From 1f67ba9711bdd641b48436a70f4068c1ce2199a6 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Imm=C3=A1nuel!?= <21174107+immanuelfodor@users.noreply.github.com> Date: Mon, 1 Jun 2020 10:07:37 +0200 Subject: [PATCH] Updated OPNsense 20.1.2 and newer (markdown) --- OPNsense-20.1.2-and-newer.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/OPNsense-20.1.2-and-newer.md b/OPNsense-20.1.2-and-newer.md index 4da4dd6..230ef77 100644 --- a/OPNsense-20.1.2-and-newer.md +++ b/OPNsense-20.1.2-and-newer.md @@ -6,14 +6,14 @@ https://opnsense.org | https://github.com/opnsense # SSH hardening guide for OPNsense 20.1.2 and newer -Some of the SSH hardening recommendations from https://www.ssh-audit.com/hardening_guides.html can be set directly on the OPNsense web interface in the `System -> Settings -> Administration -> Secure Shell` menu. +Some of the SSH hardening recommendations from https://www.ssh-audit.com/hardening_guides.html can be set directly on the OPNsense web interface via the `System -> Settings -> Administration -> Secure Shell` form. As of 2020-06-01, you can tune the following SSH settings: - Enable/Disable the SSH server - Limit the user group who can login over SSH - Allow/Disallow root user login - Allow/Disallow password login (set up user keys in `System -> Access -> Users -> Add/Edit user -> Authorized keys` -- Configure an alternative SSH port +- Configure an alternative SSH port) - Limit the interfaces the SSH server listens on - Select the allowed key exchange algorithms _(see how to enable the feature below)_ - Select the allowed ciphers _(see how to enable the feature below)_