Linode Forum
https://forum.linode.com/

How to secure my ubuntu to prevent malicious attacks
https://forum.linode.com/viewtopic.php?f=19&t=8832
Page 1 of 1

Author:  dyyyy [ Mon May 14, 2012 11:40 am ]
Post subject:  How to secure my ubuntu to prevent malicious attacks

Hi,
This is my second time that I'm reinstalling my server because of malicous attacks :D
So please can you give me tips on how to secure my linode.
I'll be using ubuntu 12.04 LTS.
Thank you

Author:  kyrunner [ Mon May 14, 2012 12:18 pm ]
Post subject: 

First lock down ssh

make sure root is unable to log in

set up public keys and turn off password log ins this is where I would start

Author:  kyrunner [ Mon May 14, 2012 12:27 pm ]
Post subject:  Re: How to secure my ubuntu to prevent malicious attacks

dyyyy wrote:
Hi,
This is my second time that I'm reinstalling my server because of malicous attacks :D
So please can you give me tips on how to secure my linode.
I'll be using ubuntu 12.04 LTS.
Thank you



How did they get in? How do you know that you were attacked?

Author:  marcosscriven [ Wed May 16, 2012 7:25 am ]
Post subject: 

Yes I'd be interested to know how you know too?

Author:  A-KO [ Wed May 16, 2012 7:36 am ]
Post subject: 

-Don't use password authentication for SSH.
-Keep updated. If possible, get on mailing lists for applications you use (Apache, PHP). Follow various vulnerability databases. If you are unable to do this, run an update script every day.
-If you use a webserver there are many things to do to lock it down. Use something like the PHP Suhosin patch to limit the functions that can be used together. Lock down the combination of eval() and base64_decode() in a function in PHP. This will help guard against a LOT of issues.

Author:  kyrunner [ Wed May 16, 2012 9:49 am ]
Post subject: 

A-KO wrote:
-Don't use password authentication for SSH.
-Keep updated. If possible, get on mailing lists for applications you use (Apache, PHP). Follow various vulnerability databases. If you are unable to do this, run an update script every day.
-If you use a webserver there are many things to do to lock it down. Use something like the PHP Suhosin patch to limit the functions that can be used together. Lock down the combination of eval() and base64_decode() in a function in PHP. This will help guard against a LOT of issues.


I run updates everyday and also I have a IDS (ossec) system running that emails me any issues in real time.

Just to add to your post

Author:  Mr Nod [ Wed May 16, 2012 10:15 am ]
Post subject: 

Assuming your problem is SSH-related:

http://www.wolfpaw.co.uk/2012/03/securing-a-linux-vps/

Author:  sorressean [ Tue May 22, 2012 3:35 pm ]
Post subject: 

kyrunner wrote:
A-KO wrote:
-Don't use password authentication for SSH.
-Keep updated. If possible, get on mailing lists for applications you use (Apache, PHP). Follow various vulnerability databases. If you are unable to do this, run an update script every day.
-If you use a webserver there are many things to do to lock it down. Use something like the PHP Suhosin patch to limit the functions that can be used together. Lock down the combination of eval() and base64_decode() in a function in PHP. This will help guard against a LOT of issues.


I run updates everyday and also I have a IDS (ossec) system running that emails me any issues in real time.

Just to add to your post


How does that work out for you? I tried running snort as IDS as well as a port monitor, and ended up flooded with a ton of stuff. I don't have the knowledge to really set up a good ids setup and then to set up something else to monitor, so if I could get something like a daily logwatch email that tells me what I need, it'd be nice.

Page 1 of 1 All times are UTC-04:00
Powered by phpBB® Forum Software © phpBB Group
http://www.phpbb.com/