osx - Made a restricted user account for SSH login, I have some security questions -


i made restricted account on osx machine when i'm away home (in school, library, parents place etc.) can login , work on coding via vim.

i figuring out how set ssh key, kind of makes inconvenient me use keys login because logging in different computers , it's annoying step have configure each time.

i reading online leaving ssh port (22) open isn't advisable unless it's super secured because bots/people may try brute force (i know can change default port, though doesn't whole lot security).

so, i'm wondering, ok set user account long, complex password , forgo ssh key? or stupid thing do.

edit: also, how @ logs see if have had unauthorized connection attempts?

changing port 22 else idea. since port 22 common try crack, if change port, bots have scan open ports. if have port scan detection software installed, can block ip addresses before far.

using password authentication not "stupid" thing if have nice long password lots of entropy, not strong as, 1024+ bit rsa/dsa key , more guessable. if password 50 characters long, sort of phrase using dictionary words. not going hacked, probability of happening password authentication greater public key authentication. increase security adding two-factor authentication otp.

to check failed login attempts believe log file macs /var/log/secure.log. if not, around in /var/log.


Comments

Popular posts from this blog

ios - UICollectionView Self Sizing Cells with Auto Layout -

node.js - ldapjs - write after end error -

DOM Manipulation in Wordpress (and elsewhere) using php -