Linux - ServerThis forum is for the discussion of Linux Software used in a server related context.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
There's additional measures you could think about. They don't do anything for you in terms of actively restricting access though but they're important enough to not leave out.
- The first one is active auditing. The reason I'm listing it is that some people behave better knowing they're watched. Depending on your distribution (in essence: a kernel with SELinux or GRSecurity enabled) you could 0) run the 'auditd' package and set rules (not that hard) that log who accesses what. Without SELinux or GRSecurity you could still run 1) Samhain to check for signs of tampering (changed user authentication or system configuration files) and 2) 'rootsh' to log complete user shell sessions. The dependency would be 0) a remote server these admins have no access to to which you can send syslogs so any activity leading up to any sabotage is safe from tampering and 1) regularly running an auditing tool like SEC or Logwatch to alert you of anomalies or unwanted behaviour.
- The second one is using ACLs (acl.bestbits.at). Placing these admin users in a non-root group and granting them access to the /var/www area may give them enough rights to edit things while still allowing the web server to read and execute content and keeping your admin users from requiring root rights except through specific sudo commands.
- Finally you should have a good (remote!) backup policy in place for the most crucial areas that allows you (or the VPS provider) to restore the system without too much loss should things torun belly up regardless of the cause.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.