Sorry, I was halfway through a reply and then my imac rebooted spontaneously. :| I realized I forgot to answer your secondary question, which was what's the recommendation for keys.
Long answer: https://uwaterloo.atlassian.net/wiki/spaces/ISTKB/pages/1548878163/SSH+Key+Generation - linked to from the Authman Documentation tab too.
Short answer: ed25519 keys are preferred; if RSA is required, then 4k+ keys are required.
Mike
-- Mike Patterson - pronouns he/him - Manager, Information Security Operations Information Security Services, University of Waterloo +1 519-888-4567, x47178 / mike.patterson@uwaterloo.ca Security Operations Centre x41125 / soc@uwaterloo.ca
On Thu, 22 Jul 2021 10:04:44 -0400, mpatters wrote:
...
> It might help to think of the mitigation noted in the memo, in reverse
> order, as a priority list, with step 0 having been left off.
>
> 0 - if folks don't need to ssh to the system, shut off the service.
>
> 1 - if possible, restrict access to the system from off-campus
> (network+host firewall policies) and require the VPN,
>
> 2 - if off-campus access is required, decide if you
> a) want to allow passwords but enforce 2FA
> XOR
> b) want to restrict access to only keys.
>
> So keys-only is fine, passwords+2fa are fine, passwords for an on-
> campus only service are fine (consider restricting only to sources
> that require it if you can), but keyboard-interactive with no 2fa for
> off-campus is not fine. I suppose you could use keys only + 2fa if you
> liked as well.
Due to the increasing security threats leveraging passwords, the University of Waterloo has moved to require that all SSH Servers exposed to the public Internet must enforce strong authentication by November 1st, 2021.
The host(s) listed above appear(s) to allow password authentication. We ask that you make one of the following changes to the configuration of your SSH server(s) before November 1st: