LinuxQuestions.org
Download your favorite Linux distribution at LQ ISO.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 02-28-2017, 10:54 AM   #31
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 10,671
Blog Entries: 4

Rep: Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945

Another basic thing that I would always do to secure a computer is to conceal it.

You can very easily do this with OpenVPN using the tls-auth feature. The only thing that's facing the outside world, except possibly HTTP(S), is an OpenVPN that is silently listening on some UDP port-number. All other services such as SSH are listening only to the addresses exposed by OpenVPN: they are firewalled away from any contact to/from the outside world.

There are tens of thousands of possible port-numbers to choose from.

With tls-auth, you must show that you possess a one-of-a-kind digital certificate before OpenVPN will even respond to your connection request. If you don't, it silently drops the packet, thus giving the "sniffer" no indication whatsoever that there is anything there. (The UDP protocol has no concept of "sockets" therefore detectable "open ports.")

Then, access is obtained only through a second, 4096-bit, one-of-a-kind digital certificate that is issued individually to each authorized user. (That certificate may or may not be password-protected [encrypted ...].)

When you present your first badge, the gatekeeper pays attention to you. If you possess a certificate that has not been revoked, you pass through the gantlet quickly and easily. And if you don't, then there's nothing you can do.

"Number of unauthorized SSH connection attempts?" Zero.

"Number of ports found in a port scan (other than maybe HTTP(S))?" Zero.

Quote:
You are standing outside a smooth, featureless, stone wall which cannot be climbed.
> read the entire dictionary out loud.

You've got a lot of time on your hands, don't you? ...
Done. Nothing happens.
An authorized user bearing a curious piece of paper steps up to the wall somewhere nearby, and after just a moment's pause passes right through it.
> Examine wall where the authorized user stood.

I can't find it. There is apparently nothing there.
> Walk through wall.

I apparently value my nose more than you do ...
>

Last edited by sundialsvcs; 02-28-2017 at 11:55 AM.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
LXer: Microsoft: Windows 10 Is the Most Secure Operating System LXer Syndicated Linux News 5 11-18-2015 08:04 PM
LXer: Tails secure operating system is now out of beta LXer Syndicated Linux News 0 05-01-2014 10:41 PM
LXer: Kaspersky Lab Cyber Secure Operating System: It's Real LXer Syndicated Linux News 0 01-31-2013 07:11 AM
LXer: Kaspersky Developing Cyber Secure Operating System LXer Syndicated Linux News 0 05-11-2012 09:51 PM
Which is the most secure operating system ever? sc0undrel General 45 04-25-2007 10:13 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 01:32 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration