Scenario / Questions
I am installing a Debian server which is connected directly to the Internet. Obviously I want to make it as secure as possible. I would like you guys/gals to add your ideas to secure it and what programs you use for it.
I want part of this question to cover what do you use as a firewall? Just iptables manually configured or do you use some kind of software to aid you? What’s the best way? Block everything and allow only what is needed? Are there maybe good tutorials for beginners to this topic?
Do you change your SSH port? Do you use software like Fail2Ban to prevent bruteforce attacks?
Find below all possible solutions or suggestions for the above questions..
- installation of system with expert mode, only packages that I need
- hand written firewall with default policy on iptables’input: drop, permitting access to SSH, HTTP or whatever else given server is running
- Fail2Ban for SSH [ and sometimes FTP / HTTP / other – depending on context ]
- disable root logins, force using normal user and sudo
- custom kernel [ just old habit ]
- scheduled system upgrade
Depending on level of paranoia additionally:
- drop policy on output except a couple of allowed destinations / ports
integritfor checking if some parts of file system ware not modified [with checksum kept outside of the machine], for example Tripwire
- scheduled scan at least with nmap of system from the outside
- automated log checking for unknown patterns [but that’s mostly to detect hardware malfunction or some minor crashes]
- scheduled run of chkrootkit
- immutable attribute for
/etc/passwdso adding new users is slightly more difficult
- /tmp mounted with noexec
- port knocker or other non-standard way of opening SSH ports [e.g. visiting ‘secret’ web page on web server allows incoming SSH connection for a limited period of time from an IP address that viewed the page. If you get connected,
-m state --satete ESTABLISHEDtakes care of allowing packet flow as long as you use a single SSH session]
Things I do not do myself but make sense:
Just a note on firewalling your machine…
- Use a whitelist, not a blacklist – i.e. block everything, and only allow what you need to, deny everything else.
- Don’t use GUIs/ncurses or otherwise any software that tries to make the task of writing your firewall for you. If you do, you will be allowing the software to make assumptions for you – you don’t need to take that risk and shouldn’t. Configure it yourself, if you’re unsure, disable it – you’ll find out soon enough if it is required. If it is already an up and running system and you can’t disrupt traffic (by accidentally blocking it), then run tcpdump (dump to file) and take samples – study them later, and then figure out what’s valid and what’s not.
- I personally don’t see any point in running a service on a non-standard port, tools are not so dumb these days to assume that because something is running on port 22 for example, then it must be ssh, and not otherwise – for example
-Aoption. Having said that, you can (and probably should if worried) modify your services to hide themselves from prying eyes, for example, the following would let the attacker know the exact version of
OpenSSHthat you’re running, they can then look for exploits for that exact version. If you hide such things, you’d be making it harder for them.
[root@ud-olis-1 uhtbin]# telnet localhost 22 Trying 127.0.0.1... Connected to localhost.localdomain (127.0.0.1). Escape character is '^]'. SSH-2.0-OpenSSH_3.9p1
- Keep all your public services up to date and patched with the latest security patches.
- Don’t store any DATA on the gateway server itself, at least you’ll buy time when they manage to break in to this machine, and you’ll lose a service or two, and some time, but not data.
Bottom line is that you will never succeed in making anything 100% secure – that’s just not possible – so the aim is to make is as secure as possible – if it’s just too much effort to break your system, it’s good enough, and most lamer script-kiddies will move onto the next system.
iptablesis the way to go for any Linux system – but configure it yourself.
Don’t ever ever use any “security software” that is not based on open standards – they’re doomed to be poorly written and will get hacked (not a matter of “if”, but “when”). Open source and open protocols are open to public scrutiny and converge to becoming a mature and reliable product; closed-source software relies mostly on the authors self-confidence of how great/secure-a-product they think it is – i.e. a small number of eyes vs an earth-full of eyes.
