I have Ubuntu 12.04 installed on my home web server which I am hoping to use to host my website in the near future. Security is obviously paramount, and is my primary concern at the moment.
What is there that can be done to help prevent attacks?
My current setup is as follows:
Routers in built firewall, of which only HTTP and SSH (80 and 22) are allowed through which goes directly to the server.
Ubuntus UFW is enabled, again allowing only HTTP and SSH.
Strong passwords, and encrypted HDD
Fail2Ban Intrusion Detection System
Security updates released by Ubuntu
Disabling Root SSH Login
Restricting access to folders of the site itself
Preventing Apache from disclosing information about itself
Is there anything else which I can do to help protect my LAMP and SSH server and from a glance, how secure does it appear?
My guess is that the main problem shall end up being SQL Injection, but still the server needs to be secure.
10 Months Ago
Related Article:How Do You Get Introduce To Linux
is a Linux and Unix discussion thread by khakilang that has 25 replies, was last updated 1 year ago and has been tagged with the keywords: getting-started.
You can use iptables to further firewall your servers, and enable SELinux extensions (Security Enhanced Linux), which can very much harden your systems. SELinux was originally developed by the US National Security Agency, and is (or should be) used on all high-security government systems.
I am guesing that you require ssh access from public thats why you open SSH from firewall. I am using DenyHosts for dictionary attack as well as strong security policy. DenyHosts is really very helpful. Also I am using KeePass for making strongest password.
Yep, I do require SSH from public IPs as I could be travelling and so I can't setup a whitelist. I shall look into DenyHosts and KeePass however I think Fail2Ban has a DenyHosts style feature with it. If the password is incorrect three times it shall block the IP.