Updating sshd config according to most recent ssh-audit version
This commit is contained in:
@@ -1,55 +0,0 @@
|
|||||||
Host server
|
|
||||||
HostName 192.168.0.44
|
|
||||||
User matt
|
|
||||||
Port 22
|
|
||||||
IdentityFile ~/.ssh/myVpsKey
|
|
||||||
Host pibx
|
|
||||||
HostName 192.168.0.107
|
|
||||||
User matt
|
|
||||||
Port 22
|
|
||||||
IdentityFile ~/.ssh/myVpsKey
|
|
||||||
Host tilde
|
|
||||||
HostName tilde.club
|
|
||||||
User engirugger42
|
|
||||||
Port 22
|
|
||||||
IdentityFile ~/.ssh/myVpsKey
|
|
||||||
Host pirate
|
|
||||||
HostName 192.168.69.42
|
|
||||||
User pirate
|
|
||||||
Port 22
|
|
||||||
IdentityFile ~/.ssh/myServerKey
|
|
||||||
Host honey
|
|
||||||
Hostname 192.168.0.127
|
|
||||||
User engirugger-honeypi
|
|
||||||
Port 2101
|
|
||||||
IdentityFile ~/.ssh/myVpsKey
|
|
||||||
Host pinephone
|
|
||||||
HostName 192.168.0.173
|
|
||||||
User alarm
|
|
||||||
Port 22
|
|
||||||
IdentityFile ~/.ssh/myServerKey
|
|
||||||
Host travel-router
|
|
||||||
Hostname 192.168.3.1
|
|
||||||
User root
|
|
||||||
Port 22
|
|
||||||
IdentityFile ~/.ssh/myVpsKey
|
|
||||||
Host vps
|
|
||||||
HostName vpn.recchia.dev
|
|
||||||
User root
|
|
||||||
Port 22
|
|
||||||
IdentityFile ~/.ssh/myVpsKey
|
|
||||||
Host de-vps
|
|
||||||
HostName de.recchia.dev
|
|
||||||
User root
|
|
||||||
Port 22
|
|
||||||
IdentityFile ~/.ssh/myVpsKey
|
|
||||||
Host nl-vps
|
|
||||||
HostName nl.recchia.dev
|
|
||||||
User root
|
|
||||||
Port 22
|
|
||||||
IdentityFile ~/.ssh/myVpsKey
|
|
||||||
Host openwrt
|
|
||||||
Hostname 192.168.0.1
|
|
||||||
User root
|
|
||||||
Port 22
|
|
||||||
IdentityFile ~/.ssh/myVpsKey
|
|
||||||
@@ -5,5 +5,5 @@ ssh-keygen -t ed25519 -f /etc/ssh/ssh_host_ed25519_key -N ""
|
|||||||
awk '$5 >= 3071' /etc/ssh/moduli > /etc/ssh/moduli.safe
|
awk '$5 >= 3071' /etc/ssh/moduli > /etc/ssh/moduli.safe
|
||||||
mv /etc/ssh/moduli.safe /etc/ssh/moduli
|
mv /etc/ssh/moduli.safe /etc/ssh/moduli
|
||||||
echo -e "# Restrict key exchange, cipher, and MAC algorithms, as per sshaudit.com\n# hardening guide.\n
|
echo -e "# Restrict key exchange, cipher, and MAC algorithms, as per sshaudit.com\n# hardening guide.\n
|
||||||
KexAlgorithms sntrup761x25519-sha512@openssh.com,curve25519-sha256,curve25519-sha256@libssh.org,gss-curve25519-sha256-,diffie-hellman-group16-sha512,gss-group16-sha512-,diffie-hellman-group14-sha256,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha256\n\nCiphers chacha20-poly1305@openssh.com,aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr\n\nMACs hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,umac-128-etm@openssh.com\n\nHostKeyAlgorithms sk-ssh-ed25519-cert-v01@openssh.com,ssh-ed25519-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,sk-ssh-ed25519@openssh.com,ssh-ed25519,rsa-sha2-512,rsa-sha2-256\n\nRequiredRSASize 3072\n\nCASignatureAlgorithms sk-ssh-ed25519@openssh.com,ssh-ed25519,rsa-sha2-512,rsa-sha2-256\n\nGSSAPIKexAlgorithms gss-curve25519-sha256-,gss-group16-sha512-\n\nHostbasedAcceptedAlgorithms sk-ssh-ed25519-cert-v01@openssh.com,ssh-ed25519-cert-v01@openssh.com,sk-ssh-ed25519@openssh.com,ssh-ed25519,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-512,rsa-sha2-256-cert-v01@openssh.com,rsa-sha2-256\n\nPubkeyAcceptedAlgorithms sk-ssh-ed25519-cert-v01@openssh.com,ssh-ed25519-cert-v01@openssh.com,sk-ssh-ed25519@openssh.com,ssh-ed25519,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-512,rsa-sha2-256-cert-v01@openssh.com,rsa-sha2-256\n\n" > /etc/ssh/sshd_config.d/ssh-audit_hardening.conf
|
KexAlgorithms sntrup761x25519-sha512@openssh.com,curve25519-sha256,curve25519-sha256@libssh.org,gss-curve25519-sha256-,diffie-hellman-group16-sha512,gss-group16-sha512-,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha256\n\nCiphers chacha20-poly1305@openssh.com,aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr\n\nMACs hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,umac-128-etm@openssh.com\n\nHostKeyAlgorithms sk-ssh-ed25519-cert-v01@openssh.com,ssh-ed25519-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,sk-ssh-ed25519@openssh.com,ssh-ed25519,rsa-sha2-512,rsa-sha2-256\n\nRequiredRSASize 3072\n\nCASignatureAlgorithms sk-ssh-ed25519@openssh.com,ssh-ed25519,rsa-sha2-512,rsa-sha2-256\n\nGSSAPIKexAlgorithms gss-curve25519-sha256-,gss-group16-sha512-\n\nHostbasedAcceptedAlgorithms sk-ssh-ed25519-cert-v01@openssh.com,ssh-ed25519-cert-v01@openssh.com,sk-ssh-ed25519@openssh.com,ssh-ed25519,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-512,rsa-sha2-256-cert-v01@openssh.com,rsa-sha2-256\n\nPubkeyAcceptedAlgorithms sk-ssh-ed25519-cert-v01@openssh.com,ssh-ed25519-cert-v01@openssh.com,sk-ssh-ed25519@openssh.com,ssh-ed25519,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-512,rsa-sha2-256-cert-v01@openssh.com,rsa-sha2-256\n\n" > /etc/ssh/sshd_config.d/ssh-audit_hardening.conf
|
||||||
service ssh restart
|
service ssh restart
|
||||||
|
|||||||
Reference in New Issue
Block a user