Secure SSH: basics for your security

Here we are again after my last security post about disabling root account on Ubuntu / Debian. This time I will bring you how I chose to implement some security best practice with OpenSSH on some machines I run with Linux based OS like Ubuntu, but works even with other Debian based distro.

In this guide I will try to explain how to secure a machine service widely used called OpenSSH from malicious attacks. They are usually performed using some vulnerabilities of a non proper configured system leaving your server or pc available to possible hacks.

What is OpenSSH?

OpenSSH or more simply ssh (secure socket shell) is a service hosted by a machine (server or host) which allow another PC (client) to connect to its shell.

Keep on reading!

Disabling root account on Ubuntu / Debian

Here we are with this new article which is going to explain how to secure your system disabling root account on Ubuntu / Debian preventing to everybody to access to your system with such a high grade allowing to perform malicious actions or make serial damages to your environment.

We are going through different steps and maybe many of them can result redundant but you may never know which will be the next flaw being discovered exposing even partially your system.

Who is root? and why is so important?

Root user is the first user you will find by default on your machine, he is the user which has the privileges of doing everything in your system and everyone (even the system owner) who is grant the access whit that role has the complete control on all the system and our first worries is to avoid to everybody, even our self if possible, to log in as root user.
This role is very critical when it comes to security and safety and we should do our best to respect it and protect it.

Keep on reading!