gioia://news
  • Communities
  • Create Post
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
zquestz@lemm.ee to Linux@lemmy.mlEnglish · 2 years ago

SSH Hardening with ssh-audit

thoughts.greyh.at

external-link
message-square
13
fedilink
116
external-link

SSH Hardening with ssh-audit

thoughts.greyh.at

zquestz@lemm.ee to Linux@lemmy.mlEnglish · 2 years ago
message-square
13
fedilink
Today I explored ssh-audit, a tool designed to audit SSH configurations. Although it’s an excellent tool, I found the hardening guides somewhat lacking. Hence, I decided to write a detailed walkthrough, ensuring the ssh/sshd configurations are easily readable.
alert-triangle
You must log in or register to comment.
  • taaz@biglemmowski.win
    link
    fedilink
    English
    arrow-up
    15
    ·
    edit-2
    2 years ago

    Also this: https://words.filippo.io/ssh-whoami-filippo-io/

    • zquestz@lemm.eeOP
      link
      fedilink
      English
      arrow-up
      2
      ·
      2 years ago

      Fun, I didn’t know about this. =)

  • blarp@lemmy.ml
    link
    fedilink
    English
    arrow-up
    10
    ·
    edit-2
    2 years ago

    deleted by creator

  • RegalPotoo@lemmy.world
    link
    fedilink
    English
    arrow-up
    9
    arrow-down
    2
    ·
    2 years ago

    Cool,.but from the post it seems like all it does is:

    • Recommend disabling old algorithms, which you would have already done if you followed a modern hardening guide like https://infosec.mozilla.org/guidelines/openssh
    • Detect if you are running a known-vulnerable version of OpenSSH, which wouldn’t be an issue if you keep good patch hygiene and install your SSH server through you operating systems’ package manager

    So what’s the point? Who is this for?

    • jwhardcastle@dmv.social
      link
      fedilink
      English
      arrow-up
      15
      arrow-down
      1
      ·
      2 years ago

      Scripting, to confirm that a large fleet of boxes are all running according to your policy. Verification that the config you want is actually the config you have.

      • 𝒍𝒆𝒎𝒂𝒏𝒏@lemmy.one
        link
        fedilink
        arrow-up
        3
        ·
        2 years ago

        This is exactly what I use it for 👌 very handy for this

  • iuser@lemmy.world
    link
    fedilink
    English
    arrow-up
    4
    ·
    2 years ago

    Thanks for pushing the awareness.

  • PureTryOut@lemmy.kde.social
    link
    fedilink
    arrow-up
    4
    ·
    2 years ago

    Personally I made sure SSH is only accessible when connected through a VPN setup for that purpose. As in, that same machine hosts a Wireguard setup (through Tailscale) and you need to connect to that first before SSH is available. And then SSH also only accepts key-based authentication. I don’t think I need more than that?

    • 9488fcea02a9@sh.itjust.works
      link
      fedilink
      arrow-up
      3
      ·
      2 years ago

      What if wireguard has issues? Then you cant ssh in to fix

      • GreenBottles@lemmy.world
        link
        fedilink
        arrow-up
        2
        ·
        2 years ago

        that really just depends on your scenario

      • PureTryOut@lemmy.kde.social
        link
        fedilink
        arrow-up
        1
        ·
        2 years ago

        I have a VPS that runs the main proxy which I can always access via a console on the website of the company I’m renting it from (Hetzner). The other machines run locally in my home so I can just plug in a cable if need be.

    • Possibly linux@lemmy.zip
      link
      fedilink
      English
      arrow-up
      2
      arrow-down
      1
      ·
      2 years ago

      Couldn’t you just use ssh port forwarding?

      • ReversalHatchery@beehaw.org
        link
        fedilink
        arrow-up
        3
        ·
        2 years ago

        If they use the VPN for other things too, it’s simpler this way

      • PureTryOut@lemmy.kde.social
        link
        fedilink
        arrow-up
        1
        ·
        2 years ago

        Sure but I rather not have the SSH port open to the world, it just makes it harder for attackers to get in this way. Besides I use the VPN for more things, some self-hosted services I don’t want accessible by the whole world.

Linux@lemmy.ml

linux@lemmy.ml

Subscribe from Remote Instance

Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: !linux@lemmy.ml

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word “Linux” in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

  • Posts must be relevant to operating systems running the Linux kernel. GNU/Linux or otherwise.
  • No misinformation
  • No NSFW content
  • No hate speech, bigotry, etc

Related Communities

  • !opensource@lemmy.ml
  • !libre_culture@lemmy.ml
  • !technology@lemmy.ml
  • !libre_hardware@lemmy.ml

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

Visibility: Public
globe

This community can be federated to other instances and be posted/commented in by their users.

  • 580 users / day
  • 2.26K users / week
  • 7.81K users / month
  • 17.4K users / 6 months
  • 1 local subscriber
  • 54.3K subscribers
  • 7.6K Posts
  • 205K Comments
  • Modlog
  • mods:
  • nooter692@lemmy.ml
  • AgreeableLandscape@lemmy.ml
  • MarcellusDrum@lemmy.ml
  • Arthur Besse@lemmy.ml
  • Cyclohexane@lemmy.ml
  • d3Xt3r@lemmy.nz
  • BE: 0.19.9
  • Modlog
  • Instances
  • Docs
  • Code
  • join-lemmy.org