Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. You just provisioned a fresh Linux server.

You just provisioned a fresh Linux server.

Scheduled Pinned Locked Moved Uncategorized
linuxsysadmindevopssecuritynetfilter
11 Posts 8 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • larvitz@burningboard.netL This user is from outside of this forum
    larvitz@burningboard.netL This user is from outside of this forum
    larvitz@burningboard.net
    wrote last edited by
    #1

    You just provisioned a fresh Linux server. Within minutes, the SSH brute-force bots will arrive.

    There are too many ways to build a firewall in Linux. I wrote a practical guide to the four major tools: iptables, nftables, firewalld, and ufw, including their mental models and deployable configs.

    Also includes a deep dive into the "Docker Trap" (why Docker silently bypasses your default-deny rules) and how to fix it.

    (And yes, I still spend the intro and conclusion reminding everyone that FreeBSD's PF is the undisputed king of packet filtering. Let's argue in the replies.)

    Read it here: https://blog.hofstede.it/linux-firewalls-how-to-actually-secure-a-cloud-server-iptables-nftables-firewalld-ufw/

    #Linux #Sysadmin #DevOps #Security #Netfilter #Docker #Networking

    npub1600yr4qg5vcfp7svf6ysj0008tn7aphnu0gjs6lw5hjn74n0laasjx889v@momostr.pinkN x_cli@infosec.exchangeX decapitae@mastodon.socialD nokke@mastodon.socialN infosec812@foojay.socialI 7 Replies Last reply
    0
    • larvitz@burningboard.netL larvitz@burningboard.net

      You just provisioned a fresh Linux server. Within minutes, the SSH brute-force bots will arrive.

      There are too many ways to build a firewall in Linux. I wrote a practical guide to the four major tools: iptables, nftables, firewalld, and ufw, including their mental models and deployable configs.

      Also includes a deep dive into the "Docker Trap" (why Docker silently bypasses your default-deny rules) and how to fix it.

      (And yes, I still spend the intro and conclusion reminding everyone that FreeBSD's PF is the undisputed king of packet filtering. Let's argue in the replies.)

      Read it here: https://blog.hofstede.it/linux-firewalls-how-to-actually-secure-a-cloud-server-iptables-nftables-firewalld-ufw/

      #Linux #Sysadmin #DevOps #Security #Netfilter #Docker #Networking

      npub1600yr4qg5vcfp7svf6ysj0008tn7aphnu0gjs6lw5hjn74n0laasjx889v@momostr.pinkN This user is from outside of this forum
      npub1600yr4qg5vcfp7svf6ysj0008tn7aphnu0gjs6lw5hjn74n0laasjx889v@momostr.pinkN This user is from outside of this forum
      npub1600yr4qg5vcfp7svf6ysj0008tn7aphnu0gjs6lw5hjn74n0laasjx889v@momostr.pink
      wrote last edited by
      #2
      You might be interested in crowdsec. Joining that your server becomes a honeypot for this kinda bruteforce attack. If they fail a few times their IP gets submitted by your server and banned on all of them. Gets you an automatic banlist before they even reach your server.
      larvitz@burningboard.netL 1 Reply Last reply
      0
      • npub1600yr4qg5vcfp7svf6ysj0008tn7aphnu0gjs6lw5hjn74n0laasjx889v@momostr.pinkN npub1600yr4qg5vcfp7svf6ysj0008tn7aphnu0gjs6lw5hjn74n0laasjx889v@momostr.pink
        You might be interested in crowdsec. Joining that your server becomes a honeypot for this kinda bruteforce attack. If they fail a few times their IP gets submitted by your server and banned on all of them. Gets you an automatic banlist before they even reach your server.
        larvitz@burningboard.netL This user is from outside of this forum
        larvitz@burningboard.netL This user is from outside of this forum
        larvitz@burningboard.net
        wrote last edited by
        #3

        @npub1600yr4qg5vcfp7svf6ysj0008tn7aphnu0gjs6lw5hjn74n0laasjx889v I know them. Had that on my servers in the past. Nowadays, I have a static IP and restrict SSH to my servers only to my personal IP addresses.

        npub1600yr4qg5vcfp7svf6ysj0008tn7aphnu0gjs6lw5hjn74n0laasjx889v@momostr.pinkN 1 Reply Last reply
        1
        0
        • R relay@relay.mycrowd.ca shared this topic
        • larvitz@burningboard.netL larvitz@burningboard.net

          You just provisioned a fresh Linux server. Within minutes, the SSH brute-force bots will arrive.

