top | item 41445369

Securing a Linux Server

62 points| matricaria | 1 year ago |kenhv.com

25 comments

order

petesergeant|1 year ago

Is there any point in Fail2ban if you're using keys and have disabled passwords? I guess defense in depth and all that

Anthony-G|1 year ago

> Is there any point in Fail2Ban if you're using keys and have disabled passwords?

I’d say no. Back in the mid 2000s, I used to use Fail2Ban as an extra layer of defense but users on Stack Exchange and Hacker News (like tptacek¹) convinced me that it was pointless if I’d already disabled password authentication.

To minimise noise in my logs and to have an extra layer of defense, I only allow TCP access to Port 22 (with rate-limiting) from my home ISP’s network block, my work IP address and via the Wireguard network interface (in case my home or work ISP change the IP addresses they provide to customers).

I have considered using Fail2Ban to stop spammers using too much Postfix resources but so far I’ve got away with postscreen and configuring Postfix to reject spam attempts as early as possible during the SMTP transaction. Similarly, my Apache server gets hammered with exploit attempts but I haven’t got around to investigating how useful Fail2Ban would be for minimising how much server resources are used in responding to these malicious HTTP requests.

¹ https://news.ycombinator.com/item?id=37795100#37796639

KenHV|1 year ago

Fail2Ban doesn't do much for SSH other than keeping your logs cleaner if you're using key based auth. It's quite good for protecting other services like Vaultwarden for example. Of course, it's just one additional layer. The important part is to configure the services themselves to be more secure.

wingmanjd|1 year ago

Fail2ban can also block ips for other services that may be listening beyond just ssh.

ezst|1 year ago

I suppose that helps recoup some system load that otherwise would be wasted in lengthy random port/service poking

jasonrojas|1 year ago

There are a few other posts on HN with the same title. Some things to also consider that I had not seen mentioned: PCI CIS Etc…

Include many more things specifically around ssh that you can do outside of fail2ban, also things that are requirements for the above….

These posts are good but slightly miss a lot of security practices that are “standard”. As always the best security is not allowing the system to be connected to anything. But in the event that you have to have a system with such availability, it’s always best to introduce at least CIS foundations and whatever you see fit for security. Just my .02..

KenHV|1 year ago

I have received a lot of feedback regarding this. I'm waiting for Ubuntu to update their CIS docs for 24.04, I'll update my post when they do. I keep a lot of my blog posts regularly updated, this post will be one of them.

klaussilveira|1 year ago

This is neat. Modern take and very pragmatic.

techcode|1 year ago

Modern take would be to simply not open anything to the outside world - except WireGuard (TailScale or such).

From there everything is either considered "localhost" or a local network.

You can setup one or two central boxes (actual home lab "server" where you already have HTTP based services, and a raspberry pi zero 2 for backup) with TailScale.

With remote devices (including phones) in same tailscale network - you can access anything in home network as if you're physically home (but also have ACLs for kids/friends/etc).

On the other (professional) end - well then NginX and SSH are not even on the same network interface. And you run NginX LB/ReverseProxy on separate boxes compared to where actual apps/websites are ...etc.

laweijfmvo|1 year ago

After following this guide, all requests to my website time out, so I guess it's secure!

laweijfmvo|1 year ago

Seems like it's something as simple as a missing `sudo ufw allow 'Nginx Full'` ?

KenHV|1 year ago

It might be a firewall issue or one of the Fail2Ban jails. If you're using all the Nginx jails, try disabling them and see if it fixes the issue.

KenHV|1 year ago

I'm surprised my post made it to HN :D