Skip to main content

Security

  • Use good passwords - at least 9 characters long, a mixture of alphanumeric mixed case and symbol characters. The password should be completely different from the password you use on any other system.
  • ** Never use the same password across different systems !**
  • NEVER copy ayour SSH private key anywhere!to systems that you do not control! The private key should remain in your .ssh directory on the system you generated it on and should be readable only by you. If you need to login from two systems such as a laptop and a workstation you can copy the key pair to both systems if you really trust both.
  • SSH key passphrases shouldmust be as secure as other passowrds.passwords.
  • Never setup passphraseless ssh keys to allow unauthenticated login access between systems.

WARNING: Incorrectly configuring sshSSH keys can leave your accounts vulnerable to attack and, more importantly, can provide attackers with a trivial means to transferaccess theirremote attackssystems with potential legal consequences. It is your responsability to otherkeep systemsyour andSSH organizations.authentication secure.