Security
- Use good passwords - at least 9 characters long, a mixture of alphanumeric mixed case and symbol characters. The password should be completely different from the password you use on any other system.
**Never use the same password across different systems !**-
NEVER copy
ayour SSH private keyanywhere!to systems that you do not control! The private key should remain in your .ssh directory on the system you generated itonand should be readable only by you. If you need to login from two systems such as a laptop and a workstation you can copy the key pair to both systems if you really trust both. - SSH key passphrases
shouldmust be as secure as otherpassowrds.passwords. - Never setup passphraseless ssh keys to allow unauthenticated login access between systems.
WARNING: Incorrectly configuring sshSSH keys can leave your accounts vulnerable to attack and, more importantly, can provide attackers with a trivial means to transferaccess theirremote attackssystems with potential legal consequences. It is your responsability to otherkeep systemsyour andSSH organizations.authentication secure.