Page 3 of 3 FirstFirst 123
Results 21 to 21 of 21

Thread: Gnucash??

  1. #21
    Join Date
    Mar 2007
    Location
    Outer Milky Way
    Beans
    Hidden!
    Distro
    Kubuntu 12.04 Precise Pangolin

    Re: Gnucash??

    Quote Originally Posted by bodhi.zazen View Post
    You can generate one key per client or many people keep keys on a flash drive.

    the key is what you need. key.pub goes on the server (although I keep both on a flash drive, encrypt the flash drive if (paranoid).
    Heh. Heh. That's exactly the way I do it, for exactly the same paranoid reason.

    But he can also do the keygen and transfer the key over the Internet (using ssh-copy-id), as he was asking. Only problem is, I find that the minute (literally) that my openSSH is unprotected, I have a ton of port scanning and brute-force password cracking attempts for the SSH port. God forbid if I don't have at least a strong password on the OpenSSH connection initially! A side-result of brute-force password cracking attempts is that the server loses time responding to them. (In this way it is somewhat similar to a Denial of Service attack).

    I indeed have used ssh-copy-id over a password-protected SSH connection (when the user isn't in physical proximity), but I sure do it quickly and then turn off the password authentication (in the SSH config file) immediately after transferring the key.

    For the most part, though, I have gone to the flash drive method for transmitting keypair data, as well.

    Just as a plug, I think knockd is a great little security device for people who want port security.

    I don't use port 22 for my SSH connections, anymore, but have changed it (by editing the ssh config file on the server) to a non-standard port.

    Using knockd, I can hide that port and open it only when the correct sequence of port requests is made from the Internet. This keeps my SSH port always hidden. Sure, there's a miniscule additional negotation time built-in, but for the security it affords, it's worth it. Further, hiding the port almost completely halts Denial of Service attacks. No attacker program has the patience to probe ports in varying sequences in order to try to open a single non-standard port on which it can then attempt a brute force attack for an unknown type of server.

    Too many wolves at the Internet door these days. Best security practices are crucial.
    Last edited by perspectoff; September 20th, 2010 at 08:21 PM.

    UbuntuGuide/KubuntuGuide

    Right now the killer is being surrounded by a web of deduction, forensic science,
    and the latest in technology such as two-way radios and e-mail.

Page 3 of 3 FirstFirst 123

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •