Not sure about the reference you're asking for but minimally do this:
1. Disable root login via ssh (usually in /etc/ssh/sshd_config ->
PermitRootLogin no)
2. Change default ssh port in same file to something other than 22
3. install fail2ban or denyhosts
4. Disable any services you don't need/use
5. Use security enhanced linux; I'm not an ubuntu guy but this looks
legit:
1. https://help.ubuntu.com/community/SELinux
6. not sure it's called the same on ubuntu but I recommend installing
mod_security / mod_evasive on the web server also.
http://ubuntuforums.org/showthread.php?t=1142222
7. Check all of your logs daily :)
On Fri, Apr 15, 2011 at 07:20, Stephen <
cryptworks@gmail.com> wrote:
> I have rebuilt my server as an Ubuntu server, and am exposing parts of
> same said server to the outside world. Anyone have a decent reference
> on security i can read, there is quite a bit out there, but its a
> muddy mess to know who is talking out their collective backside and
> who actually is giving you something useful. I do know we have some
> very good security geeks here and hope to borrow (beg) some pearls of
> wisdom.
>
> --
> A mouse trap, placed on top of your alarm clock, will prevent you from
> rolling over and going back to sleep after you hit the snooze button.
>
> Stephen
> ---------------------------------------------------
> PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us
> To subscribe, unsubscribe, or to change your mail settings:
> http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss
>
---------------------------------------------------
PLUG-discuss mailing list -
PLUG-discuss@lists.plug.phoenix.az.us
To subscribe, unsubscribe, or to change your mail settings:
http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss