Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
I like to have the option to grap files off my desktop (Debian Sarge) when I'm away with my Laptop (Slack 10) so I forwarded port 22 to my IP address with my router and allowed SSH conections with my firewall (firestarter). Is this safe? Is there anything that I should make sure that I do in order to make it as safe as possible? I do grab the latest updates every week or so with apt-get and swaret. My passwords are long and complicated.
If this isn't safe, is there a way to do what I want in a safe way?
I would say that it is safe. With good firewall protection and limited ssh connections you should be fine. Suscribe to the debian-security mailing list or a simmilar one for ssh to make sure that openssh vulnerabilities don't become a problem.
I would worry too much about getting the latest ssh client with apt-get every week but I'd be more concerned with getting new security updates every time a new update is issued.
Originally posted by Optimistic I set the Allowroot setting to no in sshd_config--isn't that a bit odd that the default is yes?
I'd say so.
But isn't still possible to gain root access even tho you have Allowroot setting to NO? I read somewhere that once you're in and have a bash prompt, just do a su to get root privileges?
Automated attacks will try to connect to your SSH service with a username that is known to exist on all UNIX systems (root) and try various passwords. The option to stop root logins means that any attempt to login with SSH using the username "root" will automatically fail. You then login with your unique personal account and use "su" or "sudo" for getting root power as you need it.
Using keys and disabling authentication with passwords stops anything that tries to get in by guessing passwords. Easy to setup and it's really cool not to have to type a password every time.
Since you don't know which networks your laptop will be on when you travel, you can't restrict SSH connections to specific IP addresses only, which is a common defence.
I will look into setting up the keys. I've just started to experiment with Networking--I figured I would do i t with my Linux boxes first (since I know that better) and then try to talk to my roomate's WinXP computer with Samba.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.