Linux Hardening Part 1: Securing SSH Access

Linux Hardening Series: Securing SSH Access 🔐

Welcome to the Linux Hardening Series! This blog series will contain technical, but beginner-friendly information for how you can lock down your Linux server against various types of threats. This is Part 1, where we focus on securing SSH, one of the most common attack vectors on Linux servers.

By default, SSH is open to brute-force attacks and mass scans, making it a prime target for hackers. Here’s how to lock it down while keeping it easy to use.

Turtle wearing armor

Step 1: Install Fail2Ban to Block Brute Force Attacks

Fail2Ban is a general-purpose intrusion prevention tool. It automatically bans IPs that fail multiple SSH login attempts. To install and enable it:

sudo apt update && sudo apt install fail2ban -y
sudo systemctl enable --now fail2ban

Check if it's running:

sudo systemctl status fail2ban

Fail2Ban comes with a default SSH protection rule, but you can tweak it in /etc/fail2ban/jail.local. Fail2Ban can also be configured to secure other services, such as FTP, Postfix, Apache/Nginx web servers, MySQL, and more. It does a lot with very minimal configuration.


Step 2: Use SSH Keys Instead of Passwords

SSH keys completely eliminate password brute-force attacks. To generate an SSH key:

ssh-keygen -t ed25519 -C "your@email.com"

Copy your key to the server:

ssh-copy-id user@yourserver

Or manually add it to ~/.ssh/authorized_keys on the server.

Why use ED25519?

It's faster and has a much smaller key size than RSA while offering equivalent or better security. In most cases, either option is secure, but some legacy systems may only support RSA.

Managing Multiple Users and Devices

If multiple users need SSH access, each person should have their own key—never share a single key across multiple users. Similarly, if you log in from multiple devices (e.g., laptop, desktop, phone), each device should have its own unique key. This keeps access secure and makes it easy to revoke a single key if needed without affecting others.


Step 3: Disable Password Authentication

Now that SSH keys are set up, disable password logins in /etc/ssh/sshd_config:

PasswordAuthentication no
PermitRootLogin no

Then restart SSH:

sudo systemctl restart sshd

Step 4: Proper Key Management & Permissions

Correct file permissions are critical for SSH security:

chmod 700 ~/.ssh
chmod 600 ~/.ssh/authorized_keys
chmod 644 ~/.ssh/id_ed25519.pub
chmod 600 ~/.ssh/id_ed25519
why does this matter?

If these permissions are too open, SSH will refuse to authenticate for security reasons.


Step 5: Change the SSH Port (Optional, But Recommended)

Changing the SSH port won't stop a targeted attacker—they can easily find it with full port scan. However, security is about layers—this simple change reduces noise from mass scanners and automated attacks, making your logs cleaner and your attack surface slightly smaller.

To change your SSH port, edit /etc/ssh/sshd_config:

Port 22222  # Pick a non-standard port (1024-65535)

Then restart SSH:

sudo systemctl restart sshd

Make sure your firewall allows the new port

You can lock yourself out of your server if you change the SSH port without opening it in your firewall!

sudo ufw allow 22222/tcp

Other Simple Tricks & Things to Keep in Mind

Limit Who Can SSH In
Edit /etc/ssh/sshd_config to allow only specific users:

AllowUsers yourusername

Enable Two-Factor Authentication (2FA) for SSH
You can add Google Authenticator or YubiKey support for extra security.

Monitor SSH Logs Regularly
Run:

sudo journalctl -u sshd --since "1 hour ago"

Or use:

sudo grep "Failed password" /var/log/auth.log

Wrapping Up: What’s Next in the Series?

Security isn’t about a single fix—it’s about stacking multiple layers of protection. The steps above won’t make your system invincible, but they’ll make your SSH service a much harder target.

This was Part 1 of the Linux Hardening Series. In future posts, we’ll cover:

  • Firewall Rules & Network Security
  • Hardening File Permissions & User Access
  • Introduction to Snort IDS/IPS

Stay tuned for more practical security tips to keep your Linux server locked down! 🔐