| Securing and Optimizing Linux: RedHat Edition -A Hands on Guide | ||
|---|---|---|
| Prev | Chapter 16. Software -Securties(commercial) | Next | 
For better security of your ssh2 server, you can configure it to use pam authentication. To do that, you must create the /etc/pam.d/ssh file.
Create the ssh file touch /etc/pam.d/ssh and add or change, if necessary:
| 
         #%PAM-1.0
         auth	        required     /lib/security/pam_pwdb.so shadow
         auth	        required     /lib/security/pam_nologin.so
         account	required     /lib/security/pam_pwdb.so
         password	required     /lib/security/pam_cracklib.so
         password	required     /lib/security/pam_pwdb.so use_authtok nullok md5 shadow
         session	required     /lib/security/pam_pwdb.so
          | 
For Further documentation and more details, there are several man pages you can read:
- adds identities for the authentication agent
- authentication agent
- authentication key pair generation
- secure shell client remote login program
- secure shell daemon