Restrict SSH user to connection from one machine
Posted
by
Jonathan
on Super User
See other posts from Super User
or by Jonathan
Published on 2011-01-04T17:01:26Z
Indexed on
2011/01/04
17:56 UTC
Read the original article
Hit count: 296
During set-up of a home server (running Kubuntu 10.04), I created an admin
user for performing administrative tasks that may require an unmounted home. This user has a home directory on the root partition of the box.
The machine has an internet-facing SSH server, and I have restricted the set of users that can connect via SSH, but I would like to restrict it further by making admin
only accessible from my laptop (or perhaps only from the local 192.168.1.0/24 range).
I currently have only an
AllowGroups ssh-users
with myself and admin
as members of the ssh-users
group.
What I want is something that works like you may expect this setup to work (but it doesn't):
$ groups jonathan
... ssh-users
$ groups admin
... ssh-restricted-users
$ cat /etc/ssh/sshd_config
...
AllowGroups ssh-users [email protected].*
...
Is there a way to do this? I have also tried this, but it did not work (admin
could still log in remotely):
AllowUsers [email protected].* *
AllowGroups ssh-users
with admin
a member of ssh-users
.
I would also be fine with only allowing admin
to log in with a key, and disallowing password logins, but I could find no general setting for sshd
; there is a setting that requires root
logins to use a key, but not for general users.
© Super User or respective owner