====== SSH ======
===== Kulcsos authentikáció =====
- Config átállítása:
PubkeyAuthentication yes
ChallengeResponseAuthentication no
PasswordAuthentication no
UsePAM no
- Config érvényre léptetése:
/etc/init.d/ssh reload
==== /etc/security engedélyezése ====
- Engedélyezni kell a következőt:
# Uncomment and edit /etc/security/access.conf if you need to set complex
# access limits that are hard to express in sshd_config.
account required pam_access.so
- Be kell állítani a jogosultságokat:
##############################################################################
# All lines from here up to the end are building a more complex example.
##############################################################################
#
# User "root" should be allowed to get access via cron .. tty5 tty6.
+ : root : cron crond :0 tty1 tty2 tty3 tty4 tty5 tty6
#
# User "root" should be allowed to get access from hosts with ip addresses.
+ : root : 192.168.111.0/24 192.168.222.0/24
+ : root : 127.0.0.1
#
# User "root" should get access from network 192.168.201.
# This term will be evaluated by string matching.
# comment: It might be better to use network/netmask instead.
# The same is 192.168.201.0/24 or 192.168.201.0/255.255.255.0
#+ : root : 192.168.201.
#
# User "root" should be able to have access from domain.
# Uses string matching also.
#+ : root : .foo.bar.org
#
# User "root" should be denied to get access from all other sources.
#- : root : ALL
#
# User "foo" and members of netgroup "nis_group" should be
# allowed to get access from all sources.
# This will only work if netgroup service is available.
+ : remote_access : ALL
#
# User "john" should get access from ipv4 net/mask
#+ : john : 127.0.0.0/24
#
# User "john" should get access from ipv4 as ipv6 net/mask
#+ : john : ::ffff:127.0.0.0/127
#
# User "john" should get access from ipv6 host address
#+ : john : 2001:4ca0:0:101::1
#
# User "john" should get access from ipv6 host address (same as above)
#+ : john : 2001:4ca0:0:101:0:0:0:1
#
# User "john" should get access from ipv6 net/mask
#+ : john : 2001:4ca0:0:101::/64
#
# All other users should be denied to get access from all sources.
- : ALL : ALL
===== Távoli port forward =====
* https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=228064
Távoli port-forward (''-R'') engedélyezése nem csak a loopback interface-en.
- Írjuk be/engedélyezzük az ''/etc/ssh/sshd_config'' fájlban a következőt:
GatewayPorts yes
- Indírsuk újra a daemont
===== Szerver fingerprint lekérdezése =====
* http://www.phcomp.co.uk/Tutorials/Unix-And-Linux/ssh-check-server-fingerprint.html
*
find /etc/ssh -name '*sa_key.pub' -exec ssh-keygen -lf {} \;
1024 94:c8:30:7a:e9:22:83:fd:0e:99:27:f2:50:77:e5:cf root@foo (DSA)
2048 99:c4:b1:59:07:a3:70:b2:b2:20:0b:2d:4d:b7:30:c4 root@foo (RSA)
256 f7:00:1d:ee:14:fa:67:22:97:30:0d:39:35:6b:41:d6 root@foo (ECDSA)