Discover Habbo's history
Treat yourself with a Secret Santa gift.... of a random Wiki page for you to start exploring Habbo's history!
Happy holidays!
Celebrate with us at Habbox on the hotel, on our Forum and right here!
Join Habbox!
One of us! One of us! Click here to see the roles you could take as part of the Habbox community!


Results 1 to 4 of 4
  1. #1
    Join Date
    May 2005
    Location
    /etc/passwd
    Posts
    19,110
    Tokens
    1,139

    Latest Awards:

    Default Securing Linux webservers?

    Hey,

    I was just wondering how people secured their Linux webservers? Typically what I'd do is:

    - Change SSH port to something obscure
    - Install some sort of firewall and only allow public services through
    - Turn off server signatures on Apache/Lighttpd
    - Install RKHunter/Chkrootkit
    - Setup e-mail on SSH login
    - Keep the OS and services up to date
    - Install suPHP
    - Install mod_security
    - Disable rare/dangerous PHP functions
    - Secure /tmp with noexec & nosuid

    Anymore people would recommend?
    Quote Originally Posted by Chippiewill View Post
    e-rebel forum moderator
    :8

  2. #2
    Join Date
    Mar 2011
    Posts
    333
    Tokens
    863

    Default

    This entirely depends on what server I'm configuring - e.g. what it's used for. However, my standard procedure is the following:

    - Disable SSH password authentication, in favour of public key authentication.
    - Secure /tmp, /dev/ etc.
    - Install CSF, always. Configure to my usual standard.
    - Compile Apache & PHP with mod_security and various others.
    - Install SuPHP.
    - Install LMD.
    - Reboot into CloudLinux with KSplice.
    - Check permissions.

    Probably more too, not got my procedure list up.

    ---------- Post added 16-06-2011 at 07:32 PM ----------

    Quote Originally Posted by Recursion View Post
    Hey,

    I was just wondering how people secured their Linux webservers? Typically what I'd do is:

    - Change SSH port to something obscure
    - Install some sort of firewall and only allow public services through
    - Turn off server signatures on Apache/Lighttpd
    - Install RKHunter/Chkrootkit
    - Setup e-mail on SSH login
    - Keep the OS and services up to date
    - Install suPHP
    - Install mod_security
    - Disable rare/dangerous PHP functions
    - Secure /tmp with noexec & nosuid

    Anymore people would recommend?
    Just wondering why you disable PHP functions? What are your servers typically used for?

  3. #3
    Join Date
    May 2005
    Location
    /etc/passwd
    Posts
    19,110
    Tokens
    1,139

    Latest Awards:

    Default

    It's being used for typical hosting, without a control panel though.

    Generally I thought disabling PHP functions was just another layer of protection against shell scripts and the like. I'm hosting fairly tech savvy people I know, which is exactly why I'm hardening it as much as possible!

    Funnily enough it's on a VPS from you guys
    Quote Originally Posted by Chippiewill View Post
    e-rebel forum moderator
    :8

  4. #4
    Join Date
    Mar 2011
    Posts
    333
    Tokens
    863

    Default

    Quote Originally Posted by Recursion View Post
    It's being used for typical hosting, without a control panel though.

    Generally I thought disabling PHP functions was just another layer of protection against shell scripts and the like. I'm hosting fairly tech savvy people I know, which is exactly why I'm hardening it as much as possible!

    Funnily enough it's on a VPS from you guys
    I used to have the same mind set, but I manage 3,000 shared clients on a daily basis and have a pretty thorough understanding of Linux security now.

    Disabling PHP functions will obstruct things like root kit shells, but they're more of a nuisance and annoyance than anything else. If a hacker wants to do harm to your server, they'll get around disabling PHP functions eventually or just use Perl, Ruby etc. Many people forget that PHP isn't the only server side language enabled on web servers. As well as this, disabling PHP functions will be rather frustrating for legitimate clients - what about vBulletin or other applications that require the use of shell_exec, popen etc?

    True security is with keeping your kernel up to date and getting the permissions right. But if you do wish to disable such functions, remember to disable php.ini override within the SuPHP configuration.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •