Operation and Maintenance
Linux Operation and Maintenance
How to Secure Your SSH Server on Linux? (Best Practices Guide)
How to Secure Your SSH Server on Linux? (Best Practices Guide)
SSH security hardening needs to focus on four aspects: authentication, access control, encryption, and monitoring: enable key authentication, disable password login, restrict users/IPs and modify default ports, configure strong encryption algorithms and protocol v2, and combine fail2ban and log monitoring to defend against attacks.

Lock down your SSH server by focusing on access control, encryption hardening, and proactive monitoring—most breaches happen through weak credentials or outdated configurations.
Use Key-Based Authentication Instead of Passwords
Password logins are vulnerable to brute-force attacks. Switch to SSH key pairs for stronger, phishing-resistant access.
- Generate a key pair on your local machine with ssh-keygen -t ed25519 (prefer Ed25519 over RSA if supported)
- Copy the public key to the server using ssh-copy-id user@server —never manually edit authorized_keys unless necessary
- Disable password authentication in /etc/ssh/sshd_config : set PasswordAuthentication no and ChallengeResponseAuthentication no
- Restart SSH: sudo systemctl restart sshd (or sshd on older systems)
Restrict Access and Reduce Attack Surface
Limit who can connect—and how—to minimize exposure.
- Change the default SSH port (eg, from 22 to something like 2222) in sshd_config —not a substitute for real security, but reduces noise from automated scanners
- Allow only specific users or groups: use AllowUsers alice bob or AllowGroups sshusers
- Bind SSH to specific IPs if possible: ListenAddress 192.168.1.10 (or your management interface)
- Disable root login entirely: set PermitRootLogin no
Harden Encryption and Protocol Settings
Older ciphers and protocols introduce known vulnerabilities—modernize your config.
- Disable SSH protocol v1: ensure Protocol 2 is set (v1 is obsolete and insecure)
- Explicitly define strong ciphers and KEX algorithms—add these lines to sshd_config :
- Ciphers chacha20-poly1305@openssh.com,aes256-gcm@openssh.com,aes128-gcm@openssh.com
- KexAlgorithms curve25519-sha256,ecdh-sha2-nistp521,diffie-hellman-group16-sha384
- MACs hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com
Monitor, Limit, and Automate Defense
Detect and block suspicious activity before it escalates.
- Install and configure fail2ban to auto-block repeated failed login attempts
- Keep logs readable and rotated: verify /var/log/auth.log (Debian/Ubuntu) or /var/log/secure (RHEL/CentOS) is active and monitored
- Set login grace time and idle timeouts: add LoginGraceTime 60 and ClientAliveInterval 300 ClientAliveCountMax 0
- Use ufw or firewalld to restrict SSH access by IP range if feasible (eg, sudo ufw allow from 203.0.113.5 to any port 22 )
Basically just these four areas—authentication, access, crypto, and monitoring—cover most real-world SSH risks. It's not complex, but skipping even one step leaves room for exploitation.
The above is the detailed content of How to Secure Your SSH Server on Linux? (Best Practices Guide). For more information, please follow other related articles on the PHP Chinese website!
Hot AI Tools
Undress AI Tool
Undress images for free
AI Clothes Remover
Online AI tool for removing clothes from photos.
Undresser.AI Undress
AI-powered app for creating realistic nude photos
ArtGPT
AI image generator for creative art from text prompts.
Stock Market GPT
AI powered investment research for smarter decisions
Hot Article
Popular tool
Notepad++7.3.1
Easy-to-use and free code editor
SublimeText3 Chinese version
Chinese version, very easy to use
Zend Studio 13.0.1
Powerful PHP integrated development environment
Dreamweaver CS6
Visual web development tools
SublimeText3 Mac version
God-level code editing software (SublimeText3)
Hot Topics
20515
7
13628
4
How to manage software packages using Dnf and Rpm in Linux?
Mar 07, 2026 am 01:50 AM
dnfinstall prompts packagenotfound because it queries the enabled warehouse rather than the local installation status; rpm-q queries the local RPM database, and the scopes of the two are different.
How to monitor system performance and resources in Linux? (Top & Htop)
Mar 06, 2026 am 01:04 AM
The total top CPU usage is not 100% because it is calculated based on a single core, and the maximum is 800% for an 8-core system; the htop terminal size error needs to be fixed with eval$(resize); the real memory pressure is available rather than used; top command line truncation can be solved with the -c parameter.
How to setup file sharing using Samba on Linux? (SMB Protocol)
Mar 13, 2026 am 12:33 AM
The main reason why Windows cannot see the Samba share is that the firewall blocks UDP137–139/TCP445 or NetBIOS name resolution fails; it is necessary to confirm that the workgroup is consistent, the interfaces are configured correctly, the file permissions match forceuser/forcegroup, and set doscharset=UTF-8 to solve Chinese garbled characters.
How to extend a Logical Volume (LVM) in Linux without downtime?
Mar 13, 2026 am 12:53 AM
Logical volumes and file systems can be expanded online. You need to expand the LV first and then the file system. It is recommended to use lvextend-r for automatic synchronization adjustment, but you must ensure that the LVM and file system tool versions are compatible.
How to check open ports and listening services in Linux? (Netstat & SS)
Mar 10, 2026 am 01:08 AM
Netstat displays fewer LISTEN ports than ss because it does not display process information by default that non-root users do not have access to; ss can read all listening sockets by default without process names, and sudonetstat-tulpn is required to display them completely.
How to set up SSH key authentication on Linux? (Passwordless Login)
Mar 11, 2026 am 12:46 AM
It is recommended to use ssh-keygen-ted25519 to generate a key pair, because it is faster, more secure, and has a shorter key than the default RSA; it is necessary to strictly set the ~/.ssh directory permissions to 700 and authorized_keys to 600, and use ssh-v to confirm whether the client is Offering public key and whether the server rejects it.
How to format disk partitions using the command line in Linux?
Mar 15, 2026 am 12:01 AM
When fdisk is stuck at the Command prompt, it is normally waiting for input. Enter q to exit safely; you must umount before mkfs, otherwise it may fail silently; partedmkpart does not support the specified file system type, and mkfs needs to be executed separately.
How to configure a static IP address on Linux? (Netplan & NetworkManager)
Mar 14, 2026 am 12:02 AM
Netplan reports "InvalidYAML" when configuring a static IP due to indentation errors, missing spaces after colons, or mixed tabs; gateway4 has been deprecated and routes to:default must be used instead; NetworkManager needs to be modified before down/up takes effect; the renderer field is used to determine the backend during coexistence; incorrect DNS configuration will cause ping to succeed but curl to fail.





