Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
en:linux:ssh [2023/10/18 22:46] – gelöscht psycore | en:linux:ssh [2024/12/17 13:08] (current) – created psycore | ||
---|---|---|---|
Line 1: | Line 1: | ||
+ | {{tag> | ||
+ | ====== Backing up the sshd ====== | ||
+ | The pre-installed SSH daemon (sshd) is insecure in the basic configuration. To ensure greater protection, it is necessary to integrate a [[wp> | ||
+ | |||
+ | |||
+ | ===== 1.0 Key pair ===== | ||
+ | |||
+ | ==== 1.1 Create key pair ==== | ||
+ | |||
+ | |||
+ | Firstly, we create a key pair under Linux: | ||
+ | |||
+ | <code bash> | ||
+ | $ ssh-keygen -t ed25519 | ||
+ | Generating public/ | ||
+ | Enter file in which to save the key (/ | ||
+ | </ | ||
+ | |||
+ | We are asked to enter a password. This process is important, **because only the combination of key file and password** enable server access. | ||
+ | |||
+ | <code bash> | ||
+ | Enter passphrase (empty for no passphrase): | ||
+ | Enter same passphrase again: | ||
+ | Your identification has been saved in / | ||
+ | Your public key has been saved in / | ||
+ | The key fingerprint is: | ||
+ | 35: | ||
+ | </ | ||
+ | |||
+ | With '' | ||
+ | |||
+ | - rename it to '' | ||
+ | - move to the folder '' | ||
+ | - Set access authorisations | ||
+ | |||
+ | <code bash> | ||
+ | mv id_ed25519.pub .ssh/ | ||
+ | chmod 0700 .ssh | ||
+ | chmod 0600 .ssh/ | ||
+ | </ | ||
+ | |||
+ | We then load '' | ||
+ | |||
+ | ==== 1.2 Secure deletion of the private key ==== | ||
+ | |||
+ | **It is important, '' | ||
+ | |||
+ | <code bash>$ wipe id_ed25519 | ||
+ | Okay to WIPE 1 regular file ? (Yes/No) yes | ||
+ | Operation finished. | ||
+ | 1 file wiped and 0 special files ignored in 0 directories, | ||
+ | |||
+ | ===== 2.0 Putty Private Key ===== | ||
+ | |||
+ | Now we download [[http:// | ||
+ | |||
+ | Save this key with the '' | ||
+ | |||
+ | |||
+ | ===== Login test ===== | ||
+ | |||
+ | Now we test whether the connection is established with the generated key. To do this, we open putty.exe and enter the host name as usual. Before we now click on '' | ||
+ | |||
+ | ===== SSHd configuration ===== | ||
+ | |||
+ | Now we edit the SSHd configuration file <code bash> | ||
+ | |||
+ | <code text> | ||
+ | # choose a port above 1024 | ||
+ | Port 22 | ||
+ | |||
+ | # use protocol 2 ! | ||
+ | Protocol 2 | ||
+ | |||
+ | # deactivate RSAAuthentication | ||
+ | RSAAuthentication no | ||
+ | |||
+ | # activate PubkeyAuthentication | ||
+ | PubkeyAuthentication yes | ||
+ | |||
+ | # Don't read the user's ~/.rhosts and ~/.shosts files | ||
+ | IgnoreRhosts yes | ||
+ | |||
+ | # unwanted options | ||
+ | RhostsRSAAuthentication no | ||
+ | HostbasedAuthentication no | ||
+ | PermitEmptyPasswords no | ||
+ | PermitRootLogin no | ||
+ | PasswordAuthentication no | ||
+ | ChallengeResponseAuthentication no | ||
+ | </ | ||
+ | |||
+ | ===== SSHd restart ===== | ||
+ | |||
+ | <code bash>/ | ||
+ | |||
+ | ==== Hint ==== | ||
+ | |||
+ | The current SSH session is not closed. **To correct configuration errors, the current session should remain open until everything is working correctly!** |