home

apps workflow notes dbconsole dbnotes Linux ULN vi cookbook
Installing the OS
UNLnotes Up2Date InstallationGuide Deployment Guide
SSH D
This is from how to secure a linux server
or
LinuxSecurityResource

1. Use lsof or a similar tool to determine what ports are listening on the computer.

lsof i

 

Don't allow root logins on your primary sshd port 22 (set PermitRootLogin to "no");

many automated tools run brute-force attacks on that. Set up a secondary port for root access that only works by shared keys, disallowing passwords:

  • Copy the sshd_config file to root_sshd_config, and change the following items in the new file:
    • Port from 22 to some other number, say 8899 (don't use this! make up your own!)
    • PermitRootLogin from "no" (you were supposed to set it to "no" for port 22, remember?) to "yes"
    • AllowUsers root add this line, or if it exists, change it to allow only root logins on this port
    • ChallengeResponseAuthentication no uncomment this line if it's commented out, and make sure it says "no" instead of "yes"
  • Test this command:

    /usr/sbin/sshd -D -f /etc/ssh/root_sshd_config

    and see if it works correctly -- try logging in from another computer (you must have already set up shared-key authentication between the two computers) using:

    ssh -p8899 root@my.remote.server

    and if so, control-C at the above (sshd) command to stop the sshd daemon, then add this to the end of /etc/inittab:

    rssh:2345:respawn:sshd -D -f /etc/ssh/root_sshd_config

  • Restart the init task: # init q This will run your "root ssh daemon" as a background task, automatically restarting it in case of failure.

 

 

4. Don't allow root logins on your primary sshd port 22 (set PermitRootLogin to "no"); many automated tools run brute-force attacks on that. Set up a secondary port for root access that only works by shared keys, disallowing passwords:
* Copy the sshd_config file to root_sshd_config, and change the following items in the new file:
o Port from 22 to some other number, say 8899 (don't use this! make up your own!)
o PermitRootLogin from "no" (you were supposed to set it to "no" for port 22, remember?) to "yes"
o AllowUsers root add this line, or if it exists, change it to allow only root logins on this port
o ChallengeResponseAuthentication no uncomment this line if it's commented out, and make sure it says "no" instead of "yes"
* Test this command:

sshd -D -f /etc/ssh/root_sshd_config

and see if it works correctly -- try logging in from another computer (you must have already set up shared-key authentication between the two computers) using:

ssh -p8899 root@my.remote.server

and if so, control-C at the above (sshd) command to stop the sshd daemon, then add this to the end of /etc/inittab:

rssh:2345:respawn:sshd -D -f /etc/ssh/root_sshd_config

* Restart the init task: # init q This will run your "root ssh daemon" as a background task, automatically restarting it in case of failure.