<?xml version="1.0" encoding="utf-8" ?><rss version="2.0" xml:base="https://www.webmaster-forums.net/crss/node/1047157" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title></title>
    <link>https://www.webmaster-forums.net/crss/node/1047157</link>
    <description></description>
    <language>en</language>
          <item>
    <title>Shaggy wrote:
- packet</title>
    <link>https://www.webmaster-forums.net/server-management/setting-ubuntu-10-web-server#comment-1255685</link>
    <description> &lt;p&gt;&lt;div class=&quot;quote-msg&quot;&gt;&lt;div class=&quot;quote-author&quot;&gt;&lt;em&gt;Shaggy&lt;/em&gt; wrote:&lt;/div&gt;&lt;br /&gt;
- packet filters on all servers - publicly exposed and not.  The filter drops all requests that aren&#039;t expected... i.e.&lt;br /&gt;
allow all to/from port 80/443 if you&#039;re running a web service (on standard ports)&lt;br /&gt;
allow all to/from port 25/465/587 if you&#039;re going to handle incoming mail&lt;br /&gt;
allow your-workstation to/from port 5432 for postgres connects.&lt;br /&gt;
etc.&lt;br /&gt;
&lt;/div&gt;&lt;br /&gt;
forgot 3306 for mysql connection&lt;/p&gt;
 </description>
     <pubDate>Thu, 21 Oct 2010 09:58:46 +0000</pubDate>
 <dc:creator>hosted</dc:creator>
 <guid isPermaLink="false">comment 1255685 at https://www.webmaster-forums.net</guid>
  </item>
  <item>
    <title>JeevesBond</title>
    <link>https://www.webmaster-forums.net/server-management/setting-ubuntu-10-web-server#comment-1250891</link>
    <description> &lt;p&gt;&lt;div class=&quot;quote-msg&quot;&gt;&lt;div class=&quot;quote-author&quot;&gt;&lt;em&gt;JeevesBond&lt;/em&gt; wrote:&lt;/div&gt;&lt;br /&gt;
Certificates for SSH connections have some advantages over passwords: the certificates get installed on a machine and you never need to type your password again; certain attacks on your server (like brute-forcing your SSH password) become a lot harder if you&#039;re using certificates. There are the obvious disadvantages of the key being in a file though (someone could get the file off your computer, you might leave it on a machine by accident and such).&lt;br /&gt;
&lt;/div&gt;&lt;/p&gt;
&lt;p&gt;When I have password authentication enabled, I get brute force warnings all day (fail2ban is good, BTW).  I would highly recommend disabling password authentication for SSH and use public/private keys instead.  If you are concerned by somebody getting a hold of your private keys, you can put a passphrase on it, or you can hard-code your IP address in the authorized_hosts file on the server, so if would only accept the private key from your location (not a good idea if your IP address changes often).&lt;/p&gt;
&lt;p&gt;&lt;div class=&quot;quote-msg&quot;&gt;&lt;div class=&quot;quote-author&quot;&gt;&lt;em&gt;JeevesBond&lt;/em&gt; wrote:&lt;/div&gt;&lt;br /&gt;
11. Maybe change SSH from port 22 to 22222 for security reasons.&lt;br /&gt;
This is &lt;a href=&quot;http://en.wikipedia.org/wiki/Security_through_obscurity&quot;&gt;security through obscurity&lt;/a&gt; but probably won&#039;t hurt, just don&#039;t rely on it to actually stop a determined cracker. &lt;img src=&quot;https://www.webmaster-forums.net/misc/smileys/smile.png&quot; title=&quot;Smiling&quot; alt=&quot;Smiling&quot; class=&quot;smiley-content&quot; /&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/p&gt;
&lt;p&gt;Yes, but it stops all the bots.  When I have SSH on port 22 with password auth enabled, I get those fail2ban warnings all day - probably all from automated bots or something.  Either switching the ports of disabling password auth (see above) stops those attempts cold.&lt;/p&gt;
 </description>
     <pubDate>Thu, 15 Jul 2010 01:08:00 +0000</pubDate>
 <dc:creator>pr0gr4mm3r</dc:creator>
 <guid isPermaLink="false">comment 1250891 at https://www.webmaster-forums.net</guid>
  </item>
  <item>
    <title>A few more things to add from</title>
    <link>https://www.webmaster-forums.net/server-management/setting-ubuntu-10-web-server#comment-1250872</link>
    <description> &lt;p&gt;A few more things to add from experience...&lt;br /&gt;
- Keep up to date on the system patches.&lt;br /&gt;
- multi factor authentication - or at least SSH keys rather than passwords...&lt;br /&gt;
- limit su / sudo to users you know to keep authentication measures strong...&lt;br /&gt;
- I always preferred to log everything remotely (or at the very least syslog and access logs).&lt;br /&gt;
- Run Bind sandboxed - at least in a chroot&lt;br /&gt;
- Don&#039;t allow forwarded queries - i.e. don&#039;t answer queries for domains you aren&#039;t authoritative for&lt;br /&gt;
- If you are going to allow the bind service be accessible to the outside world (which you would need to do if you are going to run your own authoritative servers) keep a keen eye on the security bulletins.  Bind9 is/was miles ahead of Bind8 in terms of security - but it&#039;s still one of those services that is often attacked.&lt;/p&gt;
