Making Sure SSH Services Remain Protected

In this section, you’ll see how to best protect SSH clients and servers. SSH is a way to get command-line access to remote systems with all the data being transmitted being encrypted. Every server has a set of keys, and those keys need to be used to negotiate the session encryption with the client. This encryption protects not only the commands being sent, but at least as importantly, the username and password being sent to authentication against the server.

The SSH Server

The standard SSH server configuration file is sshd_config, in the /etc/ssh/ directory. It works very well on its own. As with a lot of Linux packages, some SSH server installations will allow for modular configuration. You may find ...

Get Security Strategies in Linux Platforms and Applications, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.