If you only allow pubkey authentication on a publicly accessible SSH server, then there is no way to log in with just a password. So it is impossible to brute force into such a server. Well, theoretically it is possible to brute force search for a valid pubkey, but this would take so long, that in practice it is infeasible.
I consider pub key auth very comfortable. I use Pageant, a PuTTY pubkey agent, and unlock my personal private key just once a day when I turn the computer on. So even in spite my passphrase for my private key is somewhat ~35 characters long, I only have to type it once a day, no matter how many times I want to log into some system. Total Commander also cooperates with Pageant, so my access to any system either by PuTTY or by TC is unlocked by just a single password entered in the morning. Not bad at all.
like virus
Support for security such as Firewalls and securing linux
Return to “CentOS 6 - Security Support”
Jump to
- CentOS General Purpose
- ↳ CentOS - FAQ & Readme First
- ↳ Announcements
- ↳ CentOS Social
- ↳ User Comments
- ↳ Website Problems
- CentOS 8 / 8-Stream / 9-Stream
- ↳ 8 /8-Stream / 9-Stream - General Support
- ↳ 8 /8-Stream / 9-Stream - Hardware Support
- ↳ 8 /8-Stream / 9-Stream - Networking Support
- ↳ 8 /8-Stream / 9-Stream - Security Support
- CentOS 7
- ↳ CentOS 7 - General Support
- ↳ CentOS 7 - Software Support
- ↳ CentOS 7 - Hardware Support
- ↳ CentOS 7 - Networking Support
- ↳ CentOS 7 - Security Support
- CentOS Legacy Versions
- ↳ CentOS 5
- ↳ CentOS 5 - General Support
- ↳ CentOS 5 - Software Support
- ↳ CentOS 5 - Hardware Support
- ↳ CentOS 5 - Networking Support
- ↳ CentOS 5 - Server Support
- ↳ CentOS 5 - Security Support
- ↳ CentOS 5 - Oracle Installation and Support
- ↳ CentOS 5 - Miscellaneous Questions
- ↳ CentOS 6
- ↳ CentOS 6 - General Support
- ↳ CentOS 6 - Software Support
- ↳ CentOS 6 - Hardware Support
- ↳ CentOS 6 - Networking Support
- ↳ CentOS 6 - Security Support