Setting up 2FA for SSH in Debian

Introduction Prerequisitess Install Google’s PAM Intialization Configuring PAM Configuring OpenSSH Making SSH Aware of MFA Introduction One of the secure login method in linux based system is Key Based Authentication. Key authentication provides cryptographic strength that even extremely long passwords can not offer. With SSH, public key authentication improves security considerably as it frees the users from remembering complicated passwords (or worse yet, writing them down). User has private key in his laptop / desktop and public key will be pushed to destination server. [Read More]

Prevent DOS using iptables

Preface A major problem facing by mail server admin is DOS (Deniel Of Service) attack. Hackers will try to mess up with the most popular ports of a UNIX/LINUX machines. We can prevent this my writing an IPTABLE rule in the server. The working is ,if some one is trying make connection continuously through a specified port the rule will block the IPADDRESS permanently. Here I am stating the securing of PORT 25 (SMTP) here you can use your own [Read More]