Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. You just provisioned a fresh Linux server.

You just provisioned a fresh Linux server.

Scheduled Pinned Locked Moved Uncategorized
linuxsysadmindevopssecuritynetfilter
11 Posts 8 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • larvitz@burningboard.netL larvitz@burningboard.net

    You just provisioned a fresh Linux server. Within minutes, the SSH brute-force bots will arrive.

    There are too many ways to build a firewall in Linux. I wrote a practical guide to the four major tools: iptables, nftables, firewalld, and ufw, including their mental models and deployable configs.

    Also includes a deep dive into the "Docker Trap" (why Docker silently bypasses your default-deny rules) and how to fix it.

    (And yes, I still spend the intro and conclusion reminding everyone that FreeBSD's PF is the undisputed king of packet filtering. Let's argue in the replies.)

    Read it here: https://blog.hofstede.it/linux-firewalls-how-to-actually-secure-a-cloud-server-iptables-nftables-firewalld-ufw/

    #Linux #Sysadmin #DevOps #Security #Netfilter #Docker #Networking

    npub1600yr4qg5vcfp7svf6ysj0008tn7aphnu0gjs6lw5hjn74n0laasjx889v@momostr.pinkN This user is from outside of this forum
    npub1600yr4qg5vcfp7svf6ysj0008tn7aphnu0gjs6lw5hjn74n0laasjx889v@momostr.pinkN This user is from outside of this forum
    npub1600yr4qg5vcfp7svf6ysj0008tn7aphnu0gjs6lw5hjn74n0laasjx889v@momostr.pink
    wrote last edited by
    #2
    You might be interested in crowdsec. Joining that your server becomes a honeypot for this kinda bruteforce attack. If they fail a few times their IP gets submitted by your server and banned on all of them. Gets you an automatic banlist before they even reach your server.
    larvitz@burningboard.netL 1 Reply Last reply
    0
    • npub1600yr4qg5vcfp7svf6ysj0008tn7aphnu0gjs6lw5hjn74n0laasjx889v@momostr.pinkN npub1600yr4qg5vcfp7svf6ysj0008tn7aphnu0gjs6lw5hjn74n0laasjx889v@momostr.pink
      You might be interested in crowdsec. Joining that your server becomes a honeypot for this kinda bruteforce attack. If they fail a few times their IP gets submitted by your server and banned on all of them. Gets you an automatic banlist before they even reach your server.
      larvitz@burningboard.netL This user is from outside of this forum
      larvitz@burningboard.netL This user is from outside of this forum
      larvitz@burningboard.net
      wrote last edited by
      #3

      @npub1600yr4qg5vcfp7svf6ysj0008tn7aphnu0gjs6lw5hjn74n0laasjx889v I know them. Had that on my servers in the past. Nowadays, I have a static IP and restrict SSH to my servers only to my personal IP addresses.

      npub1600yr4qg5vcfp7svf6ysj0008tn7aphnu0gjs6lw5hjn74n0laasjx889v@momostr.pinkN 1 Reply Last reply
      1
      0
      • R relay@relay.mycrowd.ca shared this topic
      • larvitz@burningboard.netL larvitz@burningboard.net

        You just provisioned a fresh Linux server. Within minutes, the SSH brute-force bots will arrive.

        There are too many ways to build a firewall in Linux. I wrote a practical guide to the four major tools: iptables, nftables, firewalld, and ufw, including their mental models and deployable configs.

        Also includes a deep dive into the "Docker Trap" (why Docker silently bypasses your default-deny rules) and how to fix it.

        (And yes, I still spend the intro and conclusion reminding everyone that FreeBSD's PF is the undisputed king of packet filtering