svn commit: r48103 - head/en_US.ISO8859-1/books/handbook/security
Tom Rhodes
trhodes at FreeBSD.org
Wed Jan 27 18:23:32 UTC 2016
Author: trhodes
Date: Wed Jan 27 18:23:30 2016
New Revision: 48103
URL: https://svnweb.freebsd.org/changeset/doc/48103
Log:
Break out the AllowUsers discussion into a separate section and
add some discussion on the AuthenticationMethods option to utilize
key-only auth.
Modified:
head/en_US.ISO8859-1/books/handbook/security/chapter.xml
Modified: head/en_US.ISO8859-1/books/handbook/security/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/handbook/security/chapter.xml Wed Jan 27 14:13:07 2016 (r48102)
+++ head/en_US.ISO8859-1/books/handbook/security/chapter.xml Wed Jan 27 18:23:30 2016 (r48103)
@@ -2862,9 +2862,13 @@ user at unfirewalled-system.example.org's p
<acronym>SSH</acronym> server, accepting connections from
other <acronym>SSH</acronym> clients.</para>
- <para>To see if <application>sshd</application> is enabled,
- check <filename>/etc/rc.conf</filename> for this line and add
- it if it is missing:</para>
+ <para>To see if <application>sshd</application> is operating,
+ use the &man.service.8; command:</para>
+
+ <screen>&prompt.root; <userinput>service sshd status</userinput></screen>
+
+ <para>If the service is not running, add the following line to
+ <filename>/etc/rc.conf</filename>.</para>
<programlisting>sshd_enable="YES"</programlisting>
@@ -2885,6 +2889,21 @@ user at unfirewalled-system.example.org's p
complete discussion about authentication, the login process,
and the various configuration files.</para>
+ <para>At this point, the <application>sshd</application> should
+ be available to all users with a username and password on
+ the system.</para>
+ </sect2>
+
+ <sect2>
+ <title>SSH Server Security</title>
+
+ <para>While <application>sshd</application> is the most widely
+ used remote administration facility for &os;, brute force
+ and drive by attacks are common to any system exposed to
+ public networks. Several additional parameters are available
+ to prevent the success of these attacks and will be described
+ in this section.</para>
+
<para>It is a good idea to limit which users can log into the
<acronym>SSH</acronym> server and from where using the
<literal>AllowUsers</literal> keyword in the
@@ -2927,6 +2946,17 @@ user at unfirewalled-system.example.org's p
available keywords.</para>
</note>
+ <para>In addition, users may be forced to use two factor
+ authentication via the use of a public and private key. When
+ required, the user may generate a key pair through the use
+ of &man.ssh-keygen.1; and send the administrator the public
+ key. This key file will be placed in the
+ <filename>authorized_keys</filename> as described above in
+ the client section. To force the users to use keys only,
+ the following option may be configured:</para>
+
+ <programlisting>AuthenticationMethods publickey</programlisting>
+
<tip>
<para>Do not confuse <filename>/etc/ssh/sshd_config</filename>
with <filename>/etc/ssh/ssh_config</filename> (note the
More information about the svn-doc-head
mailing list