> sudo vi /etc/ssh/sshd_config # here is the port
Port xx x # set port here
ListenAddress :: # enable all ipv6
ListenAddress 0.0.0.0 # enable all ipv4
LogLevel DEBUG # change log level like INFO, DEBUG3
AllowUsers <user> # allow only this user
PermitRootLogin prohibit-password # activate to disable root
> sudo vi /etc/ssh/ssh_config # this is general
> cd /etc/ssh/sshd_config.d # check also sub configurations
> sudo systemctl status ssh # check status
> sudo service ssh restart # reload / restart
> sudo /etc/init.d/ssh restart # reload / restart alternative
> sudo netstat -pantWul # check connections
Check port ranges
, Common Ports
Windows
> ssh 2a02:5a0:4110:f590:4670:d3e6:1234:6547 -p 123 # with custom port > ssh markus@192.168.188.76 # with username > ssh pi5backup.v6.rocks -p 31415 ipv6 fe80::7ea5:7cb2:6563:1518 # with source ipv6
> sudo apt install unattended-upgrades > sudo dpkg-reconfigure --priority=low unattended-upgrades
> sudo apt-get install fail2ban > sudo vi /etc/fail2ban/jail.conf
> sudo journalctl -b # since last boot > sudo journalctl -k | grep netfilter > sudo journalctl _COMM=sshd > sudo journalctl --vacuum-time=1d # purge, keep last day > sudo journalctl --vacuum-size=500M # purge, keep last 500MB > sudo rm -r /var/log/journal/* # if purging does not help you can erase the whole file and restart > systemctl restart systemd-journald
#
, docu2
#!/usr/bin/env python
import socket # determine ipv6
import subprocess
tupel = socket.getaddrinfo('your.pc.com', None, socket.AF_INET6)
# tupel like [(<AddressFamily.AF_INET6: 23>, 0, 0, '', ('2a02:5a0:4110:f590:4670:d3e6:f2bc:ee', 8384, 0, 0))]
print("tupel=", tupel)
ipv6=tupel[0][4][0]
print("ipv6=", ipv6)
subprocess.run(["/usr/sbin/ip6tables", "-R", "INPUT", "1", "-s", ipv6, "-j", "ACCEPT"])
subprocess.run(["/usr/sbin/ip6tables", "-R", "OUTPUT", "1", "-d", ipv6, "-j", "ACCEPT"])
> sudo crontab -u root -e # anything is activated on save automatically # add following */5 * * * * /home/markus/update_ip6tables.py