Page 1 of 4 123 ... LastLast
Results 1 to 10 of 32

Thread: Basic Security Wiki (I can't leave "good enough" alone...)

  1. #1
    Join Date
    Sep 2011
    Beans
    1,531

    Basic Security Wiki (I can't leave "good enough" alone...)

    Since Dangertux's server fell over and his helpful tutorials no longer have the screenshots available, I took it upon myself to copy his firewall tutorial into a wiki. It is located here:

    https://wiki.ubuntu.com/BasicSecurity/Firewall

    I haven't gotten around to adding the screen shots of GUFW yet but I plan to (unless someone else feels like it, in which case feel free !)

    I also added the missing photos into https://wiki.ubuntu.com/BasicSecurity/DidIJustGetOwned

    Enjoy

  2. #2
    Join Date
    Oct 2009
    Beans
    Hidden!
    Distro
    Ubuntu 22.04 Jammy Jellyfish

    Re: Basic Security Wiki (I can't leave "good enough" alone...)

    Awesome! Thanks for your continued work with this.
    Come to #ubuntuforums! We have cookies! | Basic Ubuntu Security Guide

    Tomorrow's an illusion and yesterday's a dream, today is a solution...

  3. #3
    Join Date
    Jul 2006
    Location
    Castrum, Germania Secunda
    Beans
    1,071

    Re: Basic Security Wiki (I can't leave "good enough" alone...)

    Why the need for those extra firewall rules? In my opinion the default set of rules is quite sensible and should suffice for 90 % of the users....

    So for most users, merely switching on ufw should be quite enough:
    Code:
    sudo ufw enable
    ...and that's all.
    Last edited by Pjotr123; December 25th, 2012 at 07:12 PM.

  4. #4
    Join Date
    Apr 2006
    Location
    Montana
    Beans
    Hidden!
    Distro
    Kubuntu Development Release

    Re: Basic Security Wiki (I can't leave "good enough" alone...)

    Quote Originally Posted by Pjotr123 View Post
    Why the need for those extra firewall rules? In my opinion the default set of rules is quite sensible and should suffice for 90 % of the users....

    So for most users, merely switching on ufw should be quite enough:
    Code:
    sudo ufw enable
    ...and that's all.
    I agree. But for those who wish to look deeper or those who want additional security the wiki page is a great asset.

    Keep in mind, this is posted in the security section not general help, so most people here are looking for a little extra.
    There are two mistakes one can make along the road to truth...not going all the way, and not starting.
    --Prince Gautama Siddharta

    #ubuntuforums web interface

  5. #5
    Join Date
    Jul 2006
    Location
    Castrum, Germania Secunda
    Beans
    1,071

    Re: Basic Security Wiki (I can't leave "good enough" alone...)

    Quote Originally Posted by bodhi.zazen View Post
    I agree. But for those who wish to look deeper or those who want additional security the wiki page is a great asset.

    Keep in mind, this is posted in the security section not general help, so most people here are looking for a little extra.
    OK... I understand, and that makes sense.

    But the main page of that wiki says this:
    This guide is intended for the typical, average home user that is in the process of learning how to use Ubuntu. So if you just surf the net, play games (on-line & off-line), do on-line banking, education...then you are the intended audience.
    Source: https://wiki.ubuntu.com/BasicSecurity/

    Maybe that text should be altered?

  6. #6
    Join Date
    Aug 2006
    Location
    Somewhere in the hell
    Beans
    294
    Distro
    Ubuntu 12.04 Precise Pangolin

    Re: Basic Security Wiki (I can't leave "good enough" alone...)

    I agreed with Pjotr123.

    After reading the article, my first impression is that this article will put you into the trouble if you are not familiar with networking and TCP/IP.

    For example, if you are using GMail, you may be in trouble as she uses different ports other than the article stated.

    In my option, this kind of article is not recommanded.

    Samiux

  7. #7
    Join Date
    Jun 2011
    Location
    The Shadow Gallery
    Beans
    6,744

    Re: Basic Security Wiki (I can't leave "good enough" alone...)

    Quote Originally Posted by samiux View Post
    I agreed with Pjotr123.

    After reading the article, my first impression is that this article will put you into the trouble if you are not familiar with networking and TCP/IP.

    For example, if you are using GMail, you may be in trouble as she uses different ports other than the article stated.

    In my option, this kind of article is not recommanded.

    Samiux
    Gmail ports are listed at the end as not everyone uses gmail.

    it is a wiki, anyone can edit it if you feel it needs something.
    Backtrack - Giving machine guns to monkeys since 2006
    Kali-Linux - Adding a grenade launcher to the machine guns since 2013

  8. #8
    Join Date
    Aug 2006
    Location
    Somewhere in the hell
    Beans
    294
    Distro
    Ubuntu 12.04 Precise Pangolin

    Re: Basic Security Wiki (I can't leave "good enough" alone...)

    After reading the article "DidIJustGetOwned", I am feeling that I am reading a joke.

    First of all, rkhunter and chkrootkit are useless as they will make you very busy in the confirming the false postitive when your packages are just updated.

    Clean (believed to be) logs cannot proof that nobody else has gain access your system from the outside world. It is because almost all attackers are using Tor or proxy as well as they will also spoof their IP addresses. In addition, they may also delete their footprints.

    No attacker will create an unauthorized connection. They will use authorized connection instead. You cannot find the difference between malicious or not malicious.

    The last thing is that what the attacker want to do after your system is compromised? Think about it!

    Samiux

  9. #9
    Join Date
    Oct 2009
    Beans
    Hidden!
    Distro
    Ubuntu 22.04 Jammy Jellyfish

    Re: Basic Security Wiki (I can't leave "good enough" alone...)

    Quote Originally Posted by samiux View Post
    After reading the article "DidIJustGetOwned", I am feeling that I am reading a joke.
    Congrats? It was written with the help of a few InfoSec people, namely Haqking and Dangertux.

    It is on the wiki for people to improve it if they want.
    Come to #ubuntuforums! We have cookies! | Basic Ubuntu Security Guide

    Tomorrow's an illusion and yesterday's a dream, today is a solution...

  10. #10
    Join Date
    Jun 2011
    Location
    The Shadow Gallery
    Beans
    6,744

    Re: Basic Security Wiki (I can't leave "good enough" alone...)

    Quote Originally Posted by samiux View Post
    After reading the article "DidIJustGetOwned", I am feeling that I am reading a joke.

    First of all, rkhunter and chkrootkit are useless as they will make you very busy in the confirming the false postitive when your packages are just updated.

    Clean (believed to be) logs cannot proof that nobody else has gain access your system from the outside world. It is because almost all attackers are using Tor or proxy as well as they will also spoof their IP addresses. In addition, they may also delete their footprints.

    No attacker will create an unauthorized connection. They will use authorized connection instead. You cannot find the difference between malicious or not malicious.

    The last thing is that what the attacker want to do after your system is compromised? Think about it!

    Samiux

    I didnt actually contribute anything to the DidIJutsgetowned wiki.

    However from it:

    This section will cover the basics of log auditing so that you can begin to understand which log output is concerning and which is probably harmless.
    It is a basic summary to assist those entering a little deeper into securing their system giving an overall feel for what to look for.

    In reference to your post, not all attackers are skilled and not all attackers cover their tracks, infact it is all to often uneducated or unskilled attackers and skiddies attack or try to attack systems and leave a wealth of information behind, this wiki covers the basics of what to look for.

    It is not meant as a in-depth covering tracks wiki nor a in depth log auditing or forensic wiki.

    Feel free to add to it where you think applicable bearing in mind what i have just said in keeping in line with not overcomplicating things or taking things to a Penetration test or Security Audit level, it is not meant as an Offensive Security Course
    Backtrack - Giving machine guns to monkeys since 2006
    Kali-Linux - Adding a grenade launcher to the machine guns since 2013

Page 1 of 4 123 ... LastLast

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •