Summary
In this chapter, we’ve seen that a default configuration of Secure Shell isn’t as secure as we’d like it to be, and we’ve seen what to do about it. We’ve looked at how to set up key-based authentication and two-factor authentication, and we’ve looked at lots of different options that can lock down the SSH server. We also looked at how to disable weak encryption algorithms, and at how the new system-wide crypto policies on RHEL 8/CentOS 8 and RHEL 9/AlmaLinux 9 make doing that really easy.
Along the way, we looked at setting up access controls, and at creating different configurations for different users, groups, and hosts. After demoing how to confine SFTP users to their own home directories, we used SSHFS to share a remote directory. We wrapped up this chapter by presenting a handy way to log in to our Linux servers from a Windows desktop machine.
Conspicuous by their absence are a couple of technologies that you may have...