Not sure about the reference you're asking for but minimally do this: 1. Disable root login via ssh (usually in /etc/ssh/sshd_config -> PermitRootLogin no) 2. Change default ssh port in same file to something other than 22 3. install fail2ban or denyhosts 4. Disable any services you don't need/use 5. Use security enhanced linux; I'm not an ubuntu guy but this looks legit: 1. https://help.ubuntu.com/community/SELinux 6. not sure it's called the same on ubuntu but I recommend installing mod_security / mod_evasive on the web server also. http://ubuntuforums.org/showthread.php?t=1142222 7. Check all of your logs daily :) On Fri, Apr 15, 2011 at 07:20, Stephen wrote: > I have rebuilt my server as an Ubuntu server, and am exposing parts of > same said server to the outside world. Anyone have a decent reference > on security i can read, there is quite a bit out there, but its a > muddy mess to know who is talking out their collective backside and > who actually is giving you something useful. I do know we have some > very good security geeks here and hope to borrow (beg) some pearls of > wisdom. > > -- > A mouse trap, placed on top of your alarm clock, will prevent you from > rolling over and going back to sleep after you hit the snooze button. > > Stephen > --------------------------------------------------- > PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us > To subscribe, unsubscribe, or to change your mail settings: > http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss >