Use this document to track the implementation and verification of security measures on your Linux server.
Status (✅/❌) | Step # | Action Required | Command / Configuration Check |
|---|---|---|---|
Step 1: Key-Based Authentication | |||
1.1 | Generate ED25519 Key Pair (Local Machine) |
| |
1.2 | Set a strong passphrase for the private key. | (Done during generation) | |
1.3 | Copy the Public Key to the server. |
| |
1.4 | Test login using only the key and passphrase. |
| |
--- | --- | --- | --- |
Step 2: Disable Password Login | |||
2.1 | Edit the SSH config file. |
| |
2.2 | Set |
| |
2.3 | Set |
| |
2.4 | Restart the SSH service. |
| |
--- | --- | --- | --- |
Step 3: Change Default Port | |||
3.1 | Edit the SSH config file. |
| |
3.2 | Set |
| |
3.3 | Open the new port in the firewall. |
| |
3.4 | Restart the SSH service. |
| |
--- | --- | --- | --- |
Step 4: Install and Configure Fail2ban | |||
4.1 | Install Fail2ban. |
| |
4.2 | Create a local configuration copy. |
| |
4.3 | Enable the |
| |
4.4 | Start/Enable Fail2ban. |
| |
4.5 | Verify Fail2ban status. |
| |
--- | --- | --- | --- |
Troubleshooting & Verification (Post-Setup) | |||
T.1 | Verify correct permissions on the local private key. |
| |
T.2 | Verify correct permissions on server's |
| |
T.3 | Verify correct permissions on server's |
| |
T.4 | Confirm connecting via the new custom port works. |
|