Security basics

Lamar Owen lowen at pari.edu
Wed Oct 3 20:22:43 UTC 2007


On Wednesday 03 October 2007, Karl Larsen wrote:
>     I have sure heard a LOT about security updates and I have had my own
> problems. For years I thought the only thing necessary was a good root
> password. This year I found out with ssh around you need a good password
> for your own login name. My problem was caused by having a super poor
> login password which was my last name. Since the login name was karl it
> followed.

Also: run ssh on some port other than 22.  This is accomplished by 
editing /etc/ssh/sshd_config and /etc/sysconfig/iptables (to add the port to 
iptables, assuming you're running iptables).  If you know the IP addresses 
from which you will always be connecting, then set your firewall (both on any 
external router as well as in /etc/sysconfig/iptables) to only allow the IP 
addresses you want.

Just changing from port 22 to some other port (and 222 or 2222 aren't good 
ones; anything above 1024 is fair game) will eliminate 90% or more of your 
risk. 

Also, set up RSA key security and eliminate password-based logins.  This is a 
fairly lengthy setup; I'm sure there's a HOWTO in the archives (I'm getting 
ready to go home for the day, and do't have time to type it in; if you can't 
find it anywhere, I can write one up fairly quickly, as I've set this up on 
several boxes).  Some might say to just do this and not worry about the 
listening port change; I prefer multilayered security (why I run SELinux in 
enforcing/targete mode on servers) when possible.

With a nonstandard port you do have to remember to use the -p parameter of ssh 
to connect (and the -P parameter of scp) but in my opinion it's worth it.
-- 
Lamar Owen
Chief Information Officer
Pisgah Astronomical Research Institute
1 PARI Drive
Rosman, NC  28772
(828)862-5554
www.pari.edu




More information about the fedora-list mailing list