Differences
This shows you the differences between two versions of the page.
Next revision | Previous revision | ||
en:linux:ssh [2023/10/18 22:41] – angelegt psycore | en:linux:ssh [2024/12/17 13:08] (current) – created psycore | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== | + | {{tag> |
+ | ====== | ||
- | The pre-installed SSH daemon (sshd) is insecure in the basic configuration. To ensure greater protection, it is necessary to integrate a [[wpde>Asymmetrisches_Kryptosystem|key authentication]]. | + | The pre-installed SSH daemon (sshd) is insecure in the basic configuration. To ensure greater protection, it is necessary to integrate a [[wp>Public-key_cryptography|to integrate |
- | ===== Create key pair ===== | + | ===== 1.0 Key pair ===== |
- | First, we create a key pair under Linux: | + | ==== 1.1 Create key pair ==== |
+ | |||
+ | |||
+ | Firstly, we create a key pair under Linux: | ||
+ | |||
+ | <code bash> | ||
+ | $ ssh-keygen -t ed25519 | ||
+ | Generating public/ | ||
+ | Enter file in which to save the key (/ | ||
+ | </ | ||
+ | |||
+ | We are asked to enter a password. This process is important, **because only the combination of key file and password** enable server access. | ||
<code bash> | <code bash> | ||
- | $ ssh-keygen -t rsa -b 4096 | ||
- | Generating public/ | ||
- | Enter file in which to save the key (/ | ||
Enter passphrase (empty for no passphrase): | Enter passphrase (empty for no passphrase): | ||
Enter same passphrase again: | Enter same passphrase again: | ||
- | Your identification has been saved in / | + | Your identification has been saved in / |
- | Your public key has been saved in / | + | Your public key has been saved in / |
The key fingerprint is: | The key fingerprint is: | ||
35: | 35: | ||
</ | </ | ||
- | **Be sure to enter a password, otherwise you can access the server just by possessing the private key!** | ||
- | We rename id_rsa.pub to authorised_keys and download id_rsa locally to our computer. **It is important to delete id_rsa securely afterwards!** (if necessary install wipe with //apt-get install wipe//) | + | With '' |
- | <code bash>$ wipe id_rsa | + | - rename it to '' |
- | Okay to WIPE 1 regular file ? (Yes/No) yes | + | - move to the folder '' |
- | Operation finished. | + | |
- | 1 file wiped and 0 special files ignored in 0 directories, | + | |
- | + | ||
- | We repeat the process with all users who should have access | + | |
- | + | ||
- | Set modes: | + | |
<code bash> | <code bash> | ||
+ | mv id_ed25519.pub .ssh/ | ||
chmod 0700 .ssh | chmod 0700 .ssh | ||
chmod 0600 .ssh/ | chmod 0600 .ssh/ | ||
</ | </ | ||
- | ===== Putty Private Key ===== | + | We then load '' |
- | Now we download [[http:// | + | ==== 1.2 Secure deletion of the private key ==== |
- | Diesen Key mit der .ppk Endung brauchen wir zum späteren Login für putty. | + | **It is important, '' |
+ | <code bash>$ wipe id_ed25519 | ||
+ | Okay to WIPE 1 regular file ? (Yes/No) yes | ||
+ | Operation finished. | ||
+ | 1 file wiped and 0 special files ignored in 0 directories, | ||
- | ===== Login Test ===== | + | ===== 2.0 Putty Private Key ===== |
- | Nun testen wir, ob die Verbindung mit dem erzeugten Schlüssel zustande kommt. Dazu öffnen wir putty.exe | + | Now we download [[http:// |
- | ===== sshd Konfiguration ===== | + | Save this key with the '' |
- | Nun bearbeiten wir die sshd Konfigurationsdatei | + | |
+ | ===== Login test ===== | ||
+ | |||
+ | Now we test whether the connection is established with the generated key. To do this, we open putty.exe and enter the host name as usual. Before we now click on '' | ||
+ | |||
+ | ===== SSHd configuration ===== | ||
+ | |||
+ | Now we edit the SSHd configuration file < | ||
<code text> | <code text> | ||
- | # Hier ist es sinnvoll einen Port oberhalb von 1024 zu nehmen | + | # choose a port above 1024 |
Port 22 | Port 22 | ||
- | # Unbedingt Protokoll | + | # use protocol |
Protocol 2 | Protocol 2 | ||
- | # RSAAuthentication | + | # deactivate |
RSAAuthentication no | RSAAuthentication no | ||
- | # PubkeyAuthentication | + | # activate |
PubkeyAuthentication yes | PubkeyAuthentication yes | ||
Line 68: | Line 83: | ||
IgnoreRhosts yes | IgnoreRhosts yes | ||
- | # Wollen wir nicht | + | # unwanted options |
RhostsRSAAuthentication no | RhostsRSAAuthentication no | ||
HostbasedAuthentication no | HostbasedAuthentication no | ||
PermitEmptyPasswords no | PermitEmptyPasswords no | ||
- | + | PermitRootLogin no | |
- | # Wollen wir erst recht nicht | + | PasswordAuthentication no |
- | PasswordAuthentication no #UNBEDINGT AUSKOMMENTIEREN UND AUF NO SETZEN!!!! | + | |
ChallengeResponseAuthentication no | ChallengeResponseAuthentication no | ||
</ | </ | ||
- | ===== Restart sshd ===== | + | ===== SSHd restart |
<code bash>/ | <code bash>/ | ||
- | ==== Note ==== | + | ==== Hint ==== |
- | + | ||
- | The current SSH session is not closed. **To correct configuration errors, the current session should remain open until everything is working properly!** | + | |
- | + | ||
- | ===== Copyright and notes ===== | + | |
- | + | ||
- | © by [[psycore]] 2020 | + | |
- | The author accepts no liability for any damage resulting from the use of this tutorial. This tutorial is written to the best of my knowledge and belief. The distribution of this tutorial | + | The current SSH session is not closed. **To correct configuration errors, |