Hope that helps 🙂
- disable root login
- disable login by password (allow only login by public-key)
- change SSH port
use denyhosts (or similar)
write your own iptbles script (so you control exactly what to allow and can drop everything else)
force the use of SSL/TLS secured communications and make sure to have valid, non-expired and signed certificates
- turn on strict certificate verification for all external services (for example when authenticating users with an LDAP server on another machine)
As a general starting point, I follow the benchmark/guides from the Center for Internet Security, which are comprehensive compilations of security best practices. It doesn’t look like their Debian benchmark has been updated in some time, but a general overview of the steps is:
- Apply latest OS patches/packages
- Enable system / kernel / process accounting.
- Enable MAC (eg, SELinux or AppArmor).
- Enable host-based firewall (iptables).
- Verify APT sources.list (keys are correct, sources are trusted).
- Minimize network services, disable everything not required, and firewall what is.
- Use TCPWrappers to further restrict system access.
- Only use encrypted network protocols, disable unencrypted services (telnet, ftp, etc).
- Configure remote access to SSH only.
- Disable user login passwords and require key-based authentication.
- Disable filesystem sharing (NFS, SMB).
- Enable remote / centralized system logging (and regularly review logs!).
- Set a BIOS/firmware level password.
- Set a bootloader password.
- Configure system backups, have a disaster recovery plan and TEST that the backups are valid, and that personnel know disaster recovery procedures!
There are many resources on all these various settings, including the specific commands and configuration files to implement on the system in the CISecurity benchmarks.
I would suggest not attaching a machine directly to the Internet. Place some kind of firewall between the machine and the Internet. This allows you to do security and network monitoring without putting more load on the server. Personally, I find network and function segmentation frequently simplifies network troubleshooting, although on occasion, the additional complexity does make analysis more difficult.
The safest, but most annoying to manage, firewall policy is to deny all and explicitly allow only the traffic you must allow. This is annoying, because one frequently needs update the firewall policy as the network needs change.
I would also suggest using some kind of interface firewalling on the server – defense in depth is the key. Using non-standard ports for administration related services doesn’t hurt. fail2ban is fine. Pursue the more specific questions about security applications on Serverfault to find more ideas.
Security is like the joke about the two hikers and the bear – while one can never achieve perfect security, it is helpful to be a more difficult target than the other guys.
Some people have pointed at the Securing Debian Manual. This should be perfectly adequate for everything but military requirements.
Many people think that being ridiculously paranoid is cool or professional or something. It’s not, it’s just annoying for other admins and outright repressive for your users. Most of the stuff you’ll see recommended is just fake busywork to feel useful for the paranoid admin, but not actually helpful, since the real security breach is likely to be caused by a not sufficiently updated system and/or from an inside source.
That said, I do consider it one of my tenets to not trust anything on the local network any more than anything from the Internet. Therefore, I configure everything to require authentication even on the local network. I encrypt and authenticate all traffic between every one of computer using IPsec.
I am in the process of converting to full-disk encryption for all my servers.
I install only services I use. I do not have a firewall; I configure the services I have to require authentication or limit them (by the program’s own configuration or by TCP-wrappers) to certain IPs. The only thing I ever need to block using iptables was
memcached, since it had no configuration file, and did not use TCP-wrappers.
I use good, randomly generated passwords for my accounts and trust my SSH server (and all other services) to keep those who do not know the password out.
fail2ban is only for those with limited space for log files, IMO. (You should have good enough passwords to be able to trust them.)
Go through this nice how-to at www.debian.org/doc/manuals/securing-debian-howto/
I personally change the ssh port and use fail2ban + denyhosts. And I block everything that is not needed. The more you block the less you have to worry about.
Disclaimer: This has been sourced from a third party syndicated feed through internet. We are not responsibility or liability for its dependability, trustworthiness, reliability and data of the text. We reserves the sole right to alter, delete or remove (without notice) the content in its absolute discretion for any reason whatsoever.