File: hardening.md

package info (click to toggle)
erlang 1%3A27.3.4.1%2Bdfsg-1
  • links: PTS, VCS
  • area: main
  • in suites: trixie
  • size: 225,000 kB
  • sloc: erlang: 1,658,966; ansic: 405,769; cpp: 177,850; xml: 82,435; makefile: 15,031; sh: 14,401; lisp: 9,812; java: 8,603; asm: 6,541; perl: 5,836; python: 5,484; sed: 72
file content (243 lines) | stat: -rw-r--r-- 10,103 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
<!--
%CopyrightBegin%

Copyright Ericsson AB 2023. All Rights Reserved.

Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at

    http://www.apache.org/licenses/LICENSE-2.0

Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.

%CopyrightEnd%
-->
# Hardening

## Introduction

The Erlang/OTP SSH application is intended to be used in other applications as a
library.

Different applications using this library may have very different requirements.
One application could be running on a high performance server, while another is
running on a small device with very limited cpu capacity. For example, the first
one may accept many users simultaneously logged in, while the second one wants
to limit them to only one.

That simple example shows that it is impossible to deliver the SSH application
with default values on hardening options as well on other options that suites
every need.

The purpose of this guide is to discuss the different hardening options
available, as a guide to the reader. Configuration in general is described in
the [Configuration in SSH](configurations.md) chapter.

## Resilience to DoS attacks

The following applies to daemons (servers).

DoS (Denial of Service) attacks are hard to fight at the node level. Here are
firewalls and other means needed, but that is out of scope for this guide.
However, some measures could be taken in the configuration of the SSH server to
increase the resilence. The options to use are:

### Counters and parallelism

- **[max_sessions](`m:ssh#hardening_daemon_options-max_sessions`)** - The
  maximum number of simultaneous sessions that are accepted at any time for this
  daemon. This includes sessions that are being authorized. The default is that
  an unlimited number of simultaneous sessions are allowed. It is a good
  candidate to set if the capacity of the server is low or a capacity margin is
  needed.

- **[max_channels](`m:ssh#hardening_daemon_options-max_channels`)** - The
  maximum number of channels that are accepted for each connection. The default
  is unlimited.

- **[parallel_login](`m:ssh#hardening_daemon_options-parallel_login`)** - If set
  to false (the default value), only one login is handled at a time. If set to
  true, the number of simultaneous login attempts are limited by the value of
  the [max_sessions](`m:ssh#hardening_daemon_options-max_sessions`) option.

### Timeouts

- **[hello_timeout](`t:ssh:hello_timeout_daemon_option/0`)** - If the client
  fails to send the first ssh message after a tcp connection setup within this
  time (in milliseconds), the connection is closed. The default value is 30
  seconds. This is actually a generous time, so it can lowered to make the
  daemon less prone to DoS attacks.

- **[negotiation_timeout](`t:ssh:negotiation_timeout_daemon_option/0`)** -
  Maximum time in milliseconds for the authentication negotiation counted from
  the TCP connection establishment. If the client fails to log in within this
  time the connection is closed. The default value is 2 minutes. It is quite a
  long time, but can lowered if the client is supposed to be fast like if it is
  a program logging in.

- **[idle_time](`t:ssh:max_idle_time_common_option/0`)** - Sets a time-out on a
  connection when no channels are left after closing the final one. It defaults
  to infinity.

- **[max_initial_idle_time](`t:ssh:max_initial_idle_time_daemon_option/0`)** -
  Sets a time-out on a connection that will expire if no channel is opened on
  the connection. The timeout is started when the authentication phase is
  completed. It defaults to infinity.

A figure clarifies when a timeout is started and when it triggers:

![SSH server timeouts](assets/ssh_timeouts.jpg "SSH server timeouts")

## Verifying the remote daemon (server) in an SSH client

Every SSH server presents a public key - the _host key_ \- to the client while
keeping the corresponding private key in relatively safe privacy.

The client checks that the host that presented the public key also possesses the
private key of the key-pair. That check is part of the SSH protocol.

But how can the client know that the host _really_ is the one that it tried to
connect to and not an evil one impersonating the expected one using its own
valid key-pair? There are two alternatives available with the default key
handling plugin `m:ssh_file`. The alternatives are:

- **Pre-store the host key** - \* For the default handler ssh_file, store the
  valid host keys in the file [`known_hosts`](`m:ssh_file#FILE-known_hosts`) and
  set the option
  [silently_accept_hosts](`m:ssh#hardening_client_options-silently_accept_hosts`)
  to `false`.

