<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>
	Comments on: How to Secure SSH Login on Your Linux Server	</title>
	<atom:link href="https://www.farinspace.com/secure-login-linux-server/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.farinspace.com/secure-login-linux-server/</link>
	<description>Practical Real World Web Development</description>
	<lastBuildDate>Wed, 30 Sep 2015 19:22:50 +0000</lastBuildDate>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.6.2</generator>
	<item>
		<title>
		By: Shane		</title>
		<link>https://www.farinspace.com/secure-login-linux-server/#comment-37472</link>

		<dc:creator><![CDATA[Shane]]></dc:creator>
		<pubDate>Tue, 10 Dec 2013 12:05:46 +0000</pubDate>
		<guid isPermaLink="false">http://farinspace.com/?p=1152#comment-37472</guid>

					<description><![CDATA[In the testing of your new credentials section. You don&#039;t need to log out nad log in.

I start a new Putty session and go that way. That means if I have made a mistake I am still logged in via the original putty shell and can hopefully correct it. 

One other tip to add to your awesome step by step.:
change IP tables to stop brute force attacking:
after three missed attempts in a minute locks it out for a minute.  trusted address is white-listed from this check. change port 22 to the new port you have used.


iptables -N SSH_WHITELIST

iptables -A SSH_WHITELIST -s    -m recent --remove --name SSH -j ACCEPT

iptables -A INPUT -p tcp --dport 22 -m state --state NEW -m recent --set \
 --name SSH
iptables -A INPUT -p tcp --dport 22 -m state --state NEW -j SSH_WHITELIST
iptables -A INPUT -p tcp --dport 22 -m state --state NEW -m recent --update \
 --seconds 60 --hitcount 4 --rttl --name SSH -j ULOG --ulog-prefix SSH_brute_force
iptables -A INPUT -p tcp --dport 22 -m state --state NEW -m recent --update \
 --seconds 60 --hitcount 4 --rttl --name SSH -j DROP


Alternatively fail2ban is meant to do the above but be excellent.]]></description>
			<content:encoded><![CDATA[<p>In the testing of your new credentials section. You don&#8217;t need to log out nad log in.</p>
<p>I start a new Putty session and go that way. That means if I have made a mistake I am still logged in via the original putty shell and can hopefully correct it. </p>
<p>One other tip to add to your awesome step by step.:<br />
change IP tables to stop brute force attacking:<br />
after three missed attempts in a minute locks it out for a minute.  trusted address is white-listed from this check. change port 22 to the new port you have used.</p>
<p>iptables -N SSH_WHITELIST</p>
<p>iptables -A SSH_WHITELIST -s    -m recent &#8211;remove &#8211;name SSH -j ACCEPT</p>
<p>iptables -A INPUT -p tcp &#8211;dport 22 -m state &#8211;state NEW -m recent &#8211;set \<br />
 &#8211;name SSH<br />
iptables -A INPUT -p tcp &#8211;dport 22 -m state &#8211;state NEW -j SSH_WHITELIST<br />
iptables -A INPUT -p tcp &#8211;dport 22 -m state &#8211;state NEW -m recent &#8211;update \<br />
 &#8211;seconds 60 &#8211;hitcount 4 &#8211;rttl &#8211;name SSH -j ULOG &#8211;ulog-prefix SSH_brute_force<br />
iptables -A INPUT -p tcp &#8211;dport 22 -m state &#8211;state NEW -m recent &#8211;update \<br />
 &#8211;seconds 60 &#8211;hitcount 4 &#8211;rttl &#8211;name SSH -j DROP</p>
<p>Alternatively fail2ban is meant to do the above but be excellent.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: graham		</title>
		<link>https://www.farinspace.com/secure-login-linux-server/#comment-34005</link>

		<dc:creator><![CDATA[graham]]></dc:creator>
		<pubDate>Fri, 30 Aug 2013 08:48:31 +0000</pubDate>
		<guid isPermaLink="false">http://farinspace.com/?p=1152#comment-34005</guid>

					<description><![CDATA[Also check this url:
http://www.itsecuritycenter.com/linux-security-secure-ssh-configuration.html]]></description>
			<content:encoded><![CDATA[<p>Also check this url:<br />
<a href="http://www.itsecuritycenter.com/linux-security-secure-ssh-configuration.html" rel="nofollow ugc">http://www.itsecuritycenter.com/linux-security-secure-ssh-configuration.html</a></p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Dimas		</title>
		<link>https://www.farinspace.com/secure-login-linux-server/#comment-33004</link>

		<dc:creator><![CDATA[Dimas]]></dc:creator>
		<pubDate>Thu, 25 Jul 2013 18:10:51 +0000</pubDate>
		<guid isPermaLink="false">http://farinspace.com/?p=1152#comment-33004</guid>

					<description><![CDATA[1) I am not sure .. give it a try and report back if it does indeed work

2) yes you can comment out the key or delete it completely]]></description>
			<content:encoded><![CDATA[<p>1) I am not sure .. give it a try and report back if it does indeed work</p>
<p>2) yes you can comment out the key or delete it completely</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Jan		</title>
		<link>https://www.farinspace.com/secure-login-linux-server/#comment-32991</link>

		<dc:creator><![CDATA[Jan]]></dc:creator>
		<pubDate>Thu, 25 Jul 2013 10:12:33 +0000</pubDate>
		<guid isPermaLink="false">http://farinspace.com/?p=1152#comment-32991</guid>

					<description><![CDATA[Hi,
thanks for tutorial - just two questions:
1) Is it possible to use both at the same time - password and authentication using public key?
does it suffice to keep this one to yes?
PasswordAuthentication yes

2) How to disable a previously added public key? Is all I need to do just this:
# user: davidrussell
#ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAIEApwFQWa9G0FX7M+uSi8ipny0+C14lPFZtdFLj2rT5FNbUcat6BNswFt4Ys97celZ1HiuMGjyAIPDO1B290SSXGOWV/hwhNlMG080yjXbj0BC/5qNim9eDXJHqq0knFbIsHvcOZ9SepVp9q6SuqXuSQ6AXmMed3ZRm2ig7DiqDHVM=

# - basically simply commenting out one of the keys and doing restart of the ssh server? Or is there any other action required? Thanks!]]></description>
			<content:encoded><![CDATA[<p>Hi,<br />
thanks for tutorial &#8211; just two questions:<br />
1) Is it possible to use both at the same time &#8211; password and authentication using public key?<br />
does it suffice to keep this one to yes?<br />
PasswordAuthentication yes</p>
<p>2) How to disable a previously added public key? Is all I need to do just this:<br />
# user: davidrussell<br />
#ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAIEApwFQWa9G0FX7M+uSi8ipny0+C14lPFZtdFLj2rT5FNbUcat6BNswFt4Ys97celZ1HiuMGjyAIPDO1B290SSXGOWV/hwhNlMG080yjXbj0BC/5qNim9eDXJHqq0knFbIsHvcOZ9SepVp9q6SuqXuSQ6AXmMed3ZRm2ig7DiqDHVM=</p>
<p># &#8211; basically simply commenting out one of the keys and doing restart of the ssh server? Or is there any other action required? Thanks!</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: driver		</title>
		<link>https://www.farinspace.com/secure-login-linux-server/#comment-28384</link>

		<dc:creator><![CDATA[driver]]></dc:creator>
		<pubDate>Fri, 15 Mar 2013 15:38:43 +0000</pubDate>
		<guid isPermaLink="false">http://farinspace.com/?p=1152#comment-28384</guid>

					<description><![CDATA[Amazing tip!! Thanks a lot for sharing the step-by-step tutorial :)
(had to use service sshd restart instead)]]></description>
			<content:encoded><![CDATA[<p>Amazing tip!! Thanks a lot for sharing the step-by-step tutorial 🙂<br />
(had to use service sshd restart instead)</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: dave		</title>
		<link>https://www.farinspace.com/secure-login-linux-server/#comment-26032</link>

		<dc:creator><![CDATA[dave]]></dc:creator>
		<pubDate>Sat, 01 Dec 2012 13:03:11 +0000</pubDate>
		<guid isPermaLink="false">http://farinspace.com/?p=1152#comment-26032</guid>

					<description><![CDATA[Thanks for great tutorial.
To restart sshd do &#039;service sshd restart&#039; works but i am sitting on a RH distro i dont know about ubuntu]]></description>
			<content:encoded><![CDATA[<p>Thanks for great tutorial.<br />
To restart sshd do &#8216;service sshd restart&#8217; works but i am sitting on a RH distro i dont know about ubuntu</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: hrs		</title>
		<link>https://www.farinspace.com/secure-login-linux-server/#comment-25973</link>

		<dc:creator><![CDATA[hrs]]></dc:creator>
		<pubDate>Tue, 27 Nov 2012 09:38:53 +0000</pubDate>
		<guid isPermaLink="false">http://farinspace.com/?p=1152#comment-25973</guid>

					<description><![CDATA[I would like to recommend  to use Two Factor SSH with Google Authenticator (http://digitaljournal.sg/wp/?p=146)
 to tighten up the sshd security]]></description>
			<content:encoded><![CDATA[<p>I would like to recommend  to use Two Factor SSH with Google Authenticator (<a href="http://digitaljournal.sg/wp/?p=146" rel="nofollow ugc">http://digitaljournal.sg/wp/?p=146</a>)<br />
 to tighten up the sshd security</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Simon		</title>
		<link>https://www.farinspace.com/secure-login-linux-server/#comment-24449</link>

		<dc:creator><![CDATA[Simon]]></dc:creator>
		<pubDate>Mon, 23 Jul 2012 13:21:31 +0000</pubDate>
		<guid isPermaLink="false">http://farinspace.com/?p=1152#comment-24449</guid>

					<description><![CDATA[The ssh restart line is incorrect. It is the daemon that needs restarting, so...
/etc/init.d/sshd restart]]></description>
			<content:encoded><![CDATA[<p>The ssh restart line is incorrect. It is the daemon that needs restarting, so&#8230;<br />
/etc/init.d/sshd restart</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Dimas		</title>
		<link>https://www.farinspace.com/secure-login-linux-server/#comment-9172</link>

		<dc:creator><![CDATA[Dimas]]></dc:creator>
		<pubDate>Tue, 01 Feb 2011 21:15:13 +0000</pubDate>
		<guid isPermaLink="false">http://farinspace.com/?p=1152#comment-9172</guid>

					<description><![CDATA[@mac geek, thanks for the tip, I&#039;ve started using your suggestion and have also added it to the tutorial.]]></description>
			<content:encoded><![CDATA[<p>@mac geek, thanks for the tip, I&#8217;ve started using your suggestion and have also added it to the tutorial.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: mac geek		</title>
		<link>https://www.farinspace.com/secure-login-linux-server/#comment-6329</link>

		<dc:creator><![CDATA[mac geek]]></dc:creator>
		<pubDate>Wed, 17 Nov 2010 18:19:44 +0000</pubDate>
		<guid isPermaLink="false">http://farinspace.com/?p=1152#comment-6329</guid>

					<description><![CDATA[hey this is great! one other thing i like to do is to move the sshd service from port 22 to something non standard.  this helps to keep the automated bot hacks to a minimun or nil, and provides one more line of defense. : )

adjust the port at the top of the same sshd_config file, then restart the service.]]></description>
			<content:encoded><![CDATA[<p>hey this is great! one other thing i like to do is to move the sshd service from port 22 to something non standard.  this helps to keep the automated bot hacks to a minimun or nil, and provides one more line of defense. : )</p>
<p>adjust the port at the top of the same sshd_config file, then restart the service.</p>
]]></content:encoded>
		
			</item>
	</channel>
</rss>
