Linux Security Hardening: Difference between revisions
Jump to navigation
Jump to search
(→sshd) |
|||
Line 49: | Line 49: | ||
[[Sshd_Configuration#Prevent_from_Listening_on_IPV6|Prevent the sshd from listing on IPV6]]. | [[Sshd_Configuration#Prevent_from_Listening_on_IPV6|Prevent the sshd from listing on IPV6]]. | ||
==iptables== | |||
iptables review. | |||
=TODO= | =TODO= |
Revision as of 05:35, 22 April 2018
Internal
Overview
Steps
Minimal Footprint
Install a minimal image and add utilities as needed.
Eliminate Users
Remove all unneeded users.
root
Change the root's password to a long, random one.
Scan for Services Listening on Ports
netstat -tupln
Eliminate:
sshd
Allowed Users
Configure sshd to only allow root access only based on public/private key identification.
Alternatively, create a special login user with a random name and a long, random password:
groupadd -g 1200 m3rt50acc useradd -g 1200 -m -u 1200 m3rt50acc
then Disallow root to log in at all. Possibly add m3rt50acc's public key to authorized_keys.
sshd Port
Disable IPV6
Prevent the sshd from listing on IPV6.
iptables
iptables review.
TODO
- Penetration detection.