Linux - Distributions This forum is for Distribution specific questions.
Red Hat, Slackware, Debian, Novell, LFS, Mandriva, Ubuntu, Fedora - the list goes on and on...
Note: An (*) indicates there is no official participation from that distribution here at LQ. |
Notices |
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
Are you new to LinuxQuestions.org? Visit the following links:
Site Howto |
Site FAQ |
Sitemap |
Register Now
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
|
 |
|
09-07-2020, 09:43 PM
|
#16
|
Member
Registered: Sep 2020
Posts: 436
Original Poster
Rep: 
|
Quote:
Originally Posted by wpeckham
All of the above posts were reasonable
If I may add, it depends upon what it is you are trying to secure!
Do you mean in terms of being difficult to break into, in terms of protesting your network, protecting your data, protecting your code...?
One option is a container based distribution. If your web server runs in a container, perhaps a full distro container, then it can be more isolated from both the host and the rest of your network.
Do not forget generational full and incremental backups that allow you a point-in-time recovery and restoration to secure your operation, if that matters.
|
Why not Virtualization?
|
|
|
09-07-2020, 09:47 PM
|
#17
|
Member
Registered: Sep 2020
Posts: 436
Original Poster
Rep: 
|
Quote:
Originally Posted by berndbausch
OpenBSD. Not exactly Linux, but not THAT different either.
Plus: - Watch security advisories
- Install patches
- Use a firewall and an IDS
- Disable all services and accounts you don't need
- Watch log files (see also number 3)
- Other security practices
|
No Linux Distro like OpenBSD? I know Qubes-OS is secure but it is not OK for server.
Anyone used "ALT Linux" ?
|
|
|
09-08-2020, 12:13 AM
|
#18
|
LQ Guru
Registered: Apr 2005
Distribution: Linux Mint, Devuan, OpenBSD
Posts: 7,756
|
Quote:
Originally Posted by n00b_noob
No Linux Distro like OpenBSD?
|
Since you are asking for recommendations, I'd highly recommend either Devuan or else Ubuntu Server Edition, as they are quite bare bones. You can get help with either of them here and Ubuntu Server even has the additional option for paid support for 10 years. They will provide a minimum number of packages at first and then you'll have to add the rest yourself.
As for OpenBSD, it's not a usual operating system. Unlike GNU/Linux or even FreeBSD, it's target audience is itself, its own team of developers. Also, unlike GNU/Linux and, to a limited extent, FreeBSD, they treat the documentation seriously and a bug in the documentation is treated with the same vigor as a potential security problem. However, everyone who uses it is expected to be able to read the documentation and figure things out on their own. That's part of the deal. Based on your questions so far, FreeBSD instead might be more appropriate.
|
|
|
09-08-2020, 04:05 AM
|
#19
|
LQ Guru
Registered: Sep 2011
Location: Upper Hale, Surrey/Hants Border, UK
Distribution: One main distro, & some smaller ones casually.
Posts: 5,884
Rep: 
|
A Linux distro specifically aimed at the server would be your best starting point, note I say starting point, as you need to make it secure for your specific usage.
OpenBSD is only as secure as the admin makes it, yes, all the base programs have been security checked by the team, but that is all they guarantee, any additional programs added are down to you to ensure they are securely deployed.
|
|
|
09-08-2020, 07:07 AM
|
#20
|
Senior Member
Registered: Aug 2018
Location: Atlanta, GA - USA
Distribution: CentOS/RHEL, openSuSE/SLES, Ubuntu
Posts: 1,005
|
You do realize that it is up to you to harden your web server (or any type of server).
And, just because it is secure today, it will have to be maintained over time to keep it secured.
The server is one part of it.
Your web developers will also have to do their part to keep the server secured.
|
|
2 members found this post helpful.
|
09-08-2020, 11:15 AM
|
#21
|
LQ Guru
Registered: Apr 2005
Distribution: Linux Mint, Devuan, OpenBSD
Posts: 7,756
|
Quote:
Originally Posted by fatmac
OpenBSD is only as secure as the admin makes it, yes, all the base programs have been security checked by the team, but that is all they guarantee, any additional programs added are down to you to ensure they are securely deployed.
|
Going a little further on the OpenBSD tangent, Dante Catalfamo recently made a a rather good introductory video providing an overview of OpenBSD:
https://blog.lambda.cx/posts/openbsd-introduction-talk/
The first part of the video has a good survey over some developments where that OS has lead the way in certain improvements. Closer to the middle he has nice overview of various projects derived from OpenBSD development. Then he walks through an installation step by step, which takes only a few minutes even with running commentary. After that, there are some basic system administration tasks and a general system orientation.
|
|
|
09-09-2020, 05:12 AM
|
#22
|
Member
Registered: Sep 2020
Posts: 436
Original Poster
Rep: 
|
Quote:
Originally Posted by Turbocapitalist
Since you are asking for recommendations, I'd highly recommend either Devuan or else Ubuntu Server Edition, as they are quite bare bones. You can get help with either of them here and Ubuntu Server even has the additional option for paid support for 10 years. They will provide a minimum number of packages at first and then you'll have to add the rest yourself.
As for OpenBSD, it's not a usual operating system. Unlike GNU/Linux or even FreeBSD, it's target audience is itself, its own team of developers. Also, unlike GNU/Linux and, to a limited extent, FreeBSD, they treat the documentation seriously and a bug in the documentation is treated with the same vigor as a potential security problem. However, everyone who uses it is expected to be able to read the documentation and figure things out on their own. That's part of the deal. Based on your questions so far, FreeBSD instead might be more appropriate.
|
Is Devuan OK for server? Why you recommended it? Any extra hardening features?
|
|
|
09-09-2020, 05:12 AM
|
#23
|
Member
Registered: Sep 2020
Posts: 436
Original Poster
Rep: 
|
FreeBSD and OpenBSD are better that GNU/Linux in security area?
|
|
|
09-09-2020, 05:41 AM
|
#24
|
LQ Addict
Registered: Mar 2012
Location: Hungary
Distribution: debian/ubuntu/suse ...
Posts: 24,318
|
Quote:
Originally Posted by n00b_noob
FreeBSD and OpenBSD are better that GNU/Linux in security area?
|
what do you mean by that?
As it was already discussed, security depends on the admin, the configuration, the software used (like webserver) and not on the OS itself.
From the other hand as an admin you can make secure all/any of them and you can make them vulnerable too.
The best advice I can give you is: choose your preferred one or the one which you can use/know [better].
|
|
|
09-09-2020, 05:44 AM
|
#25
|
LQ Guru
Registered: Apr 2005
Distribution: Linux Mint, Devuan, OpenBSD
Posts: 7,756
|
It's about the layers.
OpenBSD, yes, but only in the base system, and even then (as mentioned) depending on what you do to the default configuration. It is important to note that much of the security there (confidentiality, integrity, availability) there depends on concise clear clean code, an emphasis on proper design, careful documentation, and sane defaults.
FreeBSD, maybe, but and depending on which distro you start with and what you do to the default configuration and so on.
Adding a CMS like WordPress, for example, will pull down OpenBSD, FreeBSD and any GNU/Linux distro down to the same level.
|
|
|
09-09-2020, 06:31 AM
|
#26
|
LQ Guru
Registered: Apr 2010
Location: Continental USA
Distribution: Debian, Ubuntu, RedHat, DSL, Puppy, CentOS, Knoppix, Mint-DE, Sparky, VSIDO, tinycore, Q4OS, Manjaro
Posts: 6,195
|
The most pure answer is "none of them are secure", but some are more security focused than others.
The most useful and correct answer is "the only distribution that is secure is the one an intelligent and informed administrator has secured for the purposes he/she requires and against the specific range of threats they face in their specific use and environment at the current time". Time does not stand still. Security is only what you have if you practice it every single day.
Without knowing you, your training and experience, your specific use, your threat environment, your hardware, and your purpose there is no way to give a complete and comprehensive correct answer. (Anyway, that would require a couple of books worth of text for you to communicate, and a couple more books of test for us to craft an answer, and it might well all be obsolete before we finished.)
We might be able to suggest some places to start, and in fact a couple of smart people already did.
If I might add: no matter what distribution you use, only open what services you absolutely need, secure those as much as possible. Linux rarely gets hacked directly, the attack leverages the open service to give access. Deny access and you prevent the hack.
Also, look at both your services and your networking at the gateway/router level. If you can restrict network access to a service to only the subnets that you want to have access, you block the entire rest of the world from using that access to compromise the system.
If you must open access to the world, ASSUME you could be hacked and not only protect against it but add detection and reaction to your site so that once you are hacked you will KNOW and can react to the threat. (Intrusion Detection is the term to look up.)
|
|
2 members found this post helpful.
|
09-09-2020, 08:58 PM
|
#27
|
LQ Guru
Registered: Jan 2006
Location: Virginia, USA
Distribution: Slackware, Ubuntu MATE, Mageia, and whatever VMs I happen to be playing with
Posts: 19,932
|
For what it's worth, I know of two major hosting providers who opt for CentOS for Linux hosting. My website runs on CentOS on one of them.
|
|
|
All times are GMT -5. The time now is 07:10 AM.
|
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.
|
Latest Threads
LQ News
|
|