remote_ssh_support
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
remote_ssh_support [2016/04/30 11:37] – lucy | remote_ssh_support [2016/06/14 16:42] – lucy | ||
---|---|---|---|
Line 23: | Line 23: | ||
- | Phishing account | + | **Phishing account** |
The phishing account is a system account. Here is the [[technical_information|link]] that describes the background info (check under accounts).If you want to harden access from remote you can either restrict access in SSH or disable SSH password authentication for that user. | The phishing account is a system account. Here is the [[technical_information|link]] that describes the background info (check under accounts).If you want to harden access from remote you can either restrict access in SSH or disable SSH password authentication for that user. | ||
Line 34: | Line 35: | ||
Match user phishing | Match user phishing | ||
PasswordAuthentication no | PasswordAuthentication no | ||
+ | |||
+ | |||
+ | **Warning: don't change anything on the system** | ||
+ | |||
+ | Please note that any changes to the system (changing host file, modifying htaccess etc.) will most likely have an impact on the functionality of LUCY. We cannot give support to systems that have been altered. | ||
remote_ssh_support.txt · Last modified: 2019/07/25 12:49 by 127.0.0.1