Hardening the Security on your New Virtual Private Server

Hardening the Security on your New Virtual Private Server - Hallo sahabat Very Cheap Webhosting Reviews, Pada Artikel yang anda baca kali ini dengan judul Hardening the Security on your New Virtual Private Server, kami telah mempersiapkan artikel ini dengan baik untuk anda baca dan ambil informasi didalamnya. mudah-mudahan isi postingan yang kami tulis ini dapat anda pahami. baiklah, selamat membaca.

Judul : Hardening the Security on your New Virtual Private Server
link : Hardening the Security on your New Virtual Private Server

Baca juga


Hardening the Security on your New Virtual Private Server

lowendtutorial

Hardening the security on your VPS should be one of the first tasks you perform when buying a new VPS. As a result, we've provided several tips that will help you increase the security on your VPS.

When you buy a VPS, your provider will likely send you a default root password for your server. You will need to change this password to a string that only you know. But that's just the start of what you should be doing to make sure your VPS is reasonably secure.

When you leave your password as the default password assigned by your hosting provider, your attack surface increases since someone will simply need to breach your email account in order to gain access to your VPS.

 

Changing Your Default Password

To begin this process, ensure that you have at least one root SSH session active. Reason being, you won't be able to reset the password again if the test login fails after changing it's authentication. This little trick can potentially save you from having to contact your VPS provider for a password reset.

The importance of a strong password cannot be stressed. You can always use one of the many password generating tools available such as pwgen or mkpasswd. You can also generate a secure password online using the following website:

http://passwordsgenerator.net

Once you have chosen the password, make sure to memorize it or store it in a safe location (not a post-it note on your screen).

Next, let's assign the password. Execute the following command and type the password twice as asked:

>passwd
  

As advised above, keep create a terminal root SSH connection open while performing the password change. Open another SSH connection and make sure you can log in with new password.

 

Using Key Authentication for Remote Connections to your VPS

Another good way to avoid intruders is to connect to your VPS is by using Key Authentication.

Key file authentication increases security because it makes it even nearly impossible to gain unauthorized access to your VPS without the key file that you generate.

Let's start with generating RSA key on your workstation:

> ssh-keygen -b 2048 -t rsa
  

The app will ask you for a password to guard your keys.

If you are using the app from a secure workstation you might not feel compelled to set one up. Having a password for your key files will only increase the security around your VPS since you can effectively restrict access to the repository for those authorized to access it.

The command will generate id_rsa and id_rsa.pub files in your .ssh directory.

Run the same command on your target VPS to create ~/.ssh folder with proper access credentials. After that, copy your own public RSA key from your computer:

> cat .ssh/id_rsa.pub | ssh root@YOUR-VPS-IP 'cat >> .ssh/authorized_keys'
  

and apply proper permissions on your VPS:

> chmod 600 ~/.ssh/authorized_keys
  

Open another ssh connection. Key authentication is tried by default; However, you can explicitly require it to connect (the below is run from your computer):

ssh -i ~/.ssh/id_rsa root@your-VPS-IP
  

 

Advanced Key Authentication Tasks

If you want to completely replace the root password with the key file, you can change the following lines of your sshd configuration on your VPS:

PermitRootLogin without-password
  
  PermitEmptyPasswords no
  
  PasswordAuthentication no
  

After you have corrected the lines above, you must restart the sshd service to make them active:

> service sshd restart
  

As we described above, it is a good idea to always keep another SSH session open while you make these vital configuration changes.

 

Configuring the Firewall of your VPS

Another very important tip is to enable the firewall included with your distro. Many Linux operating systems already offer already a set of preconfigured rules, but we'd like to recommend the following rules:

>iptables -A INPUT -p icmp -j ACCEPT
  
  >iptables -A INPUT -p tcp -m tcp --dport 443 -j ACCEPT
  
  >iptables -A INPUT -p tcp -m tcp --dport 22 -j ACCEPT
  
  >iptables -A INPUT -p tcp -m tcp --dport 80 -j ACCEPT
  
  >iptables -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
  
  >iptables -P INPUT DROP
  

This will leave the ICMP port, the SSH port and the web ports open (80 and 443).

If you always connect to your server from your home or office, you could avoid leaving the ICMP protocol open and add a source address to the SSH port rule.

By simply adding this rule, you will make it practically impossible to any intruder to gain access to your VPS. Another way to do this is to execute the following command:

> iptables -A INPUT -p tcp -m tcp –s YOUR-IP-ADDRESS --dport 22 -j ACCEPT
  

Once you have installed the appropriate firewall rules for your VPS, don't forget to save them so that they will be reloaded upon the reboot of the server. You can easily do that with these two commands:

>iptables-save > /root/iptables-startup-rules
  
>echo "iptables-restore < /root/iptables-startup-rules" >> /etc/rc.local
  

Now you have blocked all unnecessary communication to and from your VPS.

 

More Tips for Hardening VPS Security

After your VPS is created, it will likely be probed and scanned by various different nodes on the internet. Some are harmless while others will be looking for security vulnerabilities to exploit.

With that in mind, the sooner you harden your security, the better it is for your VPS. Hardening your VPS a topic that books could be written about.

To help point you in the right direction, consider the following best practices for VPS security:

  • Install security updates for your VPS when necessary; especially if those relate to kernel and/or crucial OS components. You can visit com and look for its advisories.
  • Do not log in as root. Create another account, create key authentication for it and make that account a sudoer
  • Only install software that you absolutely need and avoid using software from untrusted sources.
  • Backup your data! If your provider allows creating entire VPS backups/snapshots, frequently utilize this service on a daily or weekly basis.
  • If data backup isn't available to you through your providers, install backup software and make a copy of the important data on your VPS. Even the most secure systems are prone to a crash or you might delete a file by accident. In these cases, a good backup scheme will potentially save you hours of work.




Demikianlah Artikel Hardening the Security on your New Virtual Private Server

Sekianlah artikel Hardening the Security on your New Virtual Private Server kali ini, mudah-mudahan bisa memberi manfaat untuk anda semua. baiklah, sampai jumpa di postingan artikel lainnya.

Anda sekarang membaca artikel Hardening the Security on your New Virtual Private Server dengan alamat link http://verycheapwebhostingreview.blogspot.com/2016/11/hardening-security-on-your-new-virtual.html

0 Response to "Hardening the Security on your New Virtual Private Server"

Post a Comment