Not sure about the reference you're asking for but minimally do this:
  1. Disable root login via ssh (usually in /etc/ssh/sshd_config -> PermitRootLogin no)
  2. Change default ssh port in same file to something other than 22
  3. install fail2ban or denyhosts
  4. Disable any services you don't need/use
  5. Use security enhanced linux; I'm not an ubuntu guy but this looks legit:
    1. https://help.ubuntu.com/community/SELinux
  6. not sure it's called the same on ubuntu but I recommend installing mod_security / mod_evasive on the web server also. http://ubuntuforums.org/showthread.php?t=1142222
  7. Check all of your logs daily :)



On Fri, Apr 15, 2011 at 07:20, Stephen <cryptworks@gmail.com> wrote:
I have rebuilt my server as an Ubuntu server, and am exposing parts of
same said server to the outside world. Anyone have a decent reference
on security i can read, there is quite a bit out there, but its a
muddy mess to know who is talking out their collective backside and
who actually is giving you something useful. I do know we have some
very good security geeks here and hope to borrow (beg) some pearls of
wisdom.

--
A mouse trap, placed on top of your alarm clock, will prevent you from
rolling over and going back to sleep after you hit the snooze button.

Stephen
---------------------------------------------------
PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us
To subscribe, unsubscribe, or to change your mail settings:
http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss