-
-
Notifications
You must be signed in to change notification settings - Fork 2.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Minor updates to the sshd_config #51
Comments
Few more extraneous options we can remove
|
jackivanov
added a commit
that referenced
this issue
Aug 20, 2016
faf0
pushed a commit
to faf0/algo
that referenced
this issue
Dec 13, 2018
faf0
pushed a commit
to faf0/algo
that referenced
this issue
Dec 13, 2018
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
I discovered ssh_scan and the Mozilla OpenSSH Security Guidelines tonight, and discovered a few enhancements we can make to the sshd_config in the process.
HostKeys are apparently an ordered list and OpenSSH still includes RSA and DSA keys by default. We can remove both of those and leave only the ED25519 and ECDSA keys.
There is a
HostKeyAlgorithms
parameter in sshd_config but I haven't gone through it in enough detail to pick a list of allowed algorithms yet. I think that simply limiting the host key choices to only the above should do what we want for now.There is an
AuthenticationMethods
option in newer version of OpenSSH intended to rollup the list of allowed auth methods into a single place. This should be set to pubkey only:Astonishingly, OpenSSH does not use seccomp out of the box. You have to configure it by hand.
None of these make algo radically safer, but they are nice to have.
The text was updated successfully, but these errors were encountered: