How do I set up an Ubuntu server to be (securely) available from the internet?
Solution 1:
When properly set-up OpenSSH is safe, even on the standard port. Moving it away from the standard port saves you from your log files being filled up by unauthorized login attempts. More details on the end.
It's very dangerous to access your server if you do not have control over the computer which should connect to your server (which I think that's the reason why you need to use a browser plugin)
OpenVPN can be set up to share TCP ports with a HTTP/HTTPS server, from its manual page:
--port-share host port
When run in TCP server mode, share the OpenVPN port with another
application, such as an HTTPS server.
If OpenVPN senses a connection to its port which is using a non-OpenVPN
protocol, it will proxy the connection to the server at host:port.
Currently only designed to work with HTTP/HTTPS, though it would
be theoretically possible to extend to other protocols such as ssh.
It's not recommended to use OpenVPN with a TCP connection due to its overhead (TCP 3-way handshake). If you've no choice, you could give it a go.
Using OpenVPN, you can avoid any port restriction imposed on you and secure the connection. Please refer to How do I setup OpenVPN so I can securely use the internet from an unsecured hotspot? for a guide on setting up OpenVPN.
You cannot share ports unless an application supports it (like OpenVPN), so I must disappoint you on that.
SSH server
Password-based authentication without limiting connection attempts is asking for trouble. Because of that, it's preferred to use key-based authentication and disable password-based authentication altogether.
-
Install openssh-server by running
sudo apt-get install openssh-server
-
Disable password-based authentication by editing the configuration file
/etc/ssh/sshd_config
. To start editing, runsudo nano /etc/ssh/sshd_config
. Find the line#PasswordAuthentication yes
and change it toPasswordAuthentication no
. By default, SSH listens on port 22. If you want to change it, use a port below 1024 for security reasons. (change the line withPort 22
) -
For extra security, you can configure a list of users who are allowed to login. Add a line with:
AllowUsers someuser
Replace
someuser
by the username of the account that is allowed to log in. Multiple usernames should be separated by a space. -
Generate a key on your computer using the command
ssh-keygen -t rsa
. Enter whatever values you want and choose a secure passphrase. -
Copy the contents of
~/.ssh/id_rsa.pub
file to/home/someuser/.ssh/authorized_keys
file on your server.someuser
is the user that should be allowed to login. (it's a single line that should be copied, never copy the contents of a file that starts with-----BEGIN RSA PRIVATE KEY
-
Reload the configuration of your SSH server:
sudo reload ssh
-
If you're remotely accessing your server over SSH, verify that you can make a new SSH connection to avoid locking yourself out.