ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    SSH Hardening

    Scheduled Pinned Locked Moved Solved IT Discussion
    sshsshconfighardeningsecurityfail2banjumpbox
    16 Posts 5 Posters 1.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • JaredBuschJ
      JaredBusch @stacksofplates
      last edited by

      @stacksofplates first hit on a new one I just setup. The system that prompted me to make this post in fact. I forgot to install whois, that is fixed now.

      D62D138F-5B34-42D6-8FC2-EB9B94A31FF0.jpeg

      1 Reply Last reply Reply Quote 2
      • JaredBuschJ
        JaredBusch @stacksofplates
        last edited by

        @stacksofplates said in SSH Hardening:

        Here was a topic I had posted a while back

        Good post, but total overkill to me. What is the point of the connection from an IT point of view if not to manage the system? Yet your hardening restricts any administration except at the local console.

        I log in to systems via SSH in order to reboot them, or update WTF ever application they are running. Tasks that your security will stop.

        DustinB3403D stacksofplatesS 2 Replies Last reply Reply Quote 0
        • DustinB3403D
          DustinB3403 @JaredBusch
          last edited by

          @JaredBusch said in SSH Hardening:

          @stacksofplates said in SSH Hardening:

          Here was a topic I had posted a while back

          Good post, but total overkill to me. What is the point of the connection from an IT point of view if not to manage the system? Yet your hardening restricts any administration except at the local console.

          I log in to systems via SSH in order to reboot them, or update WTF ever application they are running. Tasks that your security will stop.

          You mean you don't want to drive to every client site/data center/home office and update things from the comfort of their own space?

          1 Reply Last reply Reply Quote 0
          • M
            marcinozga
            last edited by

            Install Lynis, it'll audit your SSH config and suggest areas to improve.

            1 Reply Last reply Reply Quote 1
            • stacksofplatesS
              stacksofplates @JaredBusch
              last edited by

              @JaredBusch said in SSH Hardening:

              @stacksofplates said in SSH Hardening:

              Here was a topic I had posted a while back

              Good post, but total overkill to me. What is the point of the connection from an IT point of view if not to manage the system? Yet your hardening restricts any administration except at the local console.

              I log in to systems via SSH in order to reboot them, or update WTF ever application they are running. Tasks that your security will stop.

              That was just a jump box. It was a way to get in to other stuff to do the admin. It is overkill for you just had ideas if you wanted them.

              JaredBuschJ 1 Reply Last reply Reply Quote 1
              • stacksofplatesS
                stacksofplates @JaredBusch
                last edited by

                @JaredBusch said in SSH Hardening:

                @stacksofplates said in SSH Hardening:

                Also fail2ban isn't going to do anything with only key auth. The access gets denied before it has a chance to do anything.
                

                Actually, it still catches it. I tested that.

                At least on Fedora using systemd it does.

                Ah they must have changed it. It used to be SSH denied the request before it ever hit PAM so fail2ban did nothing.

                stacksofplatesS 1 Reply Last reply Reply Quote 1
                • stacksofplatesS
                  stacksofplates @stacksofplates
                  last edited by

                  @stacksofplates said in SSH Hardening:

                  @JaredBusch said in SSH Hardening:

                  @stacksofplates said in SSH Hardening:

                  Also fail2ban isn't going to do anything with only key auth. The access gets denied before it has a chance to do anything.
                  

                  Actually, it still catches it. I tested that.

                  At least on Fedora using systemd it does.

                  Ah they must have changed it. It used to be SSH denied the request before it ever hit PAM so fail2ban did nothing.

                  I also could have set it up wrong but I thought I remembered someone else saying the same thing on stack exchange or somewhere.

                  1 Reply Last reply Reply Quote 0
                  • JaredBuschJ
                    JaredBusch @stacksofplates
                    last edited by

                    @stacksofplates said in SSH Hardening:

                    @JaredBusch said in SSH Hardening:

                    @stacksofplates said in SSH Hardening:

                    Here was a topic I had posted a while back

                    Good post, but total overkill to me. What is the point of the connection from an IT point of view if not to manage the system? Yet your hardening restricts any administration except at the local console.

                    I log in to systems via SSH in order to reboot them, or update WTF ever application they are running. Tasks that your security will stop.

                    That was just a jump box. It was a way to get in to other stuff to do the admin. It is overkill for you just had ideas if you wanted them.

                    Definitely a good post with good ideas.

                    1 Reply Last reply Reply Quote 0
                    • JaredBuschJ
                      JaredBusch @JaredBusch
                      last edited by

                      @JaredBusch said in SSH Hardening:

                      [sshd]
                      # To use more aggressive sshd modes set filter parameter "mode" in jail.local:
                      # normal (default), ddos, extra or aggressive (combines all).
                      # See "tests/files/logs/sshd" or "filter.d/sshd.conf" for usage example and details.
                      #mode   = normal
                      

                      Note, the commented out #mode = normal. If you change that to ddos, it will also cause fail2ban to log failed attempts to the disabled root account, and valid users with invalid, or no, key.

                      1 Reply Last reply Reply Quote 3
                      • JaredBuschJ
                        JaredBusch
                        last edited by

                        So I set this up again on a new jump box today.

                        SSH attempts did not log until I changed the mode to ddos

                        1 Reply Last reply Reply Quote 1
                        • 1 / 1
                        • First post
                          Last post