  - or, write a specialized key handler using the
    [SSH client key API](`m:ssh_client_key_api`) that accesses the pre-shared
    key in some other way.

- **Pre-store the "fingerprint" (checksum) of the host key** - \*
  [silently_accept_hosts](`m:ssh#hardening_client_options-silently_accept_hosts`)
  - [`accept_callback()`](`t:ssh:accept_callback/0`)
  - [`{HashAlgoSpec, accept_callback()}`](`t:ssh:accept_hosts/0`)

## Verifying the remote client in a daemon (server)

- **Password checking** - The default password checking is with the list in the
  [user_passwords](`m:ssh#option-user_passwords`) option in the SSH daemon. It
  could be replaced with a [pwdfun](`m:ssh#option-pwdfun`) plugin. The arity
  four variant ([`pwdfun_4()`](`t:ssh:pwdfun_4/0`)) can also be used for
  introducing delays after failed password checking attempts. Here is a simple
  example of such a pwdfun:

  ```erlang
  fun(User, Password, _PeerAddress, State) ->
          case lists:member({User,Password}, my_user_pwds()) of
              true ->
                  {true, undefined}; % Reset delay time
              false when State == undefined ->
                  timer:sleep(1000),
                  {false, 2000}; % Next delay is 2000 ms
              false when is_integer(State) ->
                  timer:sleep(State),
                  {false, 2*State} % Double the delay for each failure
          end
  end.
  ```

  If a public key is used for logging in, there is normally no checking of the
  user name. It could be enabled by setting the option
  [`pk_check_user`](`m:ssh#option-pk_check_user`) to `true`. In that case the
  pwdfun will get the atom `pubkey` in the password argument.

## Hardening in the cryptographic area

### Algorithm selection

One of the cornerstones of security in SSH is cryptography. The development in
crypto analysis is fast, and yesterday's secure algorithms are unsafe today.
Therefore some algorithms are no longer enabled by default and that group grows
with time. See the
[SSH (App)](ssh_app.md#supported-specifications-and-standards) for a list of
supported and of disabled algorithms. In the User's Guide the chapter
[Configuring algorithms in SSH](configure_algos.md) describes the options for
enabling or disabling algorithms -
[preferred_algorithms](`t:ssh:preferred_algorithms_common_option/0`) and
[modify_algorithms](`t:ssh:modify_algorithms_common_option/0`).

### Re-keying

In the setup of the SSH connection a secret cipher key is generated by
co-operation of the client and the server. Keeping this key secret is crucial
for keeping the communication secret. As time passes and encrypted messages are
exchanged, the probability that a listener could guess that key increases.

The SSH protocol therefore has a special operation defined - _key
re-negotiation_ or _re-keying_. Any side (client or server) could initiate the
re-keying and the result is a new cipher key. The result is that the
eves-dropper has to restart its evil and dirty craftmanship.

See the option [rekey_limit](`t:ssh:rekey_limit_common_option/0`) for a
description.

## Hardening of the SSH protocol - both daemons and clients

### Disabling shell and exec in a daemon

A daemon has two services for evaluating tasks on behalf of a remote client. The
_exec_ server-side service takes a string provided by the client, evaluates it
and returns the result. The _shell_ function enables the client to open a shell
in the shell host.

Those service could - and should - be disabled when they are not needed. The
options [exec](`t:ssh:exec_daemon_option/0`) and
[shell](`t:ssh:shell_daemon_option/0`) are enabled per default but could be set
to `disabled` if not needed. The same options could also install handlers for
the string(s) passed from the client to the server.

### The id string

One way to reduce the risk of intrusion is to not convey which software and
which version the intruder is connected to. This limits the risk of an intruder
exploiting known faults or peculiarities learned by reading the public code.

Each SSH client or daemon presents themselves to each other with brand and
version. This may look like

```text
SSH-2.0-Erlang/4.10
```

or

```text
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
```

This brand and version may be changed with the option
[id_string](`t:ssh:id_string_common_option/0`). We start a daemon with that
option:

```erlang
	ssh:daemon(1234, [{id_string,"hi there"}, ... ]).
```

and the daemon will present itself as:

```text
SSH-2.0-hi there
```

It is possible to replace the string with one randomly generated for each
connection attempt. See the reference manual for
[id_string](`t:ssh:id_string_common_option/0`).

## Client connection options

A client could limit the time for the initial tcp connection establishment with
the option [connect_timeout](`t:ssh:connect_timeout_client_option/0`). The time
is in milliseconds, and the initial value is infinity.

The negotiation (session setup time) time can be limited with the _parameter_
`NegotiationTimeout` in a call establishing an ssh session, for example
`ssh:connect/3`.