume protocol is hardened by default. Not so. SSH is vulnerable if not properly set up. This is a big problem, because SSH allows access to the server, which allows the user command-line access. A hacker with command-line access could wipe the hard drive clean with one command: rm -rf /. Or, they could retrieve sensitive data or install a rootkit that would allow them to access and manipulate the server remotely at a later date.

SSH security is of the highest priority. Here are some measures to harden your SSH:

First and foremost: Never provide SSH access to any outside party. Within your company or group, limit SSH access to only a select few whom you trust with your life and who have a valid reason for shell access. This is especially critical when granting root Normal Shell access.

Via WHM / cPanel or comparable control panel, disable SSH Password Authentication.

Via WHM / cPanel or comparable control panel, generate SSH Keys (private and public). Download the keys. Configure your SSH client to authenticate using Public Key.

Change your SSH password on a regular basis. Change your SSH password monthly or when you suspect that your server has been hacked. When choosing a password, choose a strong one: a random alphanumeric sequence that also contains special characters. A good tool for generating strong passwords is our Password Sentry’s PassMeter.

Every time you change your password, you will need to re-generate your SSH Keys and re-download the new keys for use by your SSH client.

Use a IP whitelist. Only grant SSH access on the basis of IP address.

For domain-specific SSH accounts (yours and/or reseller accounts), use Jailed Shell Access, a limited and restrictive environment within which users can perform whatever functions they need in relation to file system and server environment, but they can’t access the root.

SSH is an amazing protocol that allows you to do amazing things. But, in the wrong hands, it can be the most dangerous weapon directed against your server. Protect it well, and ensure you harden it like a steel trap.

 

About the Author
Founder and CEO of Password Sentry. Password Sentry is a very popular app used by adult paysites to detect and block password sharing, and block dictionary / brute force attacks. I also do consultation with and provide web development services for the ind
  • google-share
Previous Story

Lubricants May Lessen Risk of Exposure to STIs

Next Story

TRYST Multi-Erogenous Silicone Massager Debuts

Related Posts

Scam Targeting Freelancers a Reminder: Handle Email with Care

Posted On 24 Sep 2018
, By GeneZorkin

New Phishing Scam Uses Prior Passwords, Porn Threat to Drive Fear

Posted On 23 Jul 2018
, By GeneZorkin

New Reports: Porn’s Role In Cybersecurity Threats Exaggerated

Posted On 13 Jun 2018
, By GeneZorkin

Leave a Reply Cancel reply

You must be logged in to post a comment.

Sponsor

YNOT Shoot Me

YNOTShootMe.com has exclusive pics from adult industry business events. Check it out!

YNOT Directory

  • WMA
    News & Resources
  • Babes database | Grow followers
    Adult Talent Agencies
  • Andrew Blake Store
    Online Retail Stores
  • Premiere Listing

    Mail Value Profits

    More Details

RECENT

POPULAR

COMMENTS

ASACP Spotlights Study Finding Parental Controls ‘Underutilized’

ASACP Visits Prague for TES Affiliate Conferences

Posted On 25 Aug 2025

Naughty America Presents Reagan Foxx's Yoga Session Is Interrupted By An Unexpected Admirer

Posted On 25 Aug 2025

Ria Bentley Is On Fire With Miss Stella Cloud

Posted On 25 Aug 2025

Vanessa, Meet Vivid

Posted On 29 Sep 2014
Laila Mickelwaite and Exodus Cry

Laila Mickelwaite, Exodus Cry and their Crusade Against Porn

Posted On 03 May 2021

Someone puts Gal Gadot in one of your vids? Take it down!

Posted On 13 Dec 2017

Hoping viewers can also enjoy a spooky...

Posted On 24 Oct 2023

now a days these type of games will get...

Posted On 17 Jul 2023

good move from adent. these type of...

Posted On 06 Jul 2023

Sponsor

Sitemap
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.OkPrivacy Policy