How to Install and Enable SSH on Fedora Linux

Secure Shell, commonly called SSH, is a network protocol that allows secure remote access and management of Linux servers. Its strong encryption and authentication features have gained popularity over older unsecure methods such as Telnet and FTP. SSH provides secure and encrypted communication between two systems over an unsecured network and prevents attackers from intercepting the data transmitted between them. With SSH, system administrators and developers can securely manage remote servers and execute commands.

SSH’s popularity is mainly attributed to its strong security features, which include data encryption, public-key authentication, and secure tunneling. The protocol uses strong encryption algorithms such as AES and Blowfish to encrypt data transmitted between two systems. SSH also supports public-key authentication, which uses a private key to authenticate the user rather than a password. This method is much more secure than traditional password-based authentication, as it is not vulnerable to brute-force attacks. SSH also provides secure tunneling, which enables secure communication between two systems over an untrusted network.

The use of SSH has become standard practice for remote server management and file transfer across a variety of industries, including finance, healthcare, and government. As more organizations have recognized the importance of data security, they have increasingly adopted SSH as a secure and reliable remote access and management method.

The following guide will demonstrate installing and enabling SSH on Fedora Linux using the command line terminal. With our step-by-step instructions, you can easily set up SSH on your Fedora Linux system and start managing remote servers securely and efficiently.

Step 1: Update Fedora

Before installing, enabling, and configuring SSH on Fedora, ensuring your system packages are up-to-date is important to avoid potential conflicts. You can do this by executing the following command:

sudo dnf upgrade --refresh

Section 2: Checking for OpenSSH Server

The first step is to check whether the OpenSSH server is installed on your Fedora system. To do so, execute the following command in the terminal:

rpm -qa | grep openssh-server

This command should produce a relevant output if the SSH server is installed. In case the output is missing, use the dnf command to install the OpenSSH server:

sudo dnf install openssh-server

Section 3: Enabling and Starting the SSHD Service

After installing the OpenSSH server, the next step is to enable the systemd service SSHD to ensure that the SSH daemon starts automatically after each reboot. Execute the following command in the terminal:

sudo systemctl enable sshd

Once the SSHD service is enabled, use the systemctl command to start the SSH server:

sudo systemctl start sshd

To check the status of the SSH server, use the following command:

sudo systemctl status sshd

You should now see that port 22 is open for incoming connections:

sudo ss -lt

Section 4: Using SSH to Connect to a Remote Server

Now that you have installed and enabled SSH on your Fedora Linux system, you can connect to a remote server. Here are some examples of how to use SSH to connect to a remote server:

  1. Connecting to a Remote Server with Password Authentication

To connect to a remote server using SSH with password authentication, use the following command:

ssh username@remote_server

Replace “username” with your username and “remote_server” with the IP address or hostname of the remote server. You will be prompted to enter your password to authenticate.

  1. Connecting to a Remote Server with Public Key Authentication

To connect to a remote server using SSH with public key authentication, use the following command:

ssh -i /path/to/private_key username@remote_server

Replace “/path/to/private_key” with the path to your private key file, “username” with your username, and “remote_server” with the IP address or hostname of the remote server. You will not be prompted to enter a password; the authentication is based on the private key.

  1. Specifying a Different Port

By default, SSH uses port 22 to connect to a remote server. If the remote server is listening on a different port, you can specify it using the “-p” option. For example:

ssh -p 2222 username@remote_server

Replace “2222” with the port number on which the remote server is listening.

  1. Transferring Files with SCP

SCP (Secure Copy) is a command-line tool that allows you to transfer files between systems using SSH securely. To transfer a file from your local system to a remote server, use the following command:

scp /path/to/local/file username@remote_server:/path/to/remote/directory

Replace “/path/to/local/file” with the path to the file you want to transfer, “username” with your username, “remote_server” with the IP address or hostname of the remote server, and “/path/to/remote/directory” with the path to the directory on the remote server where you want to transfer the file.

Section 5: Configuring SSH Examples

You can add some useful configurations to the SSH configuration file (/etc/ssh/sshd_config) to improve security and performance. These may not be recommended for your server or desktop setup; this is a user choice and just examples.

  1. Disable GSSAPI Authentication

GSSAPI authentication can cause delays in SSH connection establishment. To disable it, add the following line to the SSH configuration file:

GSSAPIAuthentication no
  1. Adjust SSH Session Timeouts

To adjust the SSH session timeouts, add the following lines to the SSH configuration file:

ClientAliveInterval 300
ClientAliveCountMax 2

These settings will cause the SSH server to send a message to the client every 5 minutes to keep the session alive and terminate the session if no response is received after two messages.

  1. Disable Root Login

Disabling root login is a common security measure that can protect against brute-force attacks. To disable it, add the following line to the SSH configuration file:

PermitRootLogin no
  1. Use Public Key Authentication

Public key authentication is a more secure method of authentication than password-based authentication. To use public key authentication, generate a new SSH key pair using the following command:

ssh-keygen -t rsa -b 4096

Then, copy the public key to the remote server using the following command:

ssh-copy-id user@remote_server

Replace “user” with your username and “remote_server” with the IP address or hostname of the remote server. Finally, edit the SSH configuration file to enable public key authentication:

PubkeyAuthentication yes
  1. Restrict SSH Access to Specific Users or Groups

To restrict SSH access to specific users or groups, add the following lines to the SSH configuration file:

AllowUsers user1 user2
AllowGroups group1 group2

Replace “user1 user2” with the usernames of the users you want to access and “group1 group2” with the names of the groups you want to access.

  1. hanging the Port of SSH

By default, SSH uses port 22 to listen for incoming connections. This is a well-known port often targeted by attackers, and changing the port can help protect against unauthorized access. To change the port of SSH, add the following line to the SSH configuration file:

Port <port_number>

Replace “<port_number>” with a different port number. It is recommended to choose a port number between 1024 and 65535 that another service does not use.

Section 6: Securing SSH with Firewalld

Firewalld is a powerful firewall management tool that can secure your Fedora system and block unauthorized access to your SSH server. To secure SSH with Firewalld, execute the following commands in the terminal:

  1. Add the SSH service to Firewalld:
sudo firewall-cmd --add-service=ssh --permanent
  1. Reload the Firewalld configuration:
sudo firewall-cmd --reload
  1. Check the status of the SSH service in Firewalld:
sudo firewall-cmd --list-services | grep ssh

This will show whether the SSH service is allowed through the firewall.

Conclusion

SSH is a critical tool for remote access and management of Linux servers, and it is essential to install and configure it properly to ensure optimal security and performance. Following the steps outlined in this guide, you can easily install and enable SSH on your Fedora Linux system and configure it for optimal performance and security. Whether you are a system administrator or a developer, SSH will make it easy to manage your remote servers and perform common tasks like transferring files and managing processes.

FAQs on SSH with Fedora

Q: What is SSH, and how does it work on Fedora Linux?

A: SSH (Secure Shell) is a protocol that allows secure remote login and command execution over an insecure network. SSH is typically installed and enabled by default on Fedora Linux and can be configured using the SSH configuration file.

Q: How can SSH improve the security of remote connections on Fedora?

A: SSH provides strong encryption and authentication mechanisms, making it a more secure remote access method than older protocols like Telnet or FTP. It also supports various security features, such as public key authentication, connection timeouts, and restrictions on root login.

Q: What are the benefits of using public key authentication with SSH on Fedora?

A: Public key authentication provides a more secure and convenient way to authenticate with SSH. Instead of entering a password each time, users can generate a key pair and use the private key to authenticate automatically.

Q: How can I troubleshoot SSH connection issues on Fedora, such as timeout errors or failed logins?

A: SSH connection issues can be caused by various factors, such as network connectivity, firewall rules, or incorrect configuration. To troubleshoot these issues, you can check the SSH logs, verify that the SSH service is running, and test the connection with other tools like Telnet or Ping.

Q: What are some best practices for configuring SSH on Fedora, such as disabling root login or limiting authentication attempts?

A: Best practices for configuring SSH on Fedora include disabling root login, limiting authentication attempts, using public key authentication, and adjusting session timeouts. These measures can help to reduce the risk of unauthorized access and mitigate potential security threats.

Q: How can I use SSH to transfer files between systems on Fedora securely?

A: You can use the SCP (Secure Copy) command to transfer files securely over SSH. This command allows you to copy files from one system to another, using encryption to protect the data in transit.

Q: What are some common SSH security risks on Fedora, and how can they be mitigated?

A: Common SSH security risks on Fedora include weak passwords, outdated software, and misconfigured settings. These risks can be mitigated using strong passwords, keeping software up-to-date, and following best practices for configuring SSH.

Q: How can I optimize SSH performance on Fedora for faster connections and lower latency?

A: You can optimize SSH performance on Fedora by adjusting various settings, such as the encryption algorithm, compression level, and window size. You can also use tools like Mosh or Speedify to improve performance and reliability further.

Share to...