Securing and Optimizing Linux: RedHat Edition -A Hands on Guide | ||
---|---|---|
Prev | Chapter 16. Software -Securties(commercial) | Next |
For better security of your ssh2 server, you can configure it to use pam authentication. To do that, you must create the /etc/pam.d/ssh file.
Create the ssh file touch /etc/pam.d/ssh and add or change, if necessary:
#%PAM-1.0 auth required /lib/security/pam_pwdb.so shadow auth required /lib/security/pam_nologin.so account required /lib/security/pam_pwdb.so password required /lib/security/pam_cracklib.so password required /lib/security/pam_pwdb.so use_authtok nullok md5 shadow session required /lib/security/pam_pwdb.so |
For Further documentation and more details, there are several man pages you can read:
- adds identities for the authentication agent
- authentication agent
- authentication key pair generation
- secure shell client remote login program
- secure shell daemon