Results 1 to 6 of 6

Thread: Linux Security Checklist

  1. #1
    Join Date
    Jan 2007
    Beans
    43
    Distro
    Ubuntu 7.04 Feisty Fawn

    Linux Security Checklist

    I just stumbled upon this Linux Security Checklist, and I've got to admit, I feel pretty vulnerable.

    Should I be doing more? Heck, I'm not even sure if my firewall is working...
    Share Ubuntu with Non-Nerds: openBlog.ws/ubuntu

  2. #2
    -grubby is offline May the Ubuntu Be With You!
    Join Date
    Aug 2007
    Beans
    Hidden!

    Re: Linux Security Checklist

    I don't feel vulnerable. I'm pretty sure there aren't any crackers trying to get me.

  3. #3
    Join Date
    May 2007
    Beans
    105

    Re: Linux Security Checklist

    Those look like some good tips for securing a server. I'm not really worried about my desktop machine, though I might look into it more if I decide to try enabling remote use of ssh on it.
    Linux user #448486 - Ubuntu user #15358

  4. #4
    Join Date
    Aug 2005
    Location
    The Middle of Nowhere
    Beans
    85

    Re: Linux Security Checklist

    It all depends on the situation how much of this stuff you implement. For example, my box is connected to no other networks but the internet, and I trust everyone who could come into physical contact with it. Add this to the fact that I use dial-up, and I don't even need a firewall, because:

    *I don't stay connected to the internet more than 25% of the day, and that's scattered throughout the day (I cannot be attacked unless I'm connected).

    *My IP address changes everytime I connect (I cannot be attacked unless the attacker has my IP address).

    *I have a recent backup of my data, so even if an attacker WERE to get my IP address while I was connected (which is unlikely if you've seen their length), I could re-install the OS and personal data.

    OK, but what about a virus via an e-mail, drive-by download, or manually downloaded executable?

    *Most viruses are designed for Windows (only about ten are for Linux last time I checked, and some of them relied on since patched bugs.

    *Linux uses the "root" system to protect files necessary for system operation.

    *Simple vigilance (if an application tries to install on or trash my system, it's gonna need a root password, which I won't give to something I don't recognize).

    The only method for delivery becomes exploiting bugs (which are quickly patched) and social engineering. There lies the weakness of Linux; you could download what you think is an application, run it, give it root privileges, and it would trash your system, steal your identity, etc. But nothing on that list, nor any operating system, will save you from that. Heck, even being careful wouldn't, because someone could hack a repository and slip in a malicious package.

    Of course, if you use broadband, it would be wise to implement some, if not ALL of that list, because your IP address is near-constant and your computer is connected to the internet for long periods of time. But even that list won't save you in all circumstances; nothing will. It's just impossible to do.
    Useless signature space.

  5. #5
    Join Date
    Nov 2012
    Beans
    1

    Re: Linux Security Checklist

    I do agree with Ireclan..The security implementation totally depends on the infrastructure that you are working with.

    For example imagine that you have a setup of web clusters where all of them is behind a load balencer, and traffic from internet cannot reach the servers directly. In that case, the servers behind are pretty much secure..You need to be extremely cautious about a bastion host which you have on your network..

    This links also might provide some more info on the steps required..security checklist for a linux system administrator

    But yeah all depends on your infrastructure...!

  6. #6
    Join Date
    Mar 2006
    Location
    Williams Lake
    Beans
    Hidden!
    Distro
    Ubuntu Development Release

    Re: Linux Security Checklist

    This thread is 5 years old, much has changed in that time. I'd suggest you check out the Security Discussions sub-forum, if you have any questions. Thread closed.

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •