Last month, the SNIA Networking Storage Forum
(NSF) took a different perspective on the storage networking technologies we
cover by discussing technologies and practices that you may want to reconsider.
The webcast was called “Storage
Technologies & Practices Ripe for Refresh.” I encourage you to watch it on-demand. It was an interesting session where my
colleagues Eric Hibbard, John Kim, and Alex McDonald explored security
problems, aging network protocols, and NAS protocols. It was quite popular. In
fact, we’re planning more in this series, so stay tuned.
The audience asked us some great questions during the live
event and as promised, here are our answers:
Q. How can I tell if my SSH
connections are secure?
A. Short of doing a security
scan of a server’s SSH port (typically TCP/IP port 22) it can be difficult to
know if your connection is secure. In general, the following are
recommended:
- Use SSH version 2 or later
- Disable server SSH root logins
- Authenticate clients to servers by using SSH key pairs (don’t use the same keys on multiple systems)
- Change the default SSH port
- Filter connections using TCP wrappers or similar network filtering
- Set idle timeouts that close SSH connections. If you don’t need SSH on a server, make sure it is disabled.
Leave a Reply