Chrooted SSH/SFTP Tutorial (Debian Etch) This tutorial describes two ways how to give users chrooted SSH access. With this setup, you can give your users shell access without having to fear that they can see your whole system. Your users will be jailed in a specific directory which they will not be able to break out of. The users will also be able to use SFTP in their chroot jails. in Public bookmarkswith chrootdebianetchjaillinuxopensshsecurityserversftpssh
First Steps Of Running Linux Via Terminal Instead Of Desktop This tutorial is supposed to show new Linux users how to handle Linux without having to browse through your desktop to edit files. The core commands to do this are the same on every Linux distribution, however there is a large variety of commands that differ from distribution to distribution, as does the install command. in Public bookmarkswith commandsfirstlinuxsshstepsterminal
Mounting Remote Directories With SSHFS On Debian Squeeze This tutorial explains how you can mount a directory from a remote server on the local server securely using SSHFS. SSHFS (Secure SHell FileSystem) is a filesystem that serves files/directories securely over SSH, and local users can use them just as if the were local files/directories. On the local computer, the remote share is mounted via FUSE (Filesystem in Userspace). I will use Debian Squeeze for both the local and the remote server. in Public bookmarkswith debianfilesystemfusemountsqueezesshsshfs
Preventing Brute Force Attacks With BlockHosts On Debian Etch In this article I will show how to install and configure BlockHosts on a Debian Etch system. BlockHosts is a Python tool that observes login attempts to various services, e.g. SSH, FTP, etc., and if it finds failed login attempts again and again from the same IP address or host, it stops further login attempts from that IP address/host. By default, BlockHosts supports services that use TCP_WRAPPERS, such as SSH, i.e. services, that use /etc/hosts.allow or /etc/hosts.deny, but it can also block other services using iproute or iptables. in Public bookmarkswith blockhostsbrutedebiandenyhostsetchfail2banforcelinuxsecurityserverssh
Restricting Users To SFTP Plus Setting Up Chrooted SSH/SFTP (Debian Squeeze) This tutorial describes how to give users chrooted SSH and/or chrooted SFTP access on Debian Squeeze. With this setup, you can give your users shell access without having to fear that they can see your whole system. Your users will be jailed in a specific directory which they will not be able to break out of. I will also show how to restrict users to SFTP so that they cannot use SSH (this part is independent from the chroot part of this tutorial). in Public bookmarkswith chrootdebianjailopensshsftpsqueezessh
SSH: Best Practices Are you using SSH in the best way possible? Have you configured it to be as limited and secure as possible? The goal of this document is to kick in the new year with some best practices for SSH: why you should use them, how to set them up, and how to verify that they are in place. All of the examples below assume that you are using EnGarde Secure Linux but any modern Linux distribution will do just fine since, as far as I know, everybody ships OpenSSH. in Public bookmarkswith opensshsecurityssh