I REALLY like secure shell (SSH) for remote access to linux machines. You can do more than just a “telnet” like remote shell with it. (Port forwarding.) However, the default configuraton for the openssh-server is sometimes a bit less tight than I would like. For that reason on a new install, I usually like to make a few changes. I don’t know if I’ve mentioned this before, but I haven’t devoted a post JUST to this, so… here we go.
Under mandriva, the config file for the openssh server is at /etc/ssh/sshd_config First off, I like to make sure that just version 2 of the SSH protocol is used. This may break compatiblity with older clients that don’t support version 2. In a nutshell, v. 2 is a more secure implemenation
, and in my case, I don’t use anything that doesn’t support version 2… so… the following gets changed in the sshd_config – protocol 2,1 is commented out and protocol 2 added.
Next, I like to make sure that root login is disabled…
After all, every system has a root user, why make it a bit easier for someone to brute force their way in?
I also like to setup a group called sshusers and limit access to just those that need to remotely get in.
This way if I have a lame test account with an equally lame password, it can’t be remotely exploited this way (unless I’m dumb enough to add them to sshusers…)
The AllowUsers directive is another way to do this…
AllowUsers user1, user2, user3
These are just a couple steps you can take to tighten up your ssh server setup. For more on SSH usage and configuration you might consult the manual (man) pages, or may I suggest SSH, The Secure Shell: The Definitive Guide
Related PostsRelated Posts
- Network Security guide for the home or small business network - Part 6 - Secure your services This one is going to be tougher. Of what we've looked at so far this will probably take more work and learning than any of the others. The good news is, depending on your situation you may need to do less here. IF you have decided that your pc (or......
- Denyhosts as an added defence to ssh server A couple days ago I had a brief article on the vandals banging away at the door of my ssh server. Like I said, I've, at times, been fairly smug abou the futility of their actions, but.... the persistance concerns me. Let me be more specific, I keep a fairly......
- Apple Quicktime and OS X updates to patch multiple security vulnerabilities Apple has released Quicktime v. 7.1 for both Windows and OS X to address about 12 vulnerabilities. It looks as though all of the vulnerabilities were related to either a specially crafted images or movies (a variety of formats...) Upgrade or use another viewer... Affected file formats are.... Jpegs, Flashpix,......
- Comparison Between Free Of Charge And Paid Web Comparison between free of charge and paid Web security software has turn into a main subject of discussion amongst probably the most of all computer users recently. Numerous people who have employed both free of charge as well as paid Web security software place their strong opinions. Although many people......
- How To Secure Your Wordpress Blog Security is always a major concern of bloggers and online business owners using a wordpress platform. Wordpress developers also emphasize a lot on security in every upgrade. However, even then vulnerabilities still occur. It can be your fault or your Web host fault. Before a hacker breaks into your wordpress......
- Dreamhost Promo Code For 2011 We all know about Dreamhost one of the best web hosting provider in the world, when compared to other low quality hosting providers. Dreamhost is better in terms of features, support, reliability. It is also one of the fastest growing hosting platform which has about 800K+ web sites hosted online.......
- 10 things to do before hooking a Linux PC up to the net
- Vandals banging on the door of ssh….
- SSH tips and tricks.
- VNC or Tightvnc for remote pc access
- Network Security guide for the home or small business network – Part 6 – Secure your services