SSH configuration summary (was Re: Rookit infections: AARRGH!)

Larry Cook lcook at sybase.com
Wed May 25 16:49:00 EDT 2005


This thread was very timely, as I wanted to set up my system for
remote access using SSH.  Here is a summary of the advice for a
secure SSH configuration that I gathered from the thread.  I've
included the specific /etc/ssh/sshd_config file entries:

* Disable SSH v1 protocol, only use SSH v2 protocol
	Protocol 2

* Disable passwords, use DSA keys with passphrase
	PasswordAuthentication no

* Disable root access, use sudo for audit trail
	PermitRootLogin no

* Change SSH port number
	Port 12345

* Only allow trusted IPs
	(I don't see this ability in SSH.)

I've done all but the last one, since I couldn't find a way to
configure it with SSH.  Maybe the intent was to do it with
iptables.

Is there anything I missed?

Given the above, what are the security risks?

Thanks,
Larry



More information about the gnhlug-discuss mailing list