You may wish to revise your guide to better SSH.
https://stribika.github.io/2015/01/04/secure-secure-shell.html
Particularly, running it through a Tor HS.
Other ideal reading is the BetterCrypto guide: https://bettercrypto.org/static/applied-crypto-hardening.pdf
Cheers
On Wed, Mar 4, 2015 at 11:36 AM, Libertas libertas@mykolab.com wrote:
On 03/04/2015 02:05 PM, relay_acab@openmailbox.org wrote:
Hello all. I'm running a new relay, relayacab, at apexy in DE on a minimal Debian 7 OS. Is there a best practices guide for basic security setup? This is my first time operating a remote machine, running a relay, and having any public service to harden. So I'd really like to take this opportunity to do this the right way and continue on a productive path in supporting the tor network. Thanks! +-- relayacab
I wrote this recently:
https://gist.github.com/plsql/49e642d5bce835df2946
Thanks so much for considering security! It's a very important and often neglected aspect of Tor relay operation.
Let me know what you think of the document.
Libertas
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays