Author

Topic: How secure is a fresh Ubuntu install? (Read 957 times)

legendary
Activity: 3766
Merit: 1742
Join the world-leading crypto sportsbook NOW!
March 13, 2017, 12:20:45 AM
#6
In its simplest form,
Change the ssh in service port.
edit /etc/ssh/sshd_config
.
.
.
# What ports, IPs and protocols we listen for
Port 22
.
.
.

change 22 to new service port. (bigger than 1024)





This is a good advice but at the same time a port scan for an attacker is not something too hard to do, so always be sure to first use a strong password (or as another user has suggested, a certificate).
legendary
Activity: 1736
Merit: 1023
March 12, 2017, 04:16:26 PM
#5
I recommend setting up a SSH key and disabling password based authentication within SSH. This will greatly help prevent any unauthorized access via brute force attempts.
legendary
Activity: 2296
Merit: 1014
March 12, 2017, 03:48:17 PM
#4
You will have a couple of hundred failed SSH login attempts a day from automated ssh bruteforce crawlers. So make sure that your username is unique (in some ways it is more important than your password) and your password is strong (12 character, lower,upper,numbers and symbols) would be my advise. Or better yet disable remote password login altogether and only allow login using ssh keys.
This one, especially password creation advices.
Install as many security features as possible, don't let other users to your system, because its easier to secure it from remote vulnerabilities than local ones.
Zz
legendary
Activity: 1820
Merit: 1077
March 12, 2017, 02:31:33 PM
#3
In its simplest form,
Change the ssh in service port.
edit /etc/ssh/sshd_config
.
.
.
# What ports, IPs and protocols we listen for
Port 22
.
.
.

change 22 to new service port. (bigger than 1024)



full member
Activity: 126
Merit: 100
July 02, 2011, 02:24:33 PM
#2
You will have a couple of hundred failed SSH login attempts a day from automated ssh bruteforce crawlers. So make sure that your username is unique (in some ways it is more important than your password) and your password is strong (12 character, lower,upper,numbers and symbols) would be my advise. Or better yet disable remote password login altogether and only allow login using ssh keys.

EDIT also run
netstat -an | more
And check what ports on the machine are currently open
port 22 is ssh on all network interfaces, so you will see a line similar to the following
Code:
tcp        0      0 0.0.0.0:22              0.0.0.0:*               LISTEN
Check what other ports are listening for incoming traffic on your machine, and see if you actually need them, if you don't then disable them.

You might also want to Google "bastille ubuntu" or "hardening ubuntu"

There is no such thing as a 100% secure, all you can do is raise your fence higher and make them stronger than other peoples, and hopefully crackers will leave you alone.

I once setup an OpenBSD machine on the Internet on which I modified the source to sshd and ran this 2nd fake copy on port 22. The machine logged the username and password attempts by the automated bots, they were very basic admin:admin apache:webmaster john:mypassword but that was around 5 years ago.
newbie
Activity: 41
Merit: 0
July 02, 2011, 01:40:36 PM
#1
I have SSH server installed on my dedicated ubuntu miner but I'm not completely comfortable leaving it exposed for long periods of time. Is that really an issue? I don't mean physically exposed, rather out on the open internet.
Jump to: