There are a number of ways to configure authentication in Linux, you can even use Windows credentials. But generally, for SSH, I find it easier to just use a private key that is trusted on all my servers. This way I only need to know the password to use the key, and not the password for the account on the server.
Edit /etc/ssh/sshd_config add or amend the following:
Ciphers aes128-ctr,aes192-ctr,aes256-ctr MACs hmac-sha1,hmac-ripemd160
Every so often I get caught out by not being able to access a remote server because of my firewall config. Not allowed to remotely access a resource unless you’re from a trusted subnet.
So the way round this is use an intermediary that is in a trusted subnet.
When I setup a Debian server there’s a few basic things I do to get it online.
First steps boot from the netinst CD and follow the installer.
First logon using SSH as your regular user account as root can’t access the system remotely. So you’ll have to logon unprivileged and then su to root.
Then before doing anything else install sudo and give your user account access by making them a member of the sudo group.
# apt-get install sudo # usermod -a -G sudo [user]
You’ll have to logout and back in to pick-up the sudo group change.