[vox-tech] Securing SSH

Bill Broadley vox-tech@lists.lugod.org
Mon, 4 Aug 2003 18:30:42 -0700


I consider most of these steps pretty paranoid, since ssh is pretty
secure in the first place (at least the current version anyways).

Besides the things mentioned by other people:
	Do you have physical security?
	BIOS and GRUB/LILO passwords might help the casual physical attack
	Have only the required ports open, use nmap to verify (locally and
        remotely).
	You are fully patched right?
	All non-used user accounts closed
	All open accounts have NULL passwords (use ssh-keys for access)
	Do you have backups?
	Are they secure as well.
	Do you need encrypted swap?
	Encrypted FS?

On Fri, Aug 01, 2003 at 11:50:41AM -0700, Daniel Hurt wrote:
> 
> I know the title is kind of redundant, but I was curious if there is 
> anything beyond these couple of steps that I have taken to secure ssh?
> 
> First I have edited the /etc/securetty to contain only these entries:
> tty1
> tty2
> tty3
> tty4
> tty5
> tty6
> 
> This is to allow root to login from the local console only.  I have also 
> edited the sshd_conf file to disallow root logins.  This box is sitting 
> behind a router that only has port 22 forwarded to this machine and I have 
> setup the router so that it does not respond to ping request from the 
> outside world.  The final thing, I could think of is to set hosts.allow to 
> the certain IP’s that I might connect from, but I would like to connect 
> from anywhere to this machine.  Is there anything else that I might 
> consider to help keep the machine secure?
> _______________________________________________
> vox-tech mailing list
> vox-tech@lists.lugod.org
> http://lists.lugod.org/mailman/listinfo/vox-tech

-- 
Bill Broadley
Mathematics
UC Davis