          There are too many ways to build a firewall in Linux. I wrote a practical guide to the four major tools: iptables, nftables, firewalld, and ufw, including their mental models and deployable configs.

          Also includes a deep dive into the "Docker Trap" (why Docker silently bypasses your default-deny rules) and how to fix it.

          (And yes, I still spend the intro and conclusion reminding everyone that FreeBSD's PF is the undisputed king of packet filtering. Let's argue in the replies.)

          Read it here: https://blog.hofstede.it/linux-firewalls-how-to-actually-secure-a-cloud-server-iptables-nftables-firewalld-ufw/

          #Linux #Sysadmin #DevOps #Security #Netfilter #Docker #Networking

          x_cli@infosec.exchangeX This user is from outside of this forum
          x_cli@infosec.exchangeX This user is from outside of this forum
          x_cli@infosec.exchange
          wrote last edited by
          #4

          @Larvitz
          Please bear in mind that nft is a userland interface to the nftables kernelland interface to netfilter. You can configure netfilter via nftables with iptables.

          Thanks for sharing 🫰

          1 Reply Last reply
          0
          • larvitz@burningboard.netL larvitz@burningboard.net

            @npub1600yr4qg5vcfp7svf6ysj0008tn7aphnu0gjs6lw5hjn74n0laasjx889v I know them. Had that on my servers in the past. Nowadays, I have a static IP and restrict SSH to my servers only to my personal IP addresses.

            npub1600yr4qg5vcfp7svf6ysj0008tn7aphnu0gjs6lw5hjn74n0laasjx889v@momostr.pinkN This user is from outside of this forum
            npub1600yr4qg5vcfp7svf6ysj0008tn7aphnu0gjs6lw5hjn74n0laasjx889v@momostr.pinkN This user is from outside of this forum
            npub1600yr4qg5vcfp7svf6ysj0008tn7aphnu0gjs6lw5hjn74n0laasjx889v@momostr.pink
            wrote last edited by
            #5
            I went the tried and trusted SSH key method instead. They can bruteforce me all they want and waste their compute trying.
            1 Reply Last reply
            0
            • larvitz@burningboard.netL larvitz@burningboard.net

              You just provisioned a fresh Linux server. Within minutes, the SSH brute-force bots will arrive.

              There are too many ways to build a firewall in Linux. I wrote a practical guide to the four major tools: iptables, nftables, firewalld, and ufw, including their mental models and deployable configs.

              Also includes a deep dive into the "Docker Trap" (why Docker silently bypasses your default-deny rules) and how to fix it.

              (And yes, I still spend the intro and conclusion reminding everyone that FreeBSD's PF is the undisputed king of packet filtering. Let's argue in the replies.)

              Read it here: https://blog.hofstede.it/linux-firewalls-how-to-actually-secure-a-cloud-server-iptables-nftables-firewalld-ufw/

              #Linux #Sysadmin #DevOps #Security #Netfilter #Docker #Networking

              decapitae@mastodon.socialD This user is from outside of this forum
              decapitae@mastodon.socialD This user is from outside of this forum
              decapitae@mastodon.social
              wrote last edited by
              #6

              @Larvitz FOSS FTW!

              1 Reply Last reply
              0
              • larvitz@burningboard.netL larvitz@burningboard.net

                You just provisioned a fresh Linux server. Within minutes, the SSH brute-force bots will arrive.

                There are too many ways to build a firewall in Linux. I wrote a practical guide to the four major tools: iptables, nftables, firewalld, and ufw, including their mental models and deployable configs.

                Also includes a deep dive into the "Docker Trap" (why Docker silently bypasses your default-deny rules) and how to fix it.

                (And yes, I still spend the intro and conclusion reminding everyone that FreeBSD's PF is the undisputed king of packet filtering. Let's argue in the replies.)

                Read it here: https://blog.hofstede.it/linux-firewalls-how-to-actually-secure-a-cloud-server-iptables-nftables-firewalld-ufw/

                #Linux #Sysadmin #DevOps #Security #Netfilter #Docker #Networking

                nokke@mastodon.socialN This user is from outside of this forum
                nokke@mastodon.socialN This user is from outside of this forum
                nokke@mastodon.social
                wrote last edited by
                #7

                @Larvitz One of the "hidden" problems I run into on cloud servers is half open SYN attacks on port 80. Disparate providers and regions, no connections between servers I'm running.

                For whatever reasons, it appears the Brazilian telco systems are... compromised? (not sure) - I'm up to 33 .br subnets (/19 to /22 size) having been dropped for targeting all my random servers with port 80 SYN floods. The process is currently manual - when on a server, look at `ss -tn` then cull subnets out of whois.

                1 Reply Last reply
                0
                • larvitz@burningboard.netL larvitz@burningboard.net

                  You just provisioned a fresh Linux server. Within minutes, the SSH brute-force bots will arrive.

                  There are too many ways to build a firewall in Linux. I wrote a practical guide to the four major tools: iptables, nftables, firewalld, and ufw, including their mental models and deployable configs.

                  Also includes a deep dive into the "Docker Trap" (why Docker silently bypasses your default-deny rules) and how to fix it.

                  (And yes, I still spend the intro and conclusion reminding everyone that FreeBSD's PF is the undisputed king of packet filtering. Let's argue in the replies.)

                  Read it here: https://blog.hofstede.it/linux-firewalls-how-to-actually-secure-a-cloud-server-iptables-nftables-firewalld-ufw/

                  #Linux #Sysadmin #DevOps #Security #Netfilter #Docker #Networking

                  infosec812@foojay.socialI This user is from outside of this forum
                  infosec812@foojay.socialI This user is from outside of this forum
                  infosec812@foojay.social
                  wrote last edited by
                  #8

                  @Larvitz I went a different direction. I have #OpenVPN on my servers and only allow SSH from OpenVPN connected hosts. I originally started with #WireGuard, but too many public Wifi block WireGuard.

                  1 Reply Last reply
                  0
                  • larvitz@burningboard.netL larvitz@burningboard.net

                    You just provisioned a fresh Linux server. Within minutes, the SSH brute-force bots will arrive.

                    There are too many ways to build a firewall in Linux. I wrote a practical guide to the four major tools: iptables, nftables, firewalld, and ufw, including their mental models and deployable configs.

                    Also includes a deep dive into the "Docker Trap" (why Docker silently bypasses your default-deny rules) and how to fix it.

                    (And yes, I still spend the intro and conclusion reminding everyone that FreeBSD's PF is the undisputed king of packet filtering. Let's argue in the replies.)

                    Read it here: https://blog.hofstede.it/linux-firewalls-how-to-actually-secure-a-cloud-server-iptables-nftables-firewalld-ufw/

                    #Linux #Sysadmin #DevOps #Security #Netfilter #Docker #Networking

                    mason@partychickens.netM This user is from outside of this forum
                    mason@partychickens.netM This user is from outside of this forum
                    mason@partychickens.net
                    wrote last edited by
                    #9

                    @Larvitz My favourite solution is port knocking. It's the best log cleaning money can buy. Anything that shows up in your logs is of interest.

                    1 Reply Last reply
                    0
                    • larvitz@burningboard.netL larvitz@burningboard.net

                      You just provisioned a fresh Linux server. Within minutes, the SSH brute-force bots will arrive.

                      There are too many ways to build a firewall in Linux. I wrote a practical guide to the four major tools: iptables, nftables, firewalld, and ufw, including their mental models and deployable configs.

                      Also includes a deep dive into the "Docker Trap" (why Docker silently bypasses your default-deny rules) and how to fix it.

                      (And yes, I still spend the intro and conclusion reminding everyone that FreeBSD's PF is the undisputed king of packet filtering. Let's argue in the replies.)

                      Read it here: https://blog.hofstede.it/linux-firewalls-how-to-actually-secure-a-cloud-server-iptables-nftables-firewalld-ufw/

                      #Linux #Sysadmin #DevOps #Security #Netfilter #Docker #Networking

                      asynchronaut@fosstodon.orgA This user is from outside of this forum
                      asynchronaut@fosstodon.orgA This user is from outside of this forum
                      asynchronaut@fosstodon.org
                      wrote last edited by
                      #10

                      @Larvitz Could mention bpfilter: https://github.com/facebook/bpfilter

                      1 Reply Last reply
                      0
                      • larvitz@burningboard.netL This user is from outside of this forum
                        larvitz@burningboard.netL This user is from outside of this forum
                        larvitz@burningboard.net
                        wrote last edited by
                        #11

                        @nathanael wdym?

                        1 Reply Last reply
                        0
                        Reply
                        • Reply as topic
                        Log in to reply
                        • Oldest to Newest
                        • Newest to Oldest
                        • Most Votes


                        • Login

                        • Login or register to search.
                        • First post
                          Last post
                        0
                        • Categories
                        • Recent
                        • Tags
                        • Popular
                        • World
                        • Users
                        • Groups