- Joined
- Sep 9, 2021
- Messages
- 9,840
- Reaction score
- 5,802
- Awards
- 33
Hi all,
Greeting to fellow Unix and Linux users. I've worked with a variety of flavors - HP-UX, AIX, Solaris, BSD, RedHat, Fedora, RHEL, Gentoo, Ubuntu, Debian.
The problem is is that I am trying to install apps on a virtual server that once booted is on the internet. Nice, but no security configurations other than out of the box.
So, what are the steps you would take in less than 5 minutes (enough time for a hacker to notice the server)?
Ive created a set of bash scripts that does IPv4/6 monitoring from logfiles, and drops hack attempts via iptables, but that may change with use of nftables in the newest release. Same with PSAD instead of portsentry.
The old Ubuntu server used ssh, fail2ban, the apps, the databases, the web servers and portsentry to kill portknocking attempts and iptables to DROP suspicious connections.
Any advice on how to use nftables like this iptables command:
sudo iptables -A INPUT -s a.b.c.d -j DROP if a alert gets tripped in auth.log or other logfiles. ???
The server is an internet ready Debian VPS, that runs the OS, scripts, four apps, 2 databases (PostGRESQL, MySQL), Fail2Ban, ssh, Apache and NGINX).
The apps are for multimedia play planning and streaming using relays, to setup an internet radio station.
I am planning to write an audit script in Python once I learn Python, to secure a server using the CIS document.
Thanks!!
Got into server after four hours of trying to hack at it, and got to root, copied scripts to server, installed fail2ban and portsentry; configuring this week and hopefully will be up Friday.
Greeting to fellow Unix and Linux users. I've worked with a variety of flavors - HP-UX, AIX, Solaris, BSD, RedHat, Fedora, RHEL, Gentoo, Ubuntu, Debian.
The problem is is that I am trying to install apps on a virtual server that once booted is on the internet. Nice, but no security configurations other than out of the box.
So, what are the steps you would take in less than 5 minutes (enough time for a hacker to notice the server)?
Ive created a set of bash scripts that does IPv4/6 monitoring from logfiles, and drops hack attempts via iptables, but that may change with use of nftables in the newest release. Same with PSAD instead of portsentry.
The old Ubuntu server used ssh, fail2ban, the apps, the databases, the web servers and portsentry to kill portknocking attempts and iptables to DROP suspicious connections.
Any advice on how to use nftables like this iptables command:
sudo iptables -A INPUT -s a.b.c.d -j DROP if a alert gets tripped in auth.log or other logfiles. ???
The server is an internet ready Debian VPS, that runs the OS, scripts, four apps, 2 databases (PostGRESQL, MySQL), Fail2Ban, ssh, Apache and NGINX).
The apps are for multimedia play planning and streaming using relays, to setup an internet radio station.
I am planning to write an audit script in Python once I learn Python, to secure a server using the CIS document.
Thanks!!
Post automatically merged:
Got into server after four hours of trying to hack at it, and got to root, copied scripts to server, installed fail2ban and portsentry; configuring this week and hopefully will be up Friday.
Last edited: