

Note: if you have compatibility problem with ed25519 protocol, you should use the RSA 4096 keys as a 2nd choice. This guide was made using Ubuntu 20.04 LTS on the node server side and Debian 10 Buster on the client side.
#Something like putty for mac software
Its weakness is that it requires a recent OS.įor clarity reasons, we won’t mention the RSA protocol as we consider you are using up-to-date software to run your server in 2021 but some configurations can require it. We will use the curve25519-sha256 protocol ( ECDH over Curve25519 with SHA2) for our keys here as this is considered the most secure nowadays. We will also c hange the default SSH port to mitigate scans and bruteforce attempts. In this article, we are going to build a secure SSH connection with strong SSH keys as described in here in a simplified version. Scary right? If you are running a blockchain node like us, as soon as your node connected to other peers and telemetry server, you become a valuable t arget to hackers.


Wanna see how many there are on your server? Just try this command: journalctl | grep sshd The SSH access is the most standard attack vector for an online server, there is an incredible number of robots and hackers who scan the default port 22 and try to gain access with basic and elaborated credentials. Talking with the community, we realized how much the crucial point of SSH connection can sometimes be underestimated. In our previous article, we explained how much wecare about security for our Kusama validator node.
