<p>I’ve been growing a document of setup notes for a new Raspberry Pi running Raspbian for awhile. Raspberry Pis are a problem for me, because it’s easy to have lots of them doing lots of tasks, so I do, everywhere. I thought I’d publish these notes, glommed together from various sources, in case they’re useful for others.</p>
<p>While many of these may work on other hardware and software, they’re regularly tested on <ahref="https://www.raspberrypi.org/products/raspberry-pi-2-model-b/">Raspberry Pi 2 Model B</a> with Raspbian Lite Jessie.</p>
<p>I should really script this.</p>
<p>Start with <ahref="https://www.raspberrypi.org/downloads/raspbian/">Raspbian Lite</a>. NOOBS has an extra boot step, and Raspbian full version has a GUI and stuff like Wolfram Engine that you probably don’t want.</p>
<h3>Log in</h3>
<p>Use console, or grab the IP from your router’s DHCP client list and:</p>
<pre><code>ssh pi@<ip address>
# password "raspberry"
</code></pre>
<h3>Expand filesystem</h3>
<pre><code>sudo raspi-config --expand-rootfs
sudo reboot
</code></pre>
<p>Wait for reboot. Reconnect as above.</p>
<h3>Update</h3>
<pre><code>sudo apt-get -y update
sudo apt-get -y dist-upgrade
</code></pre>
<h3>Update firmware</h3>
<pre><code>sudo apt-get -y install rpi-update
sudo rpi-update
</code></pre>
<h3>Enable overclock (optional)</h3>
<p>Pis seem to be relatively stable overclocked, even without a heatsink.</p>
# Connect to your Pi; this should NOT ask for a password
ssh <username>@<ip>
</code></pre>
<h3>Lock down sshd</h3>
<p>The SSH server has a lot of options turned on by default for compatibility with a wide range of clients. If you’re connecting only from modern machines, and you’ve gotten public key authentication working as described above (and tested it!), then you can turn off lots of the legacy options.</p>
<pre><code>sudo tee /etc/ssh/sshd_config <<END
Port 22
Protocol 2
HostKey /etc/ssh/ssh_host_ed25519_key
UsePrivilegeSeparation sandbox
# Logging
SyslogFacility AUTH
LogLevel INFO
# Authentication:
LoginGraceTime 120
PermitRootLogin no
StrictModes yes
AuthenticationMethods publickey
RSAAuthentication no
PubkeyAuthentication yes
IgnoreRhosts yes
RhostsRSAAuthentication no
HostbasedAuthentication no
PermitEmptyPasswords no
ChallengeResponseAuthentication no
PasswordAuthentication no
X11Forwarding no
X11DisplayOffset 10
PrintMotd no
PrintLastLog yes
TCPKeepAlive yes
AcceptEnv LANG LC_*
UsePAM yes
KexAlgorithms curve25519-sha256@libssh.org
Ciphers chacha20-poly1305@openssh.com
MACs hmac-sha2-512-etm@openssh.com
END
# Enter password for sudo
</code></pre>
<h3>Enable the hardware random number generator</h3>
<p>Note that hardware random number generators <ahref="https://en.wikipedia.org/wiki/RdRand#Reception">are controversial</a>.</p>
<pre><code>sudo modprobe bcm2835_rng
echo bcm2835_rng | sudo tee --append /etc/modules
sudo apt-get -y install rng-tools
</code></pre>
<h3>Enable the hardware watchdog</h3>
<p>This has false negatives (failures to reboot when it should) for me, but never false positives.</p>
<p>Test that changes work, and have some (disabling auto-login) take effect.</p>
<pre><code>sudo reboot
</code></pre>
<h3>After reboot</h3>
<p>Note that ssh may scream “REMOTE HOST IDENTIFICATION HAS CHANGED!”; that’s a symptom of the sshd_config changes above. Just remove the line from the known_hosts file and reconnect.</p>