Skip to main content

Hardening SSH Security in Linux


SSH is a popular network protocol used to access remote computers through certain networks or the internet. OpenSSH is an application that provides SSH accessibility for a computer or server. A common method used to start a communication with SSH access is by providing a username and password before a secured connection is established. This method is not really safe because you provide credentials in plain text and transfer them through the network. It also makes it any scumbag individuals be easier to guess your password or perform a brute force attack in order to gain your server access. There are several possible ways that I think can be used for hardening your SSH security.
  1. Disable root access
  2. Change SSH port number
  3. Utilize RSA authentication
  4. Disable plain password login

Disable root access

1) Before you disable the root access, you need to make sure that there is another user account on your remote computer.

2) Create a new user as needed.
$ adduser youruser
3) Edit SSH configuration in /etc/ssh/sshd_config. Set new values for several following properties.
PermitRootLogin no
AllowUsers youruser
AllowUsers property is optional. It is used only for limiting access to certain users. You can add more users by separating it using space in the value.

4) Restart SSH service.
$ service sshd restart

Change SSH Port Number

You can change Port property other than 22.

Utilize RSA Authentication

1) Generate private and public keys in your local computer. I prefer to use PuTTYgen because it can generate not only an OpenSSH-compatible key but also a PuTTY-compatible key. PuTTY is a common application for remote access available for Windows. It needs a certain format of the private key with .PPK extension. PuTTYgen is included in PuTTY installation.

2) Open PuTTYgen. Set the number of bits in the generated key (2048, 4096, etc). Click "Generate".

3) After the process was completed, you can get 4 types of keys. First, in the big text box, it is an OpenSSH-compatible public key. Copy the content, paste it to a text editor (e.g. Notepad) and save it as id_rsa.pub. Second, you possibly need to fill in the key passphrase. It adds more security to your private key. Click "Save public key" and save it as id_rsa.putty.pub. Third, click "Save private key" and save as id_rsa.ppk. It's PuTTY-compatible private key. Fourth, choose the "Conversion" menu then choose the "Export OpenSSH key". It will generate an OpenSSH-compatible private key and save it as id_rsa.


4) Now, back to the OpenSSH configuration in the remote server. Set new values for several following properties.
RSAAuthentication yes
PubkeyAuthentication yes
AuthorizedKeysFile %h/.ssh/authorized_keys
The last property means that the OpenSSH application will check any allowed public keys stored in the user authorized_keys file.

5) Copy your user OpenSSH-compatible public key content and append it to /home/[yur_user]/.ssh/authorized_keys. The .ssh directory should be owned by your user and set its mode to 0700 for security while the authorized_keys mode should be 0600.

6) Back to the local computer and open your PuTTY application. On the Session menu, insert your remote computer address with its user and port. Then, go to Auth menu, choose your PuTTY-compatible private key. Then, back to the Session menu and save your configuration.

Disable plain password login

Before you implement this configuration, you must make sure that the previous process is working. By setting PasswordAuthentication value to "no" will make your server can be accessed only by RSA authentication.

If you think this article is useful, you can share it. Or, if you have any suggestions or questions, please leave them in the comment below.

Comments

Popular posts from this blog

Rangkaian Sensor Infrared dengan Photo Dioda

Keunggulan photodioda dibandingkan LDR adalah photodioda lebih tidak rentan terhadap noise karena hanya menerima sinar infrared, sedangkan LDR menerima seluruh cahaya yang ada termasuk infrared. Rangkaian yang akan kita gunakan adalah seperti gambar di bawah ini. Pada saat intensitas Infrared yang diterima Photodiode besar maka tahanan Photodiode menjadi kecil, sedangkan jika intensitas Infrared yang diterima Photodiode kecil maka tahanan yang dimiliki photodiode besar. Jika  tahanan photodiode kecil  maka tegangan  V- akan kecil . Misal tahanan photodiode mengecil menjadi 10kOhm. Maka dengan teorema pembagi tegangan: V- = Rrx/(Rrx + R2) x Vcc V- = 10 / (10+10) x Vcc V- = (1/2) x 5 Volt V- = 2.5 Volt Sedangkan jika  tahanan photodiode besar  maka tegangan  V- akan besar  (mendekati nilai Vcc). Misal tahanan photodiode menjadi 150kOhm. Maka dengan teorema pembagi tegangan: V- = Rrx/(Rrx + R2) x Vcc V- = 150 / (150+10) x Vcc V- = (150/160) x 5

Configuring Swap Memory on Ubuntu Using Ansible

If we maintain a Linux machine with a low memory capacity while we are required to run an application with high memory consumption, enabling swap memory is an option. Ansible can be utilized as a helper tool to automate the creation of swap memory. A swap file can be allocated in the available storage of the machine. The swap file then can be assigned as a swap memory. Firstly, we should prepare the inventory file. The following snippet is an example, you must provide your own configuration. [server] 192.168.1.2 [server:vars] ansible_user=root ansible_ssh_private_key_file=~/.ssh/id_rsa Secondly, we need to prepare the task file that contains not only the tasks but also some variables and connection information. For instance, we set /swapfile  as the name of our swap file. We also set the swap memory size to 2GB and the swappiness level to 60. - hosts: server become: true vars: swap_vars: size: 2G swappiness: 60 For simplicity, we only check the exi

Beautiful Rain (JDorama)

Saya selalu tertarik dengan film-film inspirasional, baik movie atau pun serial drama. Akhir-akhir ini saya tertarik untuk menonton drama serial jepang. Saya googling dengan keyword "inspirational japan dorama" kemudian saya dapati sejumlah review  beberapa film bagus dari sejumlah netizen.  Salah satu yang kemudian saya tonton adalah Beautiful Rain . Setiap episode film ini selalu membuat saya sangat terharu sampai meneteskan air mata. :' Yah, ini mungkin saja karena saya yang terlalu melankolis. Hahaha. Ini sedikit review dari saya tentang film ini.

API Gateway Using KrakenD

The increasing demands of users for high-quality web services create the need to integrate various technologies into our application. This will cause the code base to grow larger, making maintenance more difficult over time. A microservices approach offers a solution, where the application is built by combining multiple smaller services, each with a distinct function. For example, one service handles authentication, another manages business functions, another maintains file uploads, and so on. These services communicate and integrate through a common channel. On the client side, users don't need to understand how the application is built or how it functions internally. They simply send a request to a single endpoint, and processes like authentication, caching, or database querying happen seamlessly. This is where an API gateway is effective. It handles user requests and directs them to the appropriate handler. There are several tools available for building an API gateway, su

Deliver SaaS According Twelve-Factor App

If you haven't heard of  the twelve-factor app , it gives us a recommendation or a methodology for developing SaaS or web apps structured into twelve items. The recommendation has some connections with microservice architecture and cloud-native environments which become more popular today. We can learn the details on its website . In this post, we will do a quick review of the twelve points. One Codebase Multiple Deployment We should maintain only one codebase for our application even though the application may be deployed into multiple environments like development, staging, and production. Having multiple codebases will lead to any kinds of complicated issues. Explicitly State Dependencies All the dependencies for running our application should be stated in the project itself. Many programming languages have a kind of file that maintains a list of the dependencies like package.json in Node.js. We should also be aware of the dependencies related to the pla

Resize VirtualBox LVM Storage

VirtualBox is a free solution to host virtual machines on your computer. It provides configuration options for many components on our machine such as memory, storage, networking, etc. It also allows us to resize our machine storage after its operating system is installed. LVM is a volume manager in a Linux platform that helps us to allocate partitions in the system and configure the storage size that will be utilized for a specific volume group. There are some points to be noticed when we work with LVM on VirtualBox to resize our storage. These are some steps that need to be performed. 1. Stop your machine before resizing the storage. 2. Set new storage size using GUI by selecting " File > Virtual Media Manager > Properties " then find the desired virtual hard disk name that will be resized. OR , by running a CLI program located in " Program Files\Oracle\VirtualBox\VBoxManage.exe ".  cd "/c/Program Files/Oracle/VirtualBox" ./VBoxManage.exe list