Default settings of the UTM, root login is possible if a corresponding user has been created.
High
Longer host keys, no potentially insecure hash algorithms, no root login even if a corresponding user has been created.
Very high
Extremely limited list of hash algorithms, ciphers and key exchange algorithms, no root login even if a corresponding user has been created.
Custom
The user defines his list of hash algorithms, ciphers and key exchange algorithms, root login activatable
Allow pending connections:
10
The number of simultaneously established connections that have not yet been authenticated.
Initial drop chance:
30 %
Percentage of connections that are discarded over the allowed unauthenticated ones.
Maximum pending connections:
100
Set of simultaneous connections above which all unauthenticated connections are discarded.
Login grace time:
120
Time in seconds available for authentication
Custom security settings
Custom security settings
Caption
Value
Description
HMAC list:
Medium hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1-96,hmac-md5-96
List of approved Keyed-Hash Message Authentication Code hash algorithms.
High hmac-sha2-512-etm@openssh.com,hmac-sha2-256-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512,hmac-sha2-256,umac-128@openssh.com
Very high hmac-sha2-256-etm@openssh.com
Cipher-Suite:
Medium aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se
Defines which encryptions are permitted for SSH.
High chacha20-poly1305@openssh.com,aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr
Very high chacha20-poly1305@openssh.com
KEX algorithm:
Medium ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
Only the key exchange algorithms specified here may be used.
High curve25519-sha256@libssh.org,diffie-hellman-group-exchange-sha256
Very high curve25519-sha256@libssh.org
Allow root access
On
Only possible with Medium or Custom
Root access
Root with user authentication
notempty
Note There is no root access via user authentication in the high and very high mode. Here, only authentication via Public Key is possible.
If, nevertheless, root access with user authentication in the security levels high and very high is desired, the lists from these modes can be copied into the User Defined mode and root activated.
Root access via public key
The following steps are necessary to carry out authentication without a password via an SSH console using ssh-public-key:
Step
Description
Generate Key Pair
Creating an SSH-RSA Key Pair
This can be generated on a Windows system with an additional programme such as "puttygen".
With newer versions of the PuTTY key generator, it may be necessary to adjust the file version of the private key, otherwise PuTTY cannot use the self-created key. Menu Key Submenu: Parameters for saving key files. There, select the PPK file version2 and save.
Step 2: "PKK file version" has to be set to the value "2"
On a Linux/Unix system, the tool "ssh-keygen" is available, which is executed with the option ssh-keygen -t rsa .
Location of the key
The public part of the key can be saved after creation with "puttygen" with Save public key and Save private key , by default in the document directory of the Windows user.
For Linux/Unix, this is located in the user directory under /home/user/.ssh/
Format public key
The PuTTYgen file must still be adapted in this regard:
The public-key must have the following format:
ssh-rsa <public-key>.
Since there is a space between "ssh-rsa" and the key, the entire content must be enclosed in inverted commas.
Furthermore, care must be taken that the line breaks of the public key are removed.
In addition, the optional entry of the user should also be added in the form "User@Computer". It should look like this:
This is already set up in the Linux file "id_rsa.pub".
Transfer the public key to the UTM
Now this key is copied and added via an SSH console with the following CLI command:
system ssh pubkey new key "ssh-rsa AAAAB3NzaC1....93stGrJPeQ= a.admin@ttt-point.de"
Activate RSA key on the UTM
To use the RSA key, it is enabled with the following CLI command: .
system ssh pubkey enable id 1
The ID of this key can be queried with the command system ssh pubkey get .
Activate authentication via public key
To be able to authenticate via an SSH console using a public key, this must be activated. The corresponding CLI command on the UTM is: extc global set variable "GLOB_SSH_PUBKEY_AUTH" value 1 .
Finally, the UTM system is updated with the CLI command system update system.
Integrate private key
Under PuTTY, the file with the private key must now be added in the menu Category → Connection → SSH → Auth and in the field Host Name, the user is transferred in the format root@<IP address>.
Adding a Private Key to a PuTTY Profile
Putty profile
Attention! No SSH session can be opened with PuTTY in "high" and "very high" mode. The key exchange algorithms required there are not supported by PuTTY.
With the SSH client under Linux, the command ssh root@<IP address> is sufficient, as the key is stored at a defined location in the system.
CLI
The settings made in the web interface are visible on the CLI via the following commands.
The variable SECMODE indicates which SSH configuration is currently active.
There are four configurations that can be assigned to this variable:
value
Meaning
0
Very high
1
High
2
Medium
3
Custom
If the variable is assigned to a different configuration in the CLI, then this instruction must be activated by restarting the SSHD application.
extc value set application "sshd" variable SECMODE value 1
appmgmt restart application "sshd"
Note: Safety precautions during configuration tests
notempty
If it is planned to manipulate new encryptions or the SSH settings via the web interface or the CLI, an SSH connection to the UTM should be established before the changeover. Existing SSH connections are not interrupted by changing the encryption or SSH settings.