&lt;p&gt;- I did end up running SSH on a non-standard port, mostly because the number of attempts to get in was consuming far too many resources - so I just dropped all traffic coming in on port 22 and &#039;they&#039; seemed to move on.  I think a number of other people also see this problem.  All this protects you from are the super lazy.&lt;/p&gt;
&lt;p&gt;- packet filters on all servers - publicly exposed and not.  The filter drops all requests that aren&#039;t expected... i.e.&lt;br /&gt;
allow all to/from port 80/443 if you&#039;re running a web service (on standard ports)&lt;br /&gt;
allow all to/from port 25/465/587 if you&#039;re going to handle incoming mail&lt;br /&gt;
allow your-workstation to/from port 5432 for postgres connects.&lt;br /&gt;
etc.  &lt;/p&gt;
&lt;p&gt;With these, if you do make a mistake and start a service you didn&#039;t mean to, you still appear covered to the outside world at least.  It&#039;s also interesting to keep statistics of what you drop.  If you have something someone wants, you&#039;ll usually be able to predict security bulletins based on the increase in probes to the different blocked ports.&lt;/p&gt;
&lt;p&gt;- anyone caught scanning ports was dropped in the drop from all list, cleared out weekly.&lt;/p&gt;
&lt;p&gt;- Intrusion detection is also excellent to have - Trying to detect intrusions manually just isn&#039;t sustainable.&lt;/p&gt;
&lt;p&gt;- None of this covers hints on securing the web services you will be offering via apache httpd or tomcat.  Running out of date popular blog / discussion board software is usually an open invitation...&lt;/p&gt;
 </description>
     <pubDate>Tue, 13 Jul 2010 19:42:45 +0000</pubDate>
 <dc:creator>Shaggy</dc:creator>
 <guid isPermaLink="false">comment 1250872 at https://www.webmaster-forums.net</guid>
  </item>
  <item>
    <title>Haven&#039;t got the time for a</title>
    <link>https://www.webmaster-forums.net/server-management/setting-ubuntu-10-web-server#comment-1250863</link>
    <description> &lt;p&gt;Haven&#039;t got the time for a full security review, but two things off the top of my head:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Use a system like &lt;a href=&quot;http://www.fail2ban.org/wiki/index.php/Main_Page&quot;&gt;fail2ban&lt;/a&gt;, it&#039;s not a substitute for good security policies but will stop attackers constantly polling your server for vulnerabilities.&lt;/li&gt;
&lt;li&gt;Certificates for SSH connections have some advantages over passwords: the certificates get installed on a machine and you never need to type your password again; certain attacks on your server (like brute-forcing your SSH password) become a lot harder if you&#039;re using certificates. There are the obvious disadvantages of the key being in a file though (someone could get the file off your computer, you might leave it on a machine by accident and such).&lt;/li&gt;
&lt;/ol&gt;
&lt;blockquote&gt;&lt;p&gt;5. install Bind9 and utils - By default the cache is installed and active?&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;Not sure I understand the question, if you mean &#039;does the DNS server remember addresses it&#039;s looked up&#039; then the answer is &lt;em&gt;yes&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;If you have a domain registrar that does DNS then setting up a DNS server probably won&#039;t be required.&lt;/p&gt;
&lt;blockquote&gt;&lt;p&gt;6. I need to set up my primary DNS server and configure my nameserver addresses / CNAME records to point to my IP address?&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;See above, you may not need to.&lt;/p&gt;
&lt;blockquote&gt;&lt;p&gt;7. I could setup an additional secondry DNS server using my second IP address?&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;Yes. Not sure why you&#039;d need to though, if the DNS is down the most likely cause is that the whole server has died, in that case having a secondary DNS won&#039;t help you.&lt;/p&gt;
&lt;p&gt;I would save doing this for when/if you&#039;re setting up a dedicated DNS server in the future.&lt;/p&gt;
&lt;blockquote&gt;&lt;p&gt;10. I need to activate the pre-installed firewall and only allow access on port 80 (http) and port 22 (SSH)?&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;How would anyone query your DNS server?&lt;/p&gt;
&lt;blockquote&gt;&lt;p&gt;11. Maybe change SSH from port 22 to 22222 for security reasons.&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;This is &lt;a href=&quot;http://en.wikipedia.org/wiki/Security_through_obscurity&quot;&gt;security through obscurity&lt;/a&gt; but probably won&#039;t hurt, just don&#039;t rely on it to actually stop a determined cracker. &lt;img src=&quot;https://www.webmaster-forums.net/misc/smileys/smile.png&quot; title=&quot;Smiling&quot; alt=&quot;Smiling&quot; class=&quot;smiley-content&quot; /&gt;&lt;/p&gt;
&lt;p&gt;Hope this helps!&lt;/p&gt;
 </description>
     <pubDate>Tue, 13 Jul 2010 04:14:00 +0000</pubDate>
 <dc:creator>jeevesbond</dc:creator>
 <guid isPermaLink="false">comment 1250863 at https://www.webmaster-forums.net</guid>
  </item>
  </channel>
</rss>
