search
  • Sign In
  • Sign Up
Password reset successful

Follow the proiects vou are interested in andi aet the latestnews about them taster

Table of Contents
Use Key-Based Authentication Instead of Passwords
Restrict Access and Reduce Attack Surface
Harden Encryption and Protocol Settings
Monitor, Limit, and Automate Defense
Home Operation and Maintenance Linux Operation and Maintenance How to Secure Your SSH Server on Linux? (Best Practices Guide)

How to Secure Your SSH Server on Linux? (Best Practices Guide)

Dec 26, 2025 am 04:46 AM

SSH security hardening needs to focus on four aspects: authentication, access control, encryption, and monitoring: enable key authentication, disable password login, restrict users/IPs and modify default ports, configure strong encryption algorithms and protocol v2, and combine fail2ban and log monitoring to defend against attacks.

How to Secure Your SSH Server on Linux? (Best Practices Guide)

Lock down your SSH server by focusing on access control, encryption hardening, and proactive monitoring—most breaches happen through weak credentials or outdated configurations.

Use Key-Based Authentication Instead of Passwords

Password logins are vulnerable to brute-force attacks. Switch to SSH key pairs for stronger, phishing-resistant access.

  • Generate a key pair on your local machine with ssh-keygen -t ed25519 (prefer Ed25519 over RSA if supported)
  • Copy the public key to the server using ssh-copy-id user@server —never manually edit authorized_keys unless necessary
  • Disable password authentication in /etc/ssh/sshd_config : set PasswordAuthentication no and ChallengeResponseAuthentication no
  • Restart SSH: sudo systemctl restart sshd (or sshd on older systems)

Restrict Access and Reduce Attack Surface

Limit who can connect—and how—to minimize exposure.

  • Change the default SSH port (eg, from 22 to something like 2222) in sshd_config —not a substitute for real security, but reduces noise from automated scanners
  • Allow only specific users or groups: use AllowUsers alice bob or AllowGroups sshusers
  • Bind SSH to specific IPs if possible: ListenAddress 192.168.1.10 (or your management interface)
  • Disable root login entirely: set PermitRootLogin no

Harden Encryption and Protocol Settings

Older ciphers and protocols introduce known vulnerabilities—modernize your config.

  • Disable SSH protocol v1: ensure Protocol 2 is set (v1 is obsolete and insecure)
  • Explicitly define strong ciphers and KEX algorithms—add these lines to sshd_config :
  • Ciphers chacha20-poly1305@openssh.com,aes256-gcm@openssh.com,aes128-gcm@openssh.com
  • KexAlgorithms curve25519-sha256,ecdh-sha2-nistp521,diffie-hellman-group16-sha384
  • MACs hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com

Monitor, Limit, and Automate Defense

Detect and block suspicious activity before it escalates.

  • Install and configure fail2ban to auto-block repeated failed login attempts
  • Keep logs readable and rotated: verify /var/log/auth.log (Debian/Ubuntu) or /var/log/secure (RHEL/CentOS) is active and monitored
  • Set login grace time and idle timeouts: add LoginGraceTime 60 and ClientAliveInterval 300 ClientAliveCountMax 0
  • Use ufw or firewalld to restrict SSH access by IP range if feasible (eg, sudo ufw allow from 203.0.113.5 to any port 22 )

Basically just these four areas—authentication, access, crypto, and monitoring—cover most real-world SSH risks. It's not complex, but skipping even one step leaves room for exploitation.

The above is the detailed content of How to Secure Your SSH Server on Linux? (Best Practices Guide). For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undress AI Tool

Undress AI Tool

Undress images for free

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

ArtGPT

ArtGPT

AI image generator for creative art from text prompts.

Stock Market GPT

Stock Market GPT

AI powered investment research for smarter decisions

Popular tool

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

How to manage software packages using Dnf and Rpm in Linux? How to manage software packages using Dnf and Rpm in Linux? Mar 07, 2026 am 01:50 AM

dnfinstall prompts packagenotfound because it queries the enabled warehouse rather than the local installation status; rpm-q queries the local RPM database, and the scopes of the two are different.

How to monitor system performance and resources in Linux? (Top & Htop) How to monitor system performance and resources in Linux? (Top & Htop) Mar 06, 2026 am 01:04 AM

The total top CPU usage is not 100% because it is calculated based on a single core, and the maximum is 800% for an 8-core system; the htop terminal size error needs to be fixed with eval$(resize); the real memory pressure is available rather than used; top command line truncation can be solved with the -c parameter.

How to setup file sharing using Samba on Linux? (SMB Protocol) How to setup file sharing using Samba on Linux? (SMB Protocol) Mar 13, 2026 am 12:33 AM

The main reason why Windows cannot see the Samba share is that the firewall blocks UDP137–139/TCP445 or NetBIOS name resolution fails; it is necessary to confirm that the workgroup is consistent, the interfaces are configured correctly, the file permissions match forceuser/forcegroup, and set doscharset=UTF-8 to solve Chinese garbled characters.

How to extend a Logical Volume (LVM) in Linux without downtime? How to extend a Logical Volume (LVM) in Linux without downtime? Mar 13, 2026 am 12:53 AM

Logical volumes and file systems can be expanded online. You need to expand the LV first and then the file system. It is recommended to use lvextend-r for automatic synchronization adjustment, but you must ensure that the LVM and file system tool versions are compatible.

How to check open ports and listening services in Linux? (Netstat & SS) How to check open ports and listening services in Linux? (Netstat & SS) Mar 10, 2026 am 01:08 AM

Netstat displays fewer LISTEN ports than ss because it does not display process information by default that non-root users do not have access to; ss can read all listening sockets by default without process names, and sudonetstat-tulpn is required to display them completely.

How to set up SSH key authentication on Linux? (Passwordless Login) How to set up SSH key authentication on Linux? (Passwordless Login) Mar 11, 2026 am 12:46 AM

It is recommended to use ssh-keygen-ted25519 to generate a key pair, because it is faster, more secure, and has a shorter key than the default RSA; it is necessary to strictly set the ~/.ssh directory permissions to 700 and authorized_keys to 600, and use ssh-v to confirm whether the client is Offering public key and whether the server rejects it.

How to format disk partitions using the command line in Linux? How to format disk partitions using the command line in Linux? Mar 15, 2026 am 12:01 AM

When fdisk is stuck at the Command prompt, it is normally waiting for input. Enter q to exit safely; you must umount before mkfs, otherwise it may fail silently; partedmkpart does not support the specified file system type, and mkfs needs to be executed separately.

How to configure a static IP address on Linux? (Netplan & NetworkManager) How to configure a static IP address on Linux? (Netplan & NetworkManager) Mar 14, 2026 am 12:02 AM

Netplan reports "InvalidYAML" when configuring a static IP due to indentation errors, missing spaces after colons, or mixed tabs; gateway4 has been deprecated and routes to:default must be used instead; NetworkManager needs to be modified before down/up takes effect; the renderer field is used to determine the backend during coexistence; incorrect DNS configuration will cause ping to succeed but curl to fail.

Related articles