How To Protect Your Server

The topic of security has always been relevant in the IT industry. In this article we will give some tips on how to secure your server and try to help to ensure that your server is not subjected to threats and attacks.

Last failed login: Mon Apr 15 13:52:45 MSK 2017 from on ssh:notty
There were 4395 failed login attempts since the last successful login.

If you found approximately such a message during your authorization to the server, it means that unsuccessful authorization attempts were made by someone else. Malicious users pick up SSH passwords purposefully (automatically, or using programmed infected computers).

Configure authorization from specific IP

Configure authorization from specific IP If you plan to connect to the server and conduct work only strictly from one device and / or only from certain IP addresses, you can enter the following lines:

sshd: ALL

In this file:

Sshd: Your IP address

Thus, SSH access for all subnets except the specified one will be denied. After that, you need to restart the service using the service:

service sshd restart

Change SSH port

To change the SSH port you need to uncomment this file /etc/ssh/sshd_config and change Port 22 to a free one, it can be any number up to 65536

After that, you need to start the server with the command:

service sshd restart

Use SSH keys

The advantage and advantage of this method is that you can be authorized on the server without regularly having to send your password through the network.

Even if someone listens on your connection, he will not have the opportunity to intercept and crack your password, since in fact it is never transmitted. Also, using SSH to identify keys eliminates the risk associated with brute-force attacks, by significantly reducing the attacker’s chance to guess the correct credentials.
The key pair is created using the command


The private key (file without extension) is copied to the PC, and the public key ( is copied to the file on the server. .ssh / authorized_keys

In order to disable password authorization, in the same SSH configuration, you need to change the PasswordAuthentication yes directive to PasswordAuthentication no and restart the service – authorization will remain only with the SSH key.

Was this article helpful?

Related Articles

Leave A Comment?