| Securing and Optimizing Linux: RedHat Edition -A Hands on Guide | ||
|---|---|---|
| Prev | Chapter 16. Software -Securties(commercial) | Next |
For better security of your ssh2 server, you can configure it to use pam authentication. To do that, you must create the /etc/pam.d/ssh file.
Create the ssh file touch /etc/pam.d/ssh and add or change, if necessary:
#%PAM-1.0
auth required /lib/security/pam_pwdb.so shadow
auth required /lib/security/pam_nologin.so
account required /lib/security/pam_pwdb.so
password required /lib/security/pam_cracklib.so
password required /lib/security/pam_pwdb.so use_authtok nullok md5 shadow
session required /lib/security/pam_pwdb.so
|
For Further documentation and more details, there are several man pages you can read:
- adds identities for the authentication agent
- authentication agent
- authentication key pair generation
- secure shell client remote login program
- secure shell daemon