When we first get our hands on a fresh server, some initial security precautions are always warranted, especially if the server is open to a public network. The servers we get on a lot of our popular providers (Digital Ocean, Linode, Rackspace, AWS and so on) are usually open to the public - they are assigned an IP address on their public network upon creation.
We'll cover some initial, important security precautions to take.
Many hosting/server providers start you off with password-based access to the root user (or occasionally a sudo user who doesn't need a password to run commands as root, similar to Vagrant). The root user can do anything to our system, and so we want to lock down the ability for remote connections to log in as root.
So, if we want to remove the ability to remotely access our server as user "root", we need another user to connect with. This user also needs the ability run privileged commands.
We'll do the following to lock down remote access to our server:
- Create a new user
- Allow this user to use "sudo"
- Stop root user from remotely logging in
That will stop user "root" from remotely logging in and allow our new user to log in. This new user will need a password to run any privileged commands.
Then we'll take this one step further - we'll stop users from being able to login with a password altogether, using SSH keys instead. We'll do the following:
- Create an SSH key on our local computer
- Turn off password-based authentication on our server
Initial User Setup
Alright, let's get started. First, you'll need to log into the server with the credentials your provider gave you. For most, that's something like this:
$ ssh root@your-server-ip
AWS might require you to use a downloaded identity file (Ubuntu users might be given user "ubuntu" instead of "root"):
$ ssh -i /path/to/identity.pem root@your-server-ip
For the majority of this article, I'm assuming you're logged in as root, and thus don't need to use "sudo" to run the following commands.
Once you're in, you an create a new user:
$ adduser someusername
This will ask you for some information, the most important of which is the password. Take the time to add a somewhat lengthy, secure password.
CentOS might require you to run
passwd someusername to set a password on the new user.
Don't confuse the
addusercommand with the
addusertakes care of some work that we'd have to do manually otherwise. You can leave the other questions empty or add in their information (full name, room number, and other somewhat useless information).
Next, we need to make this new user (
someusername) a sudo user. This means allowing the user to use "sudo", to run commands as root. How you do this changes per operating system. On Ubuntu, you can simply add the user to the "sudo" group. (If you need a refresher on what groups are, see the past edition Permissions and User Management).
$ usermod -a -G sudo someusername
Let's go over that command quickly:
-a- Append the following group to the user's group (rather than overwrite current group setting)
-G sudo- Assign the group "sudo" as a secondary group
someusername- The user to assign the group to
That's it! Now, on non-Ubuntu systems (RedHat, CentOS), you may need to do some extra work to do the same.
The process is written up nicely here, but is essentially just running the command
visudo and appending the following to the "# User privilege specification" section (Fair warning - It uses Vim as an editor!):
someusername ALL=(ALL) ALL
Now that we have a new, privileged user, we want to stop user "root" from remotely logging in.
To do this, we need to edit the
# Edit with vim $ vim /etc/ssh/sshd_config # Or, if you're not a vim user: $ nano /etc/ssh/sshd_config
Once inside that file, find the
PermitRootLogin option, and set it to "no":
You may also want to change the default SSH port (22) used. This is because a lot of automated systems scan port 22 to see if its an open for attack. You're allowed to use ports between 1025 and 65536. To do so, you can simply change the
Port 1234 # But don't use "1234"
If you want to get even more secure, you can explicitly define a list of users who are allowed to login. That's with the
AllowUsers someusername someotherusername
Once you save and edit from the
/etc/ssh/sshd_config file, we need to reload the SSH daemon.
# On Debian/Ubuntu $ service ssh restart # RedHat/CentOS $ service sshd restart
That's it! Before you close your session as user root, I suggest you now open a new terminal window (session) and attempt to log in with your new user:
# If you left the default port: $ ssh someusername@your-server-ip # If you changed the SSH port number: $ ssh -p 1234 someusername@your-server-ip
You should beA prompted for a password - enter the one you created and you should be logged in! Try running some commands as "sudo" to ensure it works.
SSH Key Access
Assuming that's working, we can take this a step further by disallowing users to log in with a password. This means users can only log in with a valid SSH key. This is more secure as it's substantially less likely for a user to get their hands on your SSH private key than it is for them to obtain or guess a password.
On your local computer, the one from which you log into your server (for me, that's my Macbook), run the following command to generate a new SSH key pair (a private and public key):
$ cd ~/.ssh $ ssh-keygen -t rsa -b 4096 -C firstname.lastname@example.org -f id_myserveridentity
Let's cover this command:
-t rsa- Create and RSA type key.
-b 4096- Use 4096 bits. 2048 is "usually sufficient", but I go higher.
-C email@example.com- Keys can have comments. Often a user's identity goes here, such as their email address
-f id_myserveridentity- The name of the files created (id_myserveridentity and id_myserveridentity.pub in this case)
This will ask your for a password. You can either leave this blank (for passwordless access) or enter in a password. I highly suggest using a password - making it so attackers require both your private key AND your SSH password to gain SSH access, in addition to your user's password to run any sudo command on the server! That's three hard things an attacker would need to get in order to do real damage to your server.
Note that the SSH password you create is NOT the user password used to run sudo commands on the server.
Now we've created a private key file (id_myserveridentity) and a public key file (id_myserveridentity.pub). We need to put the public key on the server, so that the server knows its a key authorized to be used to log in. Copy the contents of the public key file (on Mac:
cat ~/.ssh/id_myserveridentity.pub | pbcopy will add it to your clipboard).
Once that's copied, you can go into your server as your new user ("someusername" in our example).
Note that we'll use "sudo" now, since we're logging in as our new, non-root user.
# In your server # Use nano or vim $ mkdir ~/.ssh # ~/.ssh dir may not exist yet $ nano ~/.ssh/authorized_keys > Paste in your public key and save/exit
So overall, we're just appending the public key from our local computer to the
authorized_keys file of the newly created user on our server. If there's already a key in the
authorized_keys file, just add yours on a newline underneath the other.
authorized_keys file is saved, you should be able to login using your key. You shouldn't need to do anything more, it should attempt your keys first and, finding one, log in using it. You'll need to enter in your password created while generating your SSH key, if you elected to use a password.
Note: You may need to set some permissions of your
The following command should do:
chmod 700 ~/.ssh && chmod 600 ~/.ssh/authorized_keys.
On my Mac, I create a long SSH password and then save the password to my keychain, so I don't have to worry about remembering it. When you log into a server and you have an SSH key setup, your Mac should popup asking for your key's password. You'll have the opportunity to save your password to the Keychain then.
If you're on a Macintosh, remember to click "Remember password in my keychain" so you don't have to type in your SSH password more than once:
The last thing we'll do is to tell our server to only allow remote access via SSH keys (by turning off the ability to log in using a password).
Once again, we'll edit the
# Edit with vim $ sudo vim /etc/ssh/sshd_config # Or, if you're not a vim user: $ sudo nano /etc/ssh/sshd_config
Once inside, find or create the option
PasswordAuthentication and set it to "no":
Save that file, and once again reload the SSH daemon:
# Debian/Ubuntu $ sudo service ssh restart # RedHat/CentOS sudo service sshd restart
You should test that you can still log in after this change before exiting out of the server.
And that's it! We've done some basic user security. We've closed off the root user from logging in, create a sudo user, and turned off password authentication. Now in order to log in via SSH, an attacker would need to gain your SSH private key, your SSH password, and then still know your user password to run damaging commands on your server (although there's definitely potential for damage even if an attacker doesn't know the user's password to run sudo commands).
Here are some more resources on similar and adjacent topics you may be interested in:
- Initial server setup on CentOS 6
- Initial server setup on Ubuntu 14.04
- Various ways to only allow specific users SSH access
- A Comprehensive SSH Key Primer
- Visudo and the sudoers file