home.social

#authorized_keys — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #authorized_keys, aggregated by home.social.

  1. Nun sag', wie hast du's mit den SSH-Keys? Was ist da Best Practice? Einen für alles? Für jeden Zweck / jede Ziel-Maschine einen extra? Einen extra für Git? Einen für privat, einen für beruflich? Ständig nach Bedarf neue anlegen? Speichern im Passwort-Manager? Notieren, wo welcher Private Key liegt?

    Ich hab da bisher kein richtiges System und brauch Hilfe (d.h. bitte Re-Tooten oder wie das hier heißt). Danke!

    #ssh #keys #authorized_keys #git #hilfe

  2. 找了个时间优化了服务器便利性和“安全性”

    1. Termius访问
    Termius生成三个密钥分配给三台服务器
    export到~/.ssh/authorized_keys
    检查authorized_keys内容正确
    测试密钥&无密码登录

    2. 配置ufw
    sudo ufw default deny incoming
    sudo ufw default allow outgoing
    sudo ufw allow http
    sudo ufw allow https
    sudo ufw allow 特殊端口/tcp
    sudo ufw enable
    sudo ufw status verbose

    3. 配置fail2ban
    sudo nano /etc/fail2ban/jail.local
    [DEFAULT]
    bantime = 1h
    findtime = 10m
    maxretry = 5
    banaction = ufw
    ignoreip = 127.0.0.1/8 ::1 X Y Z
    [sshd]
    enabled = true
    port = 特殊端口
    backend = systemd

    sudo apt update && sudo apt install python3-systemd -y
    sudo systemctl enable --now fail2ban
    sudo systemctl restart fail2ban
    sudo fail2ban-client status sshd

    3. 配置sshd_config
    sudo nano /etc/ssh/sshd_config
    Port 特殊端口
    PermitRootLogin no
    PubkeyAuthentication yes
    PasswordAuthentication no

    sudo sshd -t
    sudo systemctl restart ssh

    4. 更改hostname
    sudo hostnamectl set-hostname xxx
    sudo nano /etc/hosts
    修改127.0.1.1 后主机名为xxx
    hostnamectl status

    5. 配置互通
    ssh-keygen -t ed25519 -C "from_$(hostname)" -N "" -f ~/.ssh/id_ed25519
    cat id_ed25519.pub
    nano ~/.ssh/authorized_keys
    一共三行,Termius pub、其他两台服务器的pub

    6. 配置Alias
    nano ~/.bashrc
    alias nc='ssh -p 特殊端口 jay@ipX'
    alias cc='ssh -p 特殊端口 jay@ipY'
    alias hd='ssh -p 特殊端口 jay@ipZ'
    source ~/.bashrc
    nc (netcup)
    cc (clawcloud)
    hd (hostdzire)
    或者
    nano ~/.ssh/config
    Host nc
    HostName X
    Port 特殊端口
    User jay
    Host cc
    HostName Y
    Port 特殊端口
    User jay
    Host hd
    HostName Z
    Port 特殊端口
    User jay
    ssh nc
    ssh cc
    ssh hd
    还可以加上“ProxyJump cc”连 xxx 之前先跳到 cc

    #ssh #sshd #pub #alias #ProxyJump #authorized_keys #termius #ufw #fail2ban

  3. 找了个时间优化了服务器便利性和“安全性”

    1. Termius访问
    Termius生成三个密钥分配给三台服务器
    export到~/.ssh/authorized_keys
    检查authorized_keys内容正确
    测试密钥&无密码登录

    2. 配置ufw
    sudo ufw default deny incoming
    sudo ufw default allow outgoing
    sudo ufw allow http
    sudo ufw allow https
    sudo ufw allow 特殊端口/tcp
    sudo ufw enable
    sudo ufw status verbose

    3. 配置fail2ban
    sudo nano /etc/fail2ban/jail.local
    [DEFAULT]
    bantime = 1h
    findtime = 10m
    maxretry = 5
    banaction = ufw
    ignoreip = 127.0.0.1/8 ::1 X Y Z
    [sshd]
    enabled = true
    port = 特殊端口
    backend = systemd

    sudo apt update && sudo apt install python3-systemd -y
    sudo systemctl enable --now fail2ban
    sudo systemctl restart fail2ban
    sudo fail2ban-client status sshd

    3. 配置sshd_config
    sudo nano /etc/ssh/sshd_config
    Port 特殊端口
    PermitRootLogin no
    PubkeyAuthentication yes
    PasswordAuthentication no

    sudo sshd -t
    sudo systemctl restart ssh

    4. 更改hostname
    sudo hostnamectl set-hostname xxx
    sudo nano /etc/hosts
    修改127.0.1.1 后主机名为xxx
    hostnamectl status

    5. 配置互通
    ssh-keygen -t ed25519 -C "from_$(hostname)" -N "" -f ~/.ssh/id_ed25519
    cat id_ed25519.pub
    nano ~/.ssh/authorized_keys
    一共三行,Termius pub、其他两台服务器的pub

    6. 配置Alias
    nano ~/.bashrc
    alias nc='ssh -p 特殊端口 jay@ipX'
    alias cc='ssh -p 特殊端口 jay@ipY'
    alias hd='ssh -p 特殊端口 jay@ipZ'
    source ~/.bashrc
    nc (netcup)
    cc (clawcloud)
    hd (hostdzire)
    或者
    nano ~/.ssh/config
    Host nc
    HostName X
    Port 特殊端口
    User jay
    Host cc
    HostName Y
    Port 特殊端口
    User jay
    Host hd
    HostName Z
    Port 特殊端口
    User jay
    ssh nc
    ssh cc
    ssh hd
    还可以加上“ProxyJump cc”连 xxx 之前先跳到 cc

    #ssh #sshd #pub #alias #ProxyJump #authorized_keys #termius #ufw #fail2ban