Linux Server Hardening
1. Protect the BIOS with PW
During the boot process you can set the PW by entering in the
BIOS.
2. Protect GRUB with PW
# vi boot/grub/grub.conf
passwd=grubpasswd
3. Disable root login: PermitEmptyPasswords no
4. Allow specific user to login: AllowUsers
alex
5. Change ss port to 9222: port = 9222 (don't forget
to open this port)
6. User ssh protocol 2: Protocol 2
7. Give admin user admin permission
visudo
%wheel ALL=(ALL) ALL
wheel:x:10:alex
8. Disable unused services to start at boot
# ntsysv
9. Disable reboot by Ctrl+Alt+Del
# vi /etc/init/control-alt-delete.conf
#exec /sbin/shutdown -r now "Control-Alt-Delete pressed"
10. Enable firewall
# after checkout with this cmd: iptables -L
11. Set SELinux to enforcing
# setenforce 1
# getenforce
Enforcing
11. Check file system permission and adapt if necessar. Sticky bit
should be set on /tmp
drwxrwxrwt. 3 root root 4096 Jul 24 03:30 tmp
drwxr-xr-x. 4 root root 4096 Jul 23 23:58 home
dr-xr-x---. 3 root root 4096 Jul 24 00:03 root
12. Set welcom and prevention message
# cat > /etc/issue
This service is restricted to authorized users only. All activities
on this system are logged. Unauthorized access will be fully investigated and
reported to the appropriate law enforcement agencies. Ctrl+D to quit
13. Disable local login except the root account
touch /etc/nologin
14. lock ssh users after 3 failed login
attempts
# echo "auth required pam_tally2.so deny=3 onerr=fail
unlock_time=600" >> /etc/pam.d/sshd
pam_tally2.so uses the file /var/log/tallylog as a counter for the
failed logis, if you wish to check the counter you can use the command
pam_tally2
[root@nuke]# pam_tally2
[root@nuke]# pam_tally2
15. Enforce password policy
Prevent Reusing Old Passwords
sudo vi /etc/pam.d/system-auth
password sufficient pam_unix.so sha512 shadow nullok
try_first_pass use_authtok remember=5
Set Minimum Password Length
sudo vi
/etc/pam.d/system-auth
password requisite pam_cracklib.so retry=3 difok=3
minlen=10
Set Password Complexity
sudo vi /etc/pam.d/system-auth
password requisite pam_cracklib.so retry=3 difok=3
minlen=10 ucredit=-1
lcredit=-2 dcredit=-1 ocredit=-1
Set Password
Expiration Period
No comments:
Post a Comment