-
-
Notifications
You must be signed in to change notification settings - Fork 606
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
More secure sshd defaults #561
Comments
I'm very interested in this, any idea how is this going to be tackled? Using something like ansible-ssh-hardening or doing your own? |
@aried3r that role looks decent from a quick glance. We could use something like that or just add our own changes to the sshd config. We're actually already using another role that we imported: https://github.com/roots/trellis/tree/master/roles/sshd So we could switch or just update that template. If you're interested in helping let us know 👍 |
I'm interested. :) Personally, I'd use ansible-ssh-hardening because it is maintained so changes there don't have to be reflected and implemented in your own config, especially with vulnerabilities showing up. What do you think? |
@aried3r sorry never replied to this. https://github.com/dev-sec/ansible-ssh-hardening looks good. Would you be interested in implementing it? |
@swalkinshaw Is this still something you want to see implemented? I never saw ansible-ssh-hardening before and now I'm most likely going to integrate it with my setup. |
@isynergy-development yep 👍 |
@swalkinshaw I got this pretty much finished, I currently have tested it locally and have it deployed on my live staging server. Just need to test and verify sftp is still going to be working as expected because ssh-hardening is using internal-sftp with chroot directories (which is safer anyways) but obviously users that are used to using sftp will most likely want to access the web root instead of the user home folder which is default. I only use ssh in my normal day to day but I'm going to try and make a point to finish up this test and submit a PR soon. |
closed by #744 |
Submit a feature request or bug report
What is the current behavior?
sshd
may result in insecure-defaults like using RC4 cypher.What is the expected or desired behavior?
Just like with SSL we should have better more secure defaults for sshd.
Feature Request
Please provide use cases for changing the current behavior:
Security!
Other relevant information:
See https://discourse.roots.io/t/do-we-need-ssh-rc4-cipher-enabled/6438/6
The text was updated successfully, but these errors were encountered: