While ssh is pretty secure, your should consider making it even more secure, by adding some of these steps.
- Use keys instead of passwords
- Disable login as root
- Install denyhosts
- Change your ssh port
- Configure a firewall (iptables)
Caution: Whenever making changes to your sshd.config file, be certain that you have an active shell session in case you’ve made a fatal syntax error. After restarting sshd, log in from another session to test it before terminating your active terminal session.
Passwords are bad - use keys
Passwords are always a kind of obscure security mechanism. A better and certainly more secure mechanism is to use ssh keys for all users. If ypu want to know how to generate a new user with his own key, have a look at this guide.
To disable Password-based Login log in to your instance and edit the ssh daemon configuration file:
sudo nano /etc/ssh/sshd_config
Find the line
and change it to
Don’t forget to restart sshd:
sudo service ssh restart
Disable Root Login
One of the biggest security holes you could open on your server is to allow directly logging in as root through ssh, because anyone can attempt to brute force your root password. It’s much better to have a separate account that you regularly use and simply sudo to root when necessary. You should make sure that you have a regular user account and that you can su or sudo to root from it.
We need to edit the sshd_config file, which is the main configuration file for the sshd service.
sudo nano /etc/ssh/sshd_config
Find this section in the file, containing the line with “PermitRootLogin” in it. Set it to “no” to disable logging in through ssh as root.
You could restrict the access via ssh to certain users. I highly recommend that.
AllowUsers user1, user2, user3
And finally restart your ssh service
sudo service ssh restart
DenyHosts is a security tool that monitors server access logs to prevent brute force attacks It works by banning IP addresses that exceed a certain number of failed login attempts.
DenyHosts is very easy to install:
sudo apt-get install denyhosts
After you install DenyHosts, make sure to whitelist your own IP address. Skipping this step will put you at risk of locking yourself out of your own machine.
Open up the list of allowed hosts allowed on your server:
sudo nano /etc/hosts.allow
Under the description, add in any IP addresses that cannot afford to be banned from the server; you can write each one on a separate line, using this format:
After making any changes, be sure to restart DenyHosts so that the new settings take effect on your virtual private server:
sudo service denyhosts restart
DenyHosts is ready use as soon as the installation is over, but if you want to customize DenyHosts, you can make the changes within the DenyHost configuration file:
sudo nano /etc/denyhosts.conf
Change your ssh port
There are many discussions on the web about why changing your ssh from the default 22 to something else is a good or bad idea. Personally I think it is a good thing, because it adds a small security layer to the system. It is just like keeping your phone number out of the white pages. It won’t someone who really wants to call your doing that, but it will keep the kiddies away.
Changing your port has some upsides:
- Brute Force attack on port 22 are useless (Script Kiddies)
- It reduces the impact on your log files
And also some downsides:
- It can be a pain to explain other users that they can’t use the default port and how to change that
- Some restrictive outgoing firewalls are blocking non standard ports and only allow connections to for example 22, 25, 80, 443
I think if a port change causes you even some trouble, it is probably not worth the effort because there are far more effictive ways to protect your server.
If you do move away from 22, make sure it is below 1024. Under most Unix-a-like setups in their default config, only root users can listen on ports below 1024, but any user can listen on the higher ports. Running ssh on a higher port increases the chance of a rogue (or hacked) user managing to compromise your SSH daemon. You can find a list of known port numbers here
So how to do it? Just edit the line “Port 22” in your /etc/ssh/sshd_config file
Optional: Set up a Firewall (iptables)
You should be pretty save right now, but what about us paranoid people, who believe that the NSA is looking into everything? Oh wait, they are. Maybe it is a good idea to add another line of defense: An iptables firewall. I would not recommend this if your server is running on EC2, because amazon already has very easy to handle firewall their so called Security Groups builtin.
Check your default firewall rules by entering the following command:
sudo iptables -L
Have a look at the output. If you haven’t implemented any rules yet, you should see an empty ruleset:
Chain INPUT (policy ACCEPT) target prot opt source destination Chain FORWARD (policy ACCEPT) target prot opt source destination Chain OUTPUT (policy ACCEPT) target prot opt source destination
First you need to create a configuration file for your firewall:
sudo nano /etc/iptables.firewall.rules
Copy and paste the rules shown below in to the iptables.firewall.rules file you just created.
*filter # Allow all loopback (lo0) traffic and drop all traffic to 127/8 that doesn't use lo0 -A INPUT -i lo -j ACCEPT -A INPUT -d 127.0.0.0/8 -j REJECT # Accept all established inbound connections -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT # Allow all outbound traffic - you can modify this to only allow certain traffic -A OUTPUT -j ACCEPT # Allow HTTP and HTTPS connections from anywhere (the normal ports for websites and SSL). -A INPUT -p tcp --dport 80 -j ACCEPT -A INPUT -p tcp --dport 443 -j ACCEPT # Allow SSH connections # # The -dport number should be the same port number you set in sshd_config # -A INPUT -p tcp -m state --state NEW --dport 22 -j ACCEPT # Allow ping -A INPUT -p icmp -j ACCEPT # Log iptables denied calls -A INPUT -m limit --limit 5/min -j LOG --log-prefix "iptables denied: " --log-level 7 # Drop all other inbound - default deny unless explicitly allowed policy -A INPUT -j DROP -A FORWARD -j DROP COMMIT
By default, the this will allow traffic to the following services and ports: HTTP (80), HTTPS (443), SSH (22), and ping. All other ports will be blocked.
Now let’s activate the firewall rules:
sudo iptables-restore < /etc/iptables.firewall.rules
Check your firewall rules again:
sudo iptables -L
It should return this:
Chain INPUT (policy ACCEPT) target prot opt source destination ACCEPT all -- anywhere anywhere REJECT all -- anywhere 127.0.0.0/8 reject-with icmp-port-unreachable ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED ACCEPT tcp -- anywhere anywhere tcp dpt:http ACCEPT tcp -- anywhere anywhere tcp dpt:https ACCEPT tcp -- anywhere anywhere state NEW tcp dpt:ssh ACCEPT icmp -- anywhere anywhere LOG all -- anywhere anywhere limit: avg 5/min burst 5 LOG level debug prefix "iptables denied: " DROP all -- anywhere anywhere Chain FORWARD (policy ACCEPT) target prot opt source destination DROP all -- anywhere anywhere Chain OUTPUT (policy ACCEPT) target prot opt source destination ACCEPT all -- anywhere anywhere
Finally you have to make sure that this configuration is loaded on startup. Start by creating a new script with the following command:
sudo nano /etc/network/if-pre-up.d/firewall
Copy and paste this lines in to the file you just created:
#!/bin/sh /sbin/iptables-restore < /etc/iptables.firewall.rules
Set the script’s permissions to executable:
sudo chmod +x /etc/network/if-pre-up.d/firewall
And you are done! Remember, you’ll need to edit the firewall rules later if you install other software or services. It can be a pain to look into configuration files of new serivices just to recognize hours later, that you just have to open a port at iptables.
Are we really done now? Even more paranoid people could have a look into SELinux.