How to install and configure SSH on Ubuntu 22.04

A secure connection between a client and a server is made possible via the SSH network protocol. Since all communications are encrypted, distant network attacks and data theft across the network are avoided.

The installation and configuration of SSH on Ubuntu 22.04 will be covered in the guide below.

Step 1: Prepare Ubuntu

Update all of the apt packages to the most recent versions before beginning to install SSH on Ubuntu. Use the following command to accomplish this:

							
							
					sudo apt update && sudo apt upgrade				
			

Step 2: Install SSH on Ubuntu

 

OpenSSH is not pre-installed on the system, so let’s install it manually. To do this, type in the terminal:

							
							
					sudo apt install openssh-server				
			

All of the required parts will start to be installed. Respond “Yes” to every prompt from the system.

To begin the service after the installation is finished, proceed to the following step.

Step 3: Start SSH

 

Now you need to enable the service you just installed using the command below:

							
							
					sudo systemctl enable --now ssh				
			

You will receive the following system notification after a successful startup.

By using the –now parameter, you can both start the service and configure it to run when the computer boots up.

To confirm that the service is operational and activated, enter:

							
							
					sudo systemctl status ssh				
			

The output should contain the Active: active (running) line, which indicates that the service is successfully running.

If you want to disable the service, execute:

							
							
					sudo systemctl disable ssh				
			

It disables the service and prevents it from starting at boot.

Step 4: Configure the firewall

 

Before connecting to the server via SSH, check the firewall to ensure it is configured correctly.

In our case, we have the UFW installed, so we will use the following command:

							
							
					sudo ufw status				
			

In the output, you should see that SSH traffic is allowed. If you don’t have it listed, you need to allow incoming SSH connections. This command will help with this:

							
							
					sudo ufw allow ssh				
			

Step 5: Connect to the server

 

Once you complete all the previous steps, you can log into the server using the SSH protocol.

To do this, you will need the server’s IP address or domain name and the name of a user created on the server.

In the terminal line, enter the command:

							
							
					ssh username@IP_address				
			

Or: 

							
							
					ssh username@domain				
			

Step 6: Configure SSH

 

Having completed the previous five steps, you can already connect to the server remotely. However, you can further increase the connection’s security by changing the default connection port to another or changing the password authentication to key authentication. These and other changes require editing the SSH configuration file.

The main OpenSSH server settings are stored in the main configuration file sshd_config (location: /etc/ssh). Before you start editing, you should create a backup of this file: 

							
							
					sudo cp /etc/ssh/sshd_config /etc/ssh/sshd_config.initial				
			

If you get any errors after editing the configuration file, you can restore the original file without problems.

After creating the backup, you can proceed to edit the configuration file. To do this, open it using the nano editor:

							
							
					sudo nano /etc/ssh/sshd_config				
			

In the file, change the port to a more secure one. It is best to set values from the dynamic range of ports (49152 – 65535) and use different numbers for additional security. For example, let’s change the port value to 49532. To do this, we uncomment the corresponding line in the file and change the port as shown in the screenshot below.

How to install and configure SSH on Ubuntu 22.04 in 2024

We advise switching the password authentication option to a more secure key authentication mode in addition to this configuration. As indicated in the screenshot, uncomment the line in question and ensure that the value is “Yes” to accomplish this.

install and configure SSH

Now, let’s prohibit logging on to the server as a superuser by changing the corresponding line as shown in the picture below.

 

SSH on Ubuntu 22.04

There are other settings you can configure to increase the server security: 

  • UseDNS checks if the hostname matches its IP address. The value “Yes” enables this parameter.

  • PermitEmptyPasswords prohibits using empty passwords for authentication if the value is “No.”

  • MaxAuthTries limits the number of unsuccessful attempts to connect to the server within one communication session. 

  • AllowUsers and AllowGroups are responsible for the list of users and groups allowed to access the server:

							
							
					# AllowUsers User1, User2, User3
# AllowGroups Group1, Group2, Group3				
			
  • Login GraceTime sets the time provided for successful authorization. We recommend reducing the value of this parameter by four times.

  • ClientAliveInterval limits the time of user inactivity. After exceeding the specified limit, the user is disconnected.

After making all the changes in the main configuration file, save them and close the editor. 

Restart the service to make the changes take effect:

							
							
					sudo systemctl restart ssh				
			
  • If you have changed the port in the configuration file, you should connect using the new port: 

							
							
					ssh -p port_number username@IP_address				
			

Or:

							
							
					ssh -p port_number_port_username@domain				
			

conclusion

In order to increase security, this article explains how to modify the primary configuration file and provides a step-by-step tutorial for installing and configuring SSH in Ubuntu 22.04. This tutorial should assist you in establishing a safe remote connection to your Ubuntu server. Thanks By Motaher Hossain