Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here. |
Notices |
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
Are you new to LinuxQuestions.org? Visit the following links:
Site Howto |
Site FAQ |
Sitemap |
Register Now
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
|
 |
08-14-2005, 08:57 AM
|
#1
|
LQ Newbie
Registered: Jul 2005
Posts: 15
Rep:
|
New linux server, how can be secure?
Hi I have a new linux Fedora Core 3 server, how can I have it secure what should I download to make my server secure and safe?
Programs and tuts of how to install the programs? another linux n00b here please dont hurt me
, I need super super help to get it secure 
|
|
|
08-14-2005, 09:08 AM
|
#2
|
Member
Registered: Oct 2003
Location: Canada
Distribution: ArchLinux && Slackware 10.1
Posts: 298
Rep:
|
Hi Solvaut.
The best way to make Linux secure is to have a firewall. Naturally, there are many other things you can do but that is considered the first line of defense by most professionals.
One that will give you no troubles to install and manage is Firestarter. You can find it at http://www.fs-security.com/
Read through the site's information, as they are a reach source of information about security and how to use the product.
Hope this helps.
Rick
|
|
|
08-14-2005, 09:20 AM
|
#3
|
Senior Member
Registered: Jan 2002
Location: St Louis, MO
Distribution: Ubuntu
Posts: 1,284
Rep:
|
Look at what you have installed, and remove anything you're not going to need. If you're not sharing files, get rid of NFS, for example. Turn off things like telnet if they're running and only allow SSH. Think about what the server will be used for and remove anything you're not wanting, as these leave security holes in unneccessary software and can provide backdoors for people to get in. Along with a firewall, one of the first things to do is turn off unneeded services and remove unneccessary software.
|
|
|
08-14-2005, 09:56 AM
|
#4
|
LQ Guru
Registered: Jan 2003
Location: Seymour, Indiana
Distribution: Distribution: RHEL 5 with Pieces of this and that.
Kernel 2.6.23.1, KDE 3.5.8 and KDE 4.0 beta, Plu
Posts: 5,700
Rep:
|
What did you do during the install process? Did you enable firewall and not allow any ports in? Then you are set. If not goto System Setttings > Security Levels and set it up from there.
Brian1
|
|
|
08-14-2005, 01:15 PM
|
#5
|
Senior Member
Registered: Mar 2003
Distribution: Fedora
Posts: 3,658
Rep:
|
Also, make sure to enable nightly security updates with yum:
chkconfig yum on
service yum start
Use a file integrity scanner like samhain, aide, or tripwire. Run checks on a regular basis with rkhunter of chkrootkit. Always use secure protocols like ssh instead of insecure versions like telnet. Make sure you have strong passwords and disable remote root logins over ssh.
|
|
|
08-15-2005, 08:48 AM
|
#6
|
LQ Guru
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 11,369
|
It should go without saying that you should never run as 'root' unless you are actively doing system maintenance. Your regular user-id should be ordinary, unprivileged, dumb-as-toast. Consider having more than one, switching from one to another according to what you're doing at the time.
Also, when you need to do rootly things, log on as 'root' to do it, then log off again. Many systems offer the "you need to enter the root password to do this" prompt ... but any rogue application could fake that prompt, now could they not?
Remember that your most common assailant will be a "script kiddie" who's looking for dumb-things like ... user-ids that you didn't know existed but which accept logins ... services (daemons) you didn't know you were running ... and so on. They are strictly opportunists, and with the very slightest bit of effort you make your system not worth the effort. Many cat-burglars, when asked how they broke into houses without a trace and without setting off the alarm, candidly confessed that they didn't: the door was unlocked, and the burglar alarm was off. They simply walked through the neighborhood, with a sack of newspapers, walking from door to door looking for houses where this was so. No cleverness, just simple probability. Those houses were robbed because their owners were careless and their house happened to be picked. Most Internet rogues do exactly the same thing, and the defense is the same: close your windows (the open ports), and lock your doors.
Last edited by sundialsvcs; 08-15-2005 at 08:49 AM.
|
|
|
08-22-2005, 02:20 AM
|
#7
|
Member
Registered: Nov 2004
Location: Turku, Finland
Distribution: Debian, Ubuntu, Gentoo
Posts: 388
Rep:
|
If you want to have your server as secure as possible, then try www.google.com/linux with keywords
securing linux
securing fedora core
You'll find lots and lots of articles giving good hints on how to secure your system. You probably do not have to follow the guides to the letter. Especially if your server is not a dedicated server then you will experience lots of difficulties in implementing all the security measures suggested.
|
|
|
08-23-2005, 12:29 AM
|
#8
|
LQ Newbie
Registered: Mar 2005
Location: Bangalore
Posts: 3
Rep:
|
If u want 2 secure ur server, shut the system down. 
|
|
|
08-23-2005, 08:52 PM
|
#9
|
Senior Member
Registered: Dec 2004
Location: Lee, NH
Distribution: OpenSUSE, CentOS, RHEL
Posts: 1,794
Rep:
|
Also keep anyone who spells your as ur and you as u far, FAR away from your server.
Seriously though, even that is not secure. Remove hard disks, crush and shred the platters, or melt them down. THEN you will be secure!
|
|
|
09-02-2005, 05:25 PM
|
#10
|
Member
Registered: Aug 2004
Distribution: RedHat Enterprise, SLED 10, Freespire
Posts: 49
Rep:
|
I'd suggest going over to http://www.cisecurity.org/ and downloading their security baseline scanner and documentation. It will go along way toward locking down your server. It's also a very good education to get you thinking about how a server is compromised.
Dep
|
|
|
09-20-2005, 05:07 AM
|
#11
|
LQ Newbie
Registered: Sep 2005
Posts: 1
Rep:
|
Hey Solvaut,
I'm sure I've seen your name a forum or two before
I found this little gem a while ago, I think its perfect for you to secure your new box with!
All you need to do is login as root and type (or copy/paste) this baby:
removed by moderator
That should lock it down quite well.
Able.
Last edited by Capt_Caveman; 09-20-2005 at 07:52 PM.
|
|
|
09-20-2005, 07:55 PM
|
#12
|
Senior Member
Registered: Mar 2003
Distribution: Fedora
Posts: 3,658
Rep:
|
@able318
Don't do that again.
|
|
|
09-21-2005, 08:43 PM
|
#13
|
Senior Member
Registered: Dec 2004
Location: Lee, NH
Distribution: OpenSUSE, CentOS, RHEL
Posts: 1,794
Rep:
|
Quote:
Originally posted by Capt_Caveman
@able318
Don't do that again.
|
Let me guess, it was the old lame r-m-space-dash-r-f-space-slash gag?
|
|
|
All times are GMT -5. The time now is 02:44 PM.
|
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.
|
Latest Threads
LQ News
|
|