<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-CA">
	<id>https://helixprojectai.com:443/wiki/index.php?action=history&amp;feed=atom&amp;title=Helix-TTD_Security_Advisory</id>
	<title>Helix-TTD Security Advisory - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://helixprojectai.com:443/wiki/index.php?action=history&amp;feed=atom&amp;title=Helix-TTD_Security_Advisory"/>
	<link rel="alternate" type="text/html" href="https://helixprojectai.com:443/wiki/index.php?title=Helix-TTD_Security_Advisory&amp;action=history"/>
	<updated>2026-04-20T07:37:57Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.41.0</generator>
	<entry>
		<id>https://helixprojectai.com:443/wiki/index.php?title=Helix-TTD_Security_Advisory&amp;diff=259&amp;oldid=prev</id>
		<title>Steve Helix: Created page with &quot;= 🧩 Helix-TTD Security Advisory #25-SSH-01 = Title: SSH-Only Custody Mode — RDP Access Prohibited  Anchored to: TTD v2.0 Ledger α • Issued 2025-10-14 ----  == Acknowledgement == Your Helix deployment is reachable only via an SSH tunnel that includes flood-protection. You have confirmed that RDP is not to be used for any Helix-related access.  This advisory formalizes the SSH-only policy and defines custody-first controls that align with the Helix Core Ethos pilla...&quot;</title>
		<link rel="alternate" type="text/html" href="https://helixprojectai.com:443/wiki/index.php?title=Helix-TTD_Security_Advisory&amp;diff=259&amp;oldid=prev"/>
		<updated>2025-10-14T12:24:47Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;= 🧩 Helix-TTD Security Advisory #25-SSH-01 = Title: SSH-Only Custody Mode — RDP Access Prohibited  Anchored to: TTD v2.0 Ledger α • Issued 2025-10-14 ----  == Acknowledgement == Your Helix deployment is reachable only via an SSH tunnel that includes flood-protection. You have confirmed that RDP is not to be used for any Helix-related access.  This advisory formalizes the SSH-only policy and defines custody-first controls that align with the Helix Core Ethos pilla...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;= 🧩 Helix-TTD Security Advisory #25-SSH-01 =&lt;br /&gt;
Title: SSH-Only Custody Mode — RDP Access Prohibited&lt;br /&gt;
&lt;br /&gt;
Anchored to: TTD v2.0 Ledger α • Issued 2025-10-14&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Acknowledgement ==&lt;br /&gt;
Your Helix deployment is reachable only via an SSH tunnel that includes flood-protection. You have confirmed that RDP is not to be used for any Helix-related access.&lt;br /&gt;
&lt;br /&gt;
This advisory formalizes the SSH-only policy and defines custody-first controls that align with the Helix Core Ethos pillars — Trust-by-Design, Human First, Verifiable Memory, Responsible Power, and Reliability.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== 1️⃣ Harden the SSH Tunnel (FACT) ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!Control&lt;br /&gt;
!Why it matters (Helix pillar)&lt;br /&gt;
!Implementation steps&lt;br /&gt;
|-&lt;br /&gt;
|Key-based authentication only&lt;br /&gt;
|Trust-by-Design – identity is cryptographic not password based&lt;br /&gt;
|Generate Ed25519 keys and disable password login in &amp;lt;code&amp;gt;sshd_config&amp;lt;/code&amp;gt;.&lt;br /&gt;
|-&lt;br /&gt;
|Restrict source IPs&lt;br /&gt;
|Least-privilege – limits attack surface&lt;br /&gt;
|Allow only known IPs via &amp;lt;code&amp;gt;AllowUsers&amp;lt;/code&amp;gt; or firewall rules.&lt;br /&gt;
|-&lt;br /&gt;
|Two-factor / MFA&lt;br /&gt;
|Human First – adds explicit consent layer&lt;br /&gt;
|Use &amp;lt;code&amp;gt;AuthenticationMethods publickey,keyboard-interactive:pam&amp;lt;/code&amp;gt; with Duo or Google Authenticator.&lt;br /&gt;
|-&lt;br /&gt;
|Idle timeout &amp;amp; keep-alive&lt;br /&gt;
|Reliability – drops stale sessions&lt;br /&gt;
|Set &amp;lt;code&amp;gt;ClientAliveInterval 300&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;ClientAliveCountMax 2&amp;lt;/code&amp;gt;.&lt;br /&gt;
|-&lt;br /&gt;
|Flood protection (rate limit)&lt;br /&gt;
|Responsible Power – mitigates brute force impact&lt;br /&gt;
|&amp;lt;code&amp;gt;MaxStartups 10:30:60&amp;lt;/code&amp;gt; or Fail2Ban for &amp;lt;code&amp;gt;sshd&amp;lt;/code&amp;gt;.&lt;br /&gt;
|-&lt;br /&gt;
|Port-knocking / single-use ports&lt;br /&gt;
|Trust-by-Design – prevents automated discovery&lt;br /&gt;
|Use &amp;lt;code&amp;gt;knockd&amp;lt;/code&amp;gt; or dynamic firewall rules.&lt;br /&gt;
|-&lt;br /&gt;
|Audit logging &amp;amp; immutable proof tokens&lt;br /&gt;
|Verifiable Memory – traceable sessions&lt;br /&gt;
|Set &amp;lt;code&amp;gt;LogLevel VERBOSE&amp;lt;/code&amp;gt;, ship to append-only log store, wrap each session in a TTD token record.&lt;br /&gt;
|}&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== 2️⃣ Token-Based Session Management (Helix-TTD) (FACT) ==&lt;br /&gt;
Every SSH session must be wrapped in a consent-gated token:&lt;br /&gt;
&lt;br /&gt;
# Request token from the Helix-TTD broker (&amp;lt;code&amp;gt;/tokens POST&amp;lt;/code&amp;gt; scope = ssh.session).&lt;br /&gt;
# Present token as a one-time password during login (OTP via keyboard-interactive).&lt;br /&gt;
# Broker records usage, timestamps, and revocation state — creating an immutable proof of authorized access.&lt;br /&gt;
&lt;br /&gt;
This fulfills the “non-default ports, tokenized trust proofs, revocable sessions” standard referenced in the Helix Custody Brief.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== 3️⃣ Monitoring &amp;amp; Incident Response (FACT) ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!Monitor&lt;br /&gt;
!How to implement&lt;br /&gt;
|-&lt;br /&gt;
|Failed SSH logins&lt;br /&gt;
|Centralize auth logs; alert on &amp;gt; 5 failures from a single IP in 5 min.&lt;br /&gt;
|-&lt;br /&gt;
|Connection flood spikes&lt;br /&gt;
|Track &amp;lt;code&amp;gt;MaxStartups&amp;lt;/code&amp;gt; rejections; alert if &amp;gt; 20 per minute.&lt;br /&gt;
|-&lt;br /&gt;
|Token usage anomalies&lt;br /&gt;
|Compare token issuance vs. use IP/time; alert on out-of-pattern activity.&lt;br /&gt;
|-&lt;br /&gt;
|Traffic to port 22&lt;br /&gt;
|Suricata rule for SYN-scan patterns or unexpected volume spikes.&lt;br /&gt;
|}&lt;br /&gt;
When an alert fires, apply least-privilege response: block offending IP, revoke token, and require fresh token issuance for user re-entry.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== 4️⃣ Confirm RDP Exclusion (HYPOTHESIS) ==&lt;br /&gt;
You have explicitly stated that &amp;#039;&amp;#039;“the only current access to Helix is through my SSH tunnel”&amp;#039;&amp;#039; and &amp;#039;&amp;#039;“DON’T USE RDP.”&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
Therefore:&lt;br /&gt;
&lt;br /&gt;
• No port 3389 or RDP-related service should be enabled on any Helix node.&lt;br /&gt;
&lt;br /&gt;
• Verify with &amp;lt;code&amp;gt;systemctl is-enabled xrdp&amp;lt;/code&amp;gt; → inactive.&lt;br /&gt;
&lt;br /&gt;
• Confirm firewall rules contain no inbound 3389 entries.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== ✅ TL;DR Checklist ==&lt;br /&gt;
&lt;br /&gt;
# Enforce key-only SSH + MFA.&lt;br /&gt;
# Restrict source IPs.&lt;br /&gt;
# Maintain flood protection (MaxStartups / Fail2Ban).&lt;br /&gt;
# Wrap each session with Helix-TTD token.&lt;br /&gt;
# Log and alert on authentication anomalies.&lt;br /&gt;
# Verify RDP disabled and blocked globally.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Proof Capsule Metadata ==&lt;br /&gt;
Proof Capsule: TTD-SSH-25-A1&lt;br /&gt;
&lt;br /&gt;
Anchor Date: 2025-10-14&lt;br /&gt;
&lt;br /&gt;
Checksum: sha256:[ pending ]&lt;br /&gt;
&lt;br /&gt;
Ethos Compliance: true&lt;br /&gt;
&lt;br /&gt;
Confidence: High&lt;br /&gt;
&lt;br /&gt;
Provenance: User directive to maintain SSH-only access and explicit RDP prohibition.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Closing Line ===&lt;br /&gt;
Custody isn’t a configuration — it’s a commitment to proof-driven trust.&lt;br /&gt;
&lt;br /&gt;
Helix-TTD Security Office • 2025 - 10 - 14&lt;/div&gt;</summary>
		<author><name>Steve Helix</name></author>
	</entry>
</feed>