From the course: Linux Hardening

Unlock this course with a free trial

Join today to access over 25,200 courses taught by industry experts.

Hardening the secure shell (SSH) service, part one

Hardening the secure shell (SSH) service, part one - Linux Tutorial

From the course: Linux Hardening

Hardening the secure shell (SSH) service, part one

Welcome back to Cybrary's Linux Hardening course and part one of hardening the Secure Shell. I'm your instructor, Corey Holzer. Now this lesson has three objectives. First, we will discuss how we limit access to SSH. Second, we'll walk through the process of disabling passwords and employing asymmetric key encryption for authentication. And lastly, we'll look at how we block access from specific networks. In the SSH configuration file named sshd_config, there is a parameter for specifically blocking root login, which is permit root login. You need to set it to a value of no. We can restrict other user's access to SSH using two key-value pairs. The first is DenyUsers, and the syntax is basically DenyUsers at the beginning of the line, and then a list of users followed by spaces that shows that they cannot use SSH, and that should they attempt a connection, it will be denied. The other option is DenyGroups. Now you remember what I've said about groups. It's better to actually set…

Contents