Server :: Securing Ssh Logins ?

Sep 15, 2010

We have a public server and it can be accessed from any where through ssh.

My question is my server should not allow anyone directly to login as root user. First he should login as normal user then he should switch to root user.

I also have another questions is there any specific linux command is there to end other users ssh session without rebooting the server.

View 2 Replies


ADVERTISEMENT

Server :: Securing SSH Via Webmin ?

Jan 26, 2010

I installed OpenSSH via tasksel and am using Webmin for administration. I'd like to be able to SSH externally and want to setup the necessary public/private keys to use in FileZilla.

In Webmin, under Servers > SSH Server I can click 'Host Keys' and see an RSA key. Is this the public or private key for my server? Do I need to copy this into a text file to import it into FileZilla on my remote PC (that I want to connect from)? Is that all that needs to be done (aside from opening the port on my router/firewall)?

Is there an automated way to set this up via Webmin?

View 3 Replies View Related

Fedora :: Setting Up An Securing An FTP Server

Mar 19, 2009

I am having trouble trying to setup an FTP server, so i made a video lesson to show how it is done PROPERLY. I actually had this before, but it was poor quality, and i went through it a little fast; so this time it is better quality and i explain more details. You can find it here:

[Code]...

View 2 Replies View Related

Fedora Security :: Securing An FTP Server ?

Mar 11, 2010

I am creating an FTP server using VSFTP. It will be in the wild, initially at least only functioning as an FTP server. I have the iptables config from the previous box I set up 3-4 years ago. I have also got private/public key authentication running with SSH to eliminate brute force attacks.

Here is where is my specific question. On the old server I set up something that allowed my clients to log in using accounts that were not system accounts but would translate to a single system account that was limited to FTP. I remember setting up a passwd account that had username / password pairs that FTP used for authentication.

What app is this? Is it just part of VSFTP or maybe SELInux? I really want to utilize this.

View 2 Replies View Related

Server :: Securing Wordpress With Htaccess ?

May 16, 2011

I have a blog on my site and am using htaccess rewrite rules to block all those nasty scripts from trying to execute various things mostly relating to phpmyadmin and wordpress. This has reduced my httpd error logs to less than half from before.

Am trying to come up with a rule to rewrite all calls to certain files if they are not originating from my domain, here is how it looks right now but it's not working as I can see scripts trying to hit "wp-comments-post.php" getting a 500 Internal Server Error.

View 2 Replies View Related

General :: Securing An Ubuntu Lucid Web Server?

Jul 20, 2011

I have an Ubuntu Lucid server that is public facing. I haven't really configured much on it except installing SSH (sshd) and Apache (httpd); I don't have a firewall or anything. Are there some common rules that I should follow to secure my system? I've been following this article on securing my Apache.

View 1 Replies View Related

Security :: Tools For Securing Mail Server?

May 21, 2011

iam working on mail server in redhat centos. i want to know how to secure my mail server for heavy loading , any monitoring tools in GUI or console , is any essential tool which is used in Like MNC for mail server..

i know few command in like top,netstat,etc through google but i willing to know some more

View 8 Replies View Related

Ubuntu Security :: Securing SSH Connection For SFTP Server

Jan 19, 2011

I'm running an SFPT server which my clients logon to using an FTP client. at the moment each client has a user name and password.

Thus far to improve security I've disabled root login but an looking for futrhrt ways to protect it from attack, having researched using google some of the security features suggested prevent the FPT clients from connecting.

Questions:
1- what further things can i do to secure my server that still allows it to be usable for FTP clients?
2- specifically is it possible to use non login pre-share key authentication?

How i set up the server is shown here: [url]

View 3 Replies View Related

General :: What Are Steps To And Procedure To Follow For Securing Server?

Apr 15, 2011

What are the steps to and Procedure to follow for securing Linux Server???

View 3 Replies View Related

Fedora Security :: Securing A Server For Deployment In Untrusted Zone?

Apr 1, 2010

I have to deploy a server to some customers that should not be given access to the server itself. I know that nothing is 100% secure but I've searched without finding a decent answer (maybe I googled for the wrong terms ?)I need some advice about encrypted filesystem. * The server must boot without asking for a passphrase (the server will be in a restricted access area so typing a password could take a while). I can't store the password for luks in an unencrypted file so it seems a loop to me. The only way out I can see is to store the passphrase in the boot binaries (better than nothing...) but this results in more work for me.* possibly the customer should not be able to move the hard disks to another pc, i.e. reading the passphrase from some unique hardware ID. This is risky but I could add a master passphrase to be used in case of hardware replacement

View 3 Replies View Related

General :: Security - Securing A Server When There Is Potential Physical Access?

Jun 9, 2011

We want to set up a Linux server (hosting Git or later SVN repositories) which should have all stored data strongly encrypted, so that if one steals the server the data cannot be read. For example, our notebooks have all important data stored on a "true-crypted" partition.

We plan to access it with SSH private keys and only after successful login should the data be readable. The server would be located in our office, shut down at night and not be connected to the Internet directly, but only accessible in our intranet.

View 1 Replies View Related

Server :: Secure Remote Server From Unwanted Ssh Logins?

Jul 2, 2010

we have a remote linux server and its /var/log/secureile is fully filled with unauthorized ssh users,of course they cannot able to log in successfully but they were making continuous ssh requests to log in, it some times results in server down problem. so how to secure our server from their ssh attempts.i know blocking unauthorized ip addresses can solve this problem and we can also change the ssh port numbers but what are the other possible ways of solving this.

View 4 Replies View Related

Server :: Logins Via SSH To Server Are Extremely Slow

Jun 13, 2010

Running RHEL 5.5 x64 with the latest updates. Running Oracle 11gR2. Server has 8gb ram 2xcpu 2.4 xeon.Only running one fresh instance of Oracle, no applications are even pointed at the DB.Two Issues...

1. Logins via SSH to server are extremely slow, about 30 seconds after typing password
2. Once I am logged in, launching sqlplus is very slow. After typing password, sqlplus hangs for 15 or so seconds.

Even when I am actually at the console, login of course is instantaneous.. but sqlplus still has the same issue. CPU is at 0% no swap is being used. Shouldn't be a network issue, on the same network.

View 2 Replies View Related

Server :: Limit The Number Of Logins For A User To Only One?

May 3, 2011

I ran into a user today that indicated that their company only allows them to log in through a terminal session once (no multiple logins). On second try their login window terminates. They are using putty.Is this being accomplished through PAM or sshd ( or some other method)?

View 1 Replies View Related

Server :: Samba Not Accepting User Logins?

Feb 23, 2011

I have a samba server that I had setup using the default smbpasswd backend, and it worked fine. So long as I remembered to use smbpasswd/passwd to setup a user with a username and password matching the account name of a Windows 7 user, then that windows 7 user would be able to navigate the shares with their permissions correctly.I have switched over to using ldap, and: the console/ssh of the machine can correctly use any of the ldap logins getent passwd/group both show the complete listing my Windows 7 machines can all ping the samba server by its netbios name my Windows 7 machines all prompt for authentication if I type \MACHINENAME into explorerHowever, all attempts to access the shares now continually ask for you to enter your username/password, and then fails anyway.No errors appear to be generated on the server (unless I'm missing a log somewhere). Having hunted around on the web, I'm wondering if it has to do with generation of machine accounts (since it tries to access from MACHINENAMEUSER). Without ldap setup, I didn't need to worry about the machine name, but I'm thinking that maybe smbpasswd took care of this somehow.I use the smbldap-useradd tool to setup a user account, which appears to correctly setup the user in ldap, such as:

Code:
dn: uid=sharer,ou=Users,dc=intbus,dc=net
objectClass: top

[code]...

View 2 Replies View Related

Server :: My /var/log/secure File Is Not Getting Updated With Ssh Logins?

Jul 17, 2010

my /var/log/secure file is not getting updated with ssh logins from yesterday.Even the login from my own ip is not updated.

View 2 Replies View Related

Server :: Primary Domain Controller Would Be A Better Way To Manage Logins?

Feb 17, 2011

We have a LAN with mixed Windows workstations win 2000, winxp, vista, win 7, linux servers all in a workgroup. Most applications used on the LAN are windows based, with a growing number of python apps. A friend suggested a Primary Domain Controller would be a better way to manage logins, resources etc. I don't wont to use a Windows based PDC, what would you suggest as a linux based PDC? I have heard about TURNKEY PDC, but it uses Samba 3 and apparently doesn't handle Active Directory in Windows.

View 5 Replies View Related

Server :: Proftpd - Set Retry Delay After Failed Logins ?

Aug 17, 2010

How do you configure proftpd so that once a user has failed to login and reached the MaxLoginAttempts. That they can not retry logging in for another 4 hours ?

View 6 Replies View Related

Server :: VsFTPd - ReverseDNS IdentLookups - Slow Logins

Dec 17, 2010

Question on vsFTPd. I just switched to it from ProFTPd. With ProFTPd clients on the LAN that connected to the ProFTPd server on the LAN had slow logins with their FTP client until in the ProPFTd config file I uncommented these two lines:

#UseReverseDNS off
#IdentLookups off

Now that I"m using vsFPTd, I was wondering if there were similar settings since I see logging into the vsFTPd server is slow (20 second delay).

View 4 Replies View Related

Fedora Security :: Help Securing My Fedora 11 Server

Nov 19, 2009

I am pretty new to the Fedora 11 world. I have maradns installed on it and I'm using it as my server. What is the best way to make my machine secure. This is just a project of mine so I can become familiar with sys admin on Fedora. It doesn't have to be ultra secure, just a decent level of security would be nice. Any links or information would be greatly appreciated. Btw, I currently have selinux disabled. I'm not familiar with it and it was giving me problems so I had to disable it.

View 4 Replies View Related

Debian Configuration :: Securing My Installation ?

Feb 27, 2011

Recently I have installed Debian Squeeze amd64 on my home desktop. I have used the standard installation method using DVD. I use my desktop primarily for web surfing, playing games and web application development. I do run apache2 and mysql servers on my system as need arise. I have been told that apache2 server execution without mandatory access controls such as apparmor or selinux makes the system vulnerable.

I could not find apparmor in synaptics, so I choose selinux for this task. To start with I installed identical environment in virtual box and tried installing selinux as given in url [url]. After the last step i.e. after running command selinux-config-enforcing and reboot I get login screen, I choose username and enter password. Thats it. The screen becomes blank and no further progress. I am not sure where did I went wrong. I am also curious whether selinux is really required in such cases or there is any better way to handle such situations. I also thought of running apache2 service from virtualbox. But I did not find it suitable for my requirement though.

View 7 Replies View Related

Fedora Security :: Securing PHP And PostgreSQL

Nov 19, 2009

I'm still new to PHP and SQL, but all the tutorials I've found connect to the database like this:

PHP Code:

Right now I'm just doing local network tests before exposing everything to the Internet.

Wouldn't leaving the password in there as plain text be a huge security issue? I tried downloading the php file off the server, and it just comes down blank. So does PHP already have a security feature that doesn't allow anyone to just nab PHP files off the server?

And for Postgre, I have pg_hba.conf set up to "trust" it's own IP address:

Code:

Would I need to use something like Kerberos, PAM, or ident authentication? Right now the only plan is to use it as login system for a website. The clients themselves won't be accessing the DB itself, because all the DB access will be through PHP.

View 4 Replies View Related

Ubuntu :: Securing Computer For Office Use ?

Aug 1, 2010

In our small company, we have a policy on our current Windows computers to install and use TrueCrypt to encrypt the complete harddrives, together with Heidi Eraser to make scheduled overwrites of "not-used" data on a schedule to prevent the eventual reconstruction of deleted files.

We believe that this make quite a good foundation to prevent our data from getting in the wrong hands in the event of someone loosing a laptop on the way to the office or even a burglar stealing computers over night.

So to the question:

Since we have nearly switched all of our computers to Ubuntu during the last few weeks and we wonder what we could and should do to our Ubuntu computers to ensure a good, solid foundation to keep our data secure?

View 1 Replies View Related

Networking :: Securing Network With Static Arp?

Aug 27, 2010

I am trying to secure my LAN a little by doing static arp entries. But I am not sure how to go about doing this... I have a gateway, and I have a seperate box that runs dhcpd. I would like to assign every machine an ip and only allow it to use that ip, therefore static dhcp entries, and static arp entries on the gateway.

1. But how do I prevent someone from picking an ip that nobody is using and assigning it manually?

2. I assigned a static arp entry by doing arp -i br0 -s 2.2.2.35 00:1F:E1:CC:2E:46, how do I remove it now? I used arp -d but now it just says:

? (2.2.2.84) at <incomplete> on br0

3. I would also like each machine to have a hostname/dns.. like machinex.local, where I can do forward and reverse dns lookups, how do I config this?

4. I know static arp can be fooled if someone just clones an allow mac.. is there anything else that I could use that is more secure for wired lan?

5. I have my gateway running rflow sending all data to ntop running on my dhcp box.. Ntop is kinda cryptic, is there anything easier to use? or something that is better in features? I would like to see how much bandwidth each local ip is using and possibly what protocols, like ntop already shows.

View 1 Replies View Related

Security :: Securing My Postgresql Database ?

Jan 5, 2010

I run Slackware 13.0 and I have an apache server 2.2.13 with a postgresql 8.4.1 database attached to it via php 5.3.0. Both the apache server and the postgresql database are on the same machine.

I have the apache server port 80 exposed to the WAN. It is not a fqdm, it's just a simple IP address. On my index page, a user can login with a user/password that encrypts to md5 via postgresql and takes them into the database.

Here is the vulnerability. Can't a hacker just scan port 80 and find my ip address running apache. Go to my index page, see that I accept user/password for authentication into my postgresql database. Then they could setup a script to simply inject html GET requests of random users and passwords and use those values on the php page(the one where the action link is pointing to in the form tag) that contains user login/password in php to login to my postgresql database. There's nothing stopping that. It would be a simple dictionary attack.

I checked out postgresql documentation and it suggested using ldap, kerberos, or md5 and not trust. I'm using md5 already. I currently use fail2ban for proftpd and sshd and it works great. After 6 failed user/pass attempts on either of these services, the IP gets banned via iptables for 24 hours. I love it. I was wondering if I could use that. Of course postgresql port is not exposed to the WAN which is a good thing. I know that when I put in a wrong user/pass from my index page, I get sent to a default postgresql pg_connect warning page. Perhaps I can increase the verbosity of postgresql's logger, find the phrase that it spits out when there's been a bad login and create a filter using that.

I understand that the way it is currently setup, my server is pretty secure, but where there's a will there's a way. I just feel that my postgresql database is unprotected even tho the postgresql port is not exposed to the WAN. They could just bruteforce from the apache server.

View 12 Replies View Related

Security :: Securing Port80 From Upload ?

Nov 19, 2010

I am using a linux fedora 12.0 with L7 filter and proxy as the main firewall for my system composed of some several hundred pcs. The port 80 is open for certain mac addresses these computers, that is to say that , only a few of these computers have access to internet and others have been denied. However, they have access to two specific websites on internet .

I would like to know that if there is a virus attack through these websites in form of executable adwares or malwares, can this linux firewall detect any information that might be directed out of those computers to the attacking source? In other words, is there s tuning in L7 filter or any other filter that can detect transfer of files or some bites through port 80 unrelated to normal http requests?

View 1 Replies View Related

Security :: Securing A Linux Centos VPS

Feb 7, 2011

I was looking for some help getting a good list of IP tables and other security measures on my new Linux Centos VPS.. I have some files I wan't no one other than myself to have access to.. I will be running some gameservers on it on ports 7777 and 7778 though and I want to have VSFTPD running for fast file transfers.

View 1 Replies View Related

Security :: Securing Backups Via Rsync And SSL?

Apr 27, 2011

There are multiple servers to be backed up. Different access rights exist in each server. There are two backup servers with plenty of disk space, one local, and one offsite. The local one feeds to the offsite one. The rsync command is being used to make a replica of backed up data. Deleted data is also being archived. There are two methods that have been considered: One is to have the individual servers run rsync which logs in to the backup server to push data. Two is to have the backup server run rsync which logs in to each individual server to pull data. Because system data is involved and meta information (like owning user) must be stored, root is required to access the data as well as to store it. That means everything runs as root both ends. So method one was quickly dismissed because each server would effectively have rights to access ALL the data on the backup server since it logs into the backup server as root. The security containment here involves different groups using different servers, and they need to be isolated from each other.

But even method two involves some risks that are a concern. This means one machine has access rights to every server. If the backup server were compromised, every machine could be compromised.What I'd like to find is some way to allow backups to be run without either machine granting root access to the other, while still running as root, or something equivalent, that allows accessing all data and storing all metadata. So I was looking at setting up an rsync daemon on each individual server (running as root so it can access what it is specified to access), and running an rsync client on the backup server (as root so it can store metadata). This opens network access issues. Any user on the network can connect to the rsync daemon. So password protection is needed. But this communication is also not encrypted, which exposes the password and the data should the network be sniffed.

So now I'm thinking about a non-root ssh login between machines. The backup server would login to a non-privileged user on each individual server and set up a secure forwarding channel to the rsync daemon. Is this the best that can be done? Is there a way to run rsync via SSL with key verification so it can all be done together? I'd like to have the rsync daemons configured to always talk SSL, and always verify the client's key against a list of authorized keys, and likewise the client verify the server's key against the known public key for that server.

View 14 Replies View Related

Fedora Servers :: Securing Apache From Php-shell

May 8, 2010

About apache security. How to protect web-server from programms like phpshell [url]?

View 8 Replies View Related

Fedora :: Practice Securing & Scanning System

Nov 29, 2010

Recently I've been going over a few resources (like Guide to the Secure Configuration of Red Hat Enterprise Linux 5) some forum members have provided and I've been using other resources I use for work (like the UNIX STIG requirements). I would like to improve my skill-set on hardening a linux server (for work and personal interest). Is there a specific linux distro I can install that is purposely corrupted/vulnerable where the sole goal is to secure it, and then have the means to scan it to make sure all vulnerabilities are patched and secured?

View 6 Replies View Related







Copyrights 2005-15 www.BigResource.com, All rights reserved