10 comments

  • enkrs 11 minutes ago
    If the argument for a password login is being able to log in from anywhere, just store a spare ssh key (password protected) in your gmail or similar that's reasonably safe and accessible from anywhere.

    But I'm having hard time imagining those "anywhere" machine scenarios. Strangers machines that you trust enough to connect to your servers, and are able to install putty or your preferred ssh client of choice on? Better just have SSH on your own phone and laptop.

  • sshine 54 minutes ago
    I only accept keys on non-standard SSH ports.

    Less spam traffic, easier to access.

    Rejecting passwords is just as much a convenience nowadays:

    I just don't have passwords on my remote machines any more.

  • sam_lowry_ 22 minutes ago
    I configure password login for root on on standard port for all servers I personally control. Moreover, they all have the same root password.

    Over the 20+ years, I witnessed a few security incidents. None was related to ssh, let alone a break in via a weak password.

    But I ran into many situations when I needed imediate access to the server and this setup saved my day, my money and my nerves.

  • robador 54 minutes ago
    I was just playing around with this problem. I ended up firewalling the SSH port for all but my personal IP, then have wireguard set up so I can use it from within my wireguard network. Works perfectly so far as long as I have my clients set up.
  • akdor1154 21 minutes ago
    I allow password from the internet only alongside a TOTP code.. Still gives me a backup in case of unforeseen situations but a step above plain password auth.
  • l0ng1nu5 52 minutes ago
    Why not use port knocking as well?
    • rwmj 39 minutes ago
      What's the best way to set up port knocking on a Fedora / Debian server? While not a security measure per se, it adds a layer of obfuscation which blocks random scanners.
  • timewizard 1 hour ago
    > This is something that I probably care about more than most people, because as a system administrator I want to be able to log in to my desktop even in quite unusual situations.

    If I understand correctly you can have your SSH key entirely on a Yubikey if you use PIV or OpenPGP.

    • pointlessone 1 hour ago
      Does every random system automatically picks up Yubikey? Does SSH on all platforms find that key?
    • denysvitali 1 hour ago
      Yes, this.

      GPG supports smartcards (yes, the plastic smartcards) since ages. The Yubikey will appear as a smartcard on GPG and will work on pretty much sny setup.

  • darthrupert 2 hours ago
    It can thwart a local keylogger from getting your password. But of course if you have a local keylogger, you're probably quite fucked already.

    But there's at least some "security in layers" benefit there.

  • nobunaga 2 hours ago
    So this person, as a system administrator, wants to be able to sacrifice security for his personal convenience so he can login from anywhere. Does not sound like a system administrator that actually prioritises the right things. Security, especially if its not your own system, should always come first.
    • iforgotpassword 1 hour ago
      You have to balance those two, because the only server that's 100% secure is the one that's powered off. Everyone does that differently. I don't see sshd with key-only auth as dangerous, but password login makes me uncomfortable. Do you drive down to the data center your server is in every time you want to access it?

      "I'm using VPN"

      Great now you moved the target from sshd to wireguard.

      • PhilipRoman 52 minutes ago
        >Great now you moved the target from sshd to wireguard

        I definitely agree with your general sentiment, but in this case wireguard has a much better designed protocol. No response to scans, waaaaay smaller attack surface, no deep integration with a shell that needs to be explicitly disabled depending on use case, no pile of obscure authentication options that you need to make sure to disable...

  • denysvitali 1 hour ago
    I don't agree with the arguments of the author: you can still use a Yubikey (or multiple Yubikeys as a backup) - which is a far more secure option than letting anyone on the internet guess an authentication factor that can be easily cloned (password).

    No matter your solution, but exposing password-based SSH on the internet is a very bad idea IMHO