Bitcoin Forum
May 07, 2024, 10:09:11 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: How secure is a fresh Ubuntu install?  (Read 923 times)
afarzin (OP)
Newbie
*
Offline Offline

Activity: 41
Merit: 0


View Profile
July 02, 2011, 06:40:36 PM
 #1

I have SSH server installed on my dedicated ubuntu miner but I'm not completely comfortable leaving it exposed for long periods of time. Is that really an issue? I don't mean physically exposed, rather out on the open internet.
The grue lurks in the darkest places of the earth. Its favorite diet is adventurers, but its insatiable appetite is tempered by its fear of light. No grue has ever been seen by the light of day, and few have survived its fearsome jaws to tell the tale.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1715076551
Hero Member
*
Offline Offline

Posts: 1715076551

View Profile Personal Message (Offline)

Ignore
1715076551
Reply with quote  #2

1715076551
Report to moderator
1715076551
Hero Member
*
Offline Offline

Posts: 1715076551

View Profile Personal Message (Offline)

Ignore
1715076551
Reply with quote  #2

1715076551
Report to moderator
Bert
Full Member
***
Offline Offline

Activity: 126
Merit: 100



View Profile
July 02, 2011, 07:24:33 PM
Last edit: July 02, 2011, 07:50:54 PM by Bert
 #2

You will have a couple of hundred failed SSH login attempts a day from automated ssh bruteforce crawlers. So make sure that your username is unique (in some ways it is more important than your password) and your password is strong (12 character, lower,upper,numbers and symbols) would be my advise. Or better yet disable remote password login altogether and only allow login using ssh keys.

EDIT also run
netstat -an | more
And check what ports on the machine are currently open
port 22 is ssh on all network interfaces, so you will see a line similar to the following
Code:
tcp        0      0 0.0.0.0:22              0.0.0.0:*               LISTEN
Check what other ports are listening for incoming traffic on your machine, and see if you actually need them, if you don't then disable them.

You might also want to Google "bastille ubuntu" or "hardening ubuntu"

There is no such thing as a 100% secure, all you can do is raise your fence higher and make them stronger than other peoples, and hopefully crackers will leave you alone.

I once setup an OpenBSD machine on the Internet on which I modified the source to sshd and ran this 2nd fake copy on port 22. The machine logged the username and password attempts by the automated bots, they were very basic admin:admin apache:webmaster john:mypassword but that was around 5 years ago.

Tip jar: 1BW6kXgUjGrFTqEpyP8LpVEPQDLTkbATZ6
Zz
Legendary
*
Offline Offline

Activity: 1820
Merit: 1077


View Profile
March 12, 2017, 07:31:33 PM
 #3

In its simplest form,
Change the ssh in service port.
edit /etc/ssh/sshd_config
.
.
.
# What ports, IPs and protocols we listen for
Port 22
.
.
.

change 22 to new service port. (bigger than 1024)



Velkro
Legendary
*
Offline Offline

Activity: 2296
Merit: 1014



View Profile
March 12, 2017, 08:48:17 PM
 #4

You will have a couple of hundred failed SSH login attempts a day from automated ssh bruteforce crawlers. So make sure that your username is unique (in some ways it is more important than your password) and your password is strong (12 character, lower,upper,numbers and symbols) would be my advise. Or better yet disable remote password login altogether and only allow login using ssh keys.
This one, especially password creation advices.
Install as many security features as possible, don't let other users to your system, because its easier to secure it from remote vulnerabilities than local ones.
kolloh
Legendary
*
Offline Offline

Activity: 1736
Merit: 1023


View Profile
March 12, 2017, 09:16:26 PM
 #5

I recommend setting up a SSH key and disabling password based authentication within SSH. This will greatly help prevent any unauthorized access via brute force attempts.
alexrossi
Legendary
*
Offline Offline

Activity: 3724
Merit: 1739


Join the world-leading crypto sportsbook NOW!


View Profile
March 13, 2017, 05:20:45 AM
 #6

In its simplest form,
Change the ssh in service port.
edit /etc/ssh/sshd_config
.
.
.
# What ports, IPs and protocols we listen for
Port 22
.
.
.

change 22 to new service port. (bigger than 1024)





This is a good advice but at the same time a port scan for an attacker is not something too hard to do, so always be sure to first use a strong password (or as another user has suggested, a certificate).

  ▄▄███████▄███████▄▄▄
 █████████████
▀▀▀▀▀▀████▄▄
███████████████
       ▀▀███▄
███████████████
          ▀███
 █████████████
             ███
███████████▀▀               ███
███                         ███
███                         ███
 ███                       ███
  ███▄                   ▄███
   ▀███▄▄             ▄▄███▀
     ▀▀████▄▄▄▄▄▄▄▄▄████▀▀
         ▀▀▀███████▀▀▀
░░░████▄▄▄▄
░▄▄░
▄▄███████▄▀█████▄▄
██▄████▌▐█▌█████▄██
████▀▄▄▄▌███░▄▄▄▀████
██████▄▄▄█▄▄▄██████
█░███████░▐█▌░███████░█
▀▀██▀░██░▐█▌░██░▀██▀▀
▄▄▄░█▀░█░██░▐█▌░██░█░▀█░▄▄▄
██▀░░░░▀██░▐█▌░██▀░░░░▀██
▀██
█████▄███▀▀██▀▀███▄███████▀
▀███████████████████████▀
▀▀▀▀███████████▀▀▀▀
▄▄██████▄▄
▀█▀
█  █▀█▀
  ▄█  ██  █▄  ▄
█ ▄█ █▀█▄▄█▀█ █▄ █
▀▄█ █ ███▄▄▄▄███ █ █▄▀
▀▀ █    ▄▄▄▄    █ ▀▀
   ██████   █
█     ▀▀     █
▀▄▀▄▀▄▀▄▀▄▀▄
▄ ██████▀▀██████ ▄
▄████████ ██ ████████▄
▀▀███████▄▄███████▀▀
▀▀▀████████▀▀▀
█████████████LEADING CRYPTO SPORTSBOOK & CASINO█████████████
MULTI
CURRENCY
1500+
CASINO GAMES
CRYPTO EXCLUSIVE
CLUBHOUSE
FAST & SECURE
PAYMENTS
.
..PLAY NOW!..
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!