On Fri, Feb 21, 2020 at 07:00:51 -0500, Bob Goodwin bobgoodwin@fastmail.us wrote:
I've been reading the thread about detecting hack attempts and I am interested in in setting up "key based authentication" as described [perhaps] in "https://docs.fedoraproject.org/en-US/Fedora/14/html/Deployment_Guide/s2-ssh-..."
Suggestions, thoughts?
I like to require both a key and a password. (Key first to prevent password guessing without access to a valid key.) I use a seperate key for each device. It's not quite 2 factor, since the keys can be copied from a compromised device. But it still provides protection in some cases where just using a password could fail.