10-20-2009, 03:08 PM
Hello,
Ok bare with me here because this is my first tutorial.
Ok, let's start.
First find the configuration file for your SSH server.
It would normally be located in etc>ssh>sshd_config.
then follow these rules:
#1 Don't allow root to remote login. So change "PermitRootLogin yes" to "PermitRootLogin no"
#2 Limit the users or groups that can login in remotely. If these lines are not there, just add them to the text file.
AllowUsers me
AllowGroups mygroup
DenyUsers fuckface
DenyGroups fuckfacegroup
#3 Allow only Protocol 2.Protocol 1 is less secure.
Protocol 2
#4 Change the default port 22 to something higher like 2222
Port 2222
Those are the basic steps on making your SSH server a lot more secure. You could also add a firewall to know who is trying to connect to you. I use FireStarter because it is easy to use and quite user friendly. It blocks out all connections that I have not allowed through. Here is the link to the site: http://www.fs-security.com/
Hope this helped
Ok bare with me here because this is my first tutorial.
Ok, let's start.
First find the configuration file for your SSH server.
It would normally be located in etc>ssh>sshd_config.
then follow these rules:
#1 Don't allow root to remote login. So change "PermitRootLogin yes" to "PermitRootLogin no"
#2 Limit the users or groups that can login in remotely. If these lines are not there, just add them to the text file.
AllowUsers me
AllowGroups mygroup
DenyUsers fuckface
DenyGroups fuckfacegroup
#3 Allow only Protocol 2.Protocol 1 is less secure.
Protocol 2
#4 Change the default port 22 to something higher like 2222
Port 2222
Those are the basic steps on making your SSH server a lot more secure. You could also add a firewall to know who is trying to connect to you. I use FireStarter because it is easy to use and quite user friendly. It blocks out all connections that I have not allowed through. Here is the link to the site: http://www.fs-security.com/
Hope this helped