[Discuss] Port Scanning
Daniel M Gessel
daniel at syntheticblue.com
Thu Aug 1 19:40:44 EDT 2024
My bro runs BSD with a mail and web server (and maybe some other stuff
too), but he has organized everything into jails so each service is a
different environment, but it's all one physical machine - I don't
really understand the details.
I run sshd on my RPis but not on my laptop. I configure the RPi OS
install before booting it, and one thing I do is set up sshd_config to
only allow public key authentication. I don't intentionally run anything
else that would respond to network traffic except ping, which I wouldn't
even know how to disable.
I do install git everywhere - I know it can run a server but I don't use
the server intentionally - I try to do everything over ssh (git, rsync
and logins). I'll try nmap to see if I can find anything.
I do use SD cards - are there security issues, or is your concern over
reliability?
Thanks!
Dan
On 2024-08-01 18:47, Kent Borg wrote:
> On 8/1/24 14:34, Daniel M Gessel wrote:
>> This thread makes me want to ask:
>>
>> As an amateur (and neophyte) sys-admin, what should I be doing to
>> check for vulnerabilities and attacks? My brother runs a publicly
>> visible server, but I'm not familiar with the tools he uses and when
>> I ask him, it all goes over my head!
>
> Ask him to slow down long enough for a followup question, listen to
> the answer, then go off and learn enough to understand what he said.
> Repeat. (Be nice to him, he might teach you a lot.)
>
>
>> Is there a guide/book/website that might help me keep my systems from
>> being easily attacked?
>
> I don't know about a book, there is a lot of information the the web,
> though the spam is getting worse of late.
>
>
> Maybe your first project is to learn enough to do the following…
>
> - Start minimal: a server that has sshd listening on port 22, has only
> you as a user, and nothing else running as a service, only the default
> OS software installed at all.
>
> - Don't store any sensitive data on that machine.
>
> - From another Linux machine do something like "nmap -A -T3 1.2.3.4",
> but put in your IP address instead of 1.2.3.4. What ports are open?
> Why? You only want port 22.
>
> - Make sure you have a good password that you haven't used elsewhere.
>
> - Keep your software up to date. (Regularly run "sudo apt update", see
> what it says.)
>
> - You should now be able to "ssh 1.2.3.4" and log in, and no one else.
> Only log in from a paranoid machine (don't log in from a potentially
> spyware infested machine that might steal your password). Make sure
> root is not allowed to login over ssh.
>
> At this point I would say you are in really good shape and that
> machine is safe to put on the internet. It doesn't do much, but that
> is a big part of why it is safe! 1. It is so simple it is probably
> configured correctly. 2. No sensitive data so the consequences of
> someone exploiting a mistake you might have made are low.
>
>
>> I run Debian (or RPi OS, which is Debian derived) on everything.
>
> I run my e-mail server on a Raspberry Pi 4! I don't trust SD cards, so
> I went through some effort to boot completely independently of SD
> cards, from redundant disks. I have it working and I trust it a lot.
>
>
>
> Some General Advice
>
> Background stuff:
>
> 1. Be worried, but not too worried.
>
> 2. Think clearly.
>
> 3. Learn.
>
> 4. Try stuff, carefully, take notes, be organized. (When you want to
> undo something you tried and don't like, your notes will be valuable.)
>
> 4. Repeat.
>
>
> Foreground stuff:
>
> 1. Be very limited in what you decide to run, less software means less
> stuff to go wrong. If some tantalizing package looks cool, but isn't
> available from your distribution, be skeptical about downloading it
> anyway. Run programs that are well respected, avoid obscure packages
> that it seems no one runs, even if they are available in your
> distribution.
>
> 2. Run stuff that has clear documentation so you have some hope of
> configuring it well. Play with a copy on some local machine before
> putting on a public facing machine.
>
> 3. Be prompt about updating your software when your distribution has
> an update ("sudo apt update"). That is another reason to run software
> from your distribution and not manually installed: much easier to get
> updates.
>
> 4. Limit your risk. I have a couple servers exposed to the internet.
> My e-mail server would be very bad if I got broken into, so I am very
> conservative about what runs on it. The web server would be merely
> very annoying if it got hacked, so I am willing to be more "flexible"
> with it, but that means storing nothing sensitive there. Note, I am
> willing to log into the less trusted web server from the more trusted
> e-mail server, but not the other way around (log into the more trusted
> e-mail server from the less trusted web server).
>
> 5. Use good passwords, write them down, keep them safe, and do not
> reuse passwords between different accounts.
>
> 6. Port scan yourself, see what ports are open, know why, make sure
> you know what they are for, and that they are correct.
>
> 7. Use a firewall, but only as an extra protection, first convince
> yourself you have been so careful that you don't really need it. (See
> #6.)
>
> 8. Change Raspbian's sudo configuration to require your password.
>
>
> Ask questions.
>
>
> -kb
>
>
> _______________________________________________
> Discuss mailing list
> Discuss at driftwood.blu.org
> https://driftwood.blu.org/mailman/listinfo/discuss
More information about the Discuss
mailing list