There is ssh_config and sshd_config in /etc/ssh/ to set ssh security.
Are these two only needed for ssh root access?In other words I don't need them for a program such as firefox using ssh? Also, is it correct, if I'm not running a server I don't need sshd?
About enabling protocol 2, an rkhunter result showed me confusion. In sshd_config and ssh_config I had
with Protocol 1 commented out, yet rkhunter's results showed ssh protocol 1 running. Maybe this is malicious software overriding my settings.
I don't fully understand ssh_config and sshd_config. I read that setting
with a setting for using keys, disables the use of passwords in favor of keys. Is this correct, in that this doesn't mean no type of authentication at all?
These settings seem counter-intuitive.
Are these two only needed for ssh root access?
About enabling protocol 2, an rkhunter result showed me confusion. In sshd_config and ssh_config I had
Code:
Protocol 2
I don't fully understand ssh_config and sshd_config. I read that setting
Code:
PasswordAuthentication no
These settings seem counter-intuitive.