Quote:
Originally Posted by Obsidian
Denyhosts is worth a mention as well.
Also, ufw may be simpler for a newcomer to the server admin world to understand; it's a syntax sweetener for iptables, and much more straightforward to work with. I know there's quite a few tuts on Ubuntu's forums about it, so no need to go over it, just link to them.
|
Ya UFW is great for new linux admins BUT it is only on Ubuntu by default. And it does not allow for some of the more complex rules. here is a list of things it can do
https://wiki.ubuntu.com/UncomplicatedFirewall
Also on that page is links to the manuals if you are using those versions of Ubuntu.
As for Denyhosts that is great for stopping people who keep attacking you but i rather just use iptables to only allow my IP to access SSH. I also have a port knocking set up just in case my ip changes.
I will add links to UFW to the tut for Ubuntu users tho thanks for the info.
Quote:
Originally Posted by Rizla
what i meant by changing the ports, obv you should still use a firewall, but it makes it more easy to secure.
|
Like i said before changing to port just makes it so alot of automated scripts do not see SSH running on 22 but if they run a port scan they can still see the SSH banner. The best way to make SSH secure is the following.
- Use Protocol 2 ONLY
- Do not ForwardX11 unless you have a GUI installed (Should not on servers)
- Use AllowUsers
- Turn PAsswordAuthentication off
- Prevent Root Login
- Change Port
I would not allow external connections tell that is at least done there is more you can do with chroot and PAM. But that will keep most script kiddies out.
+

?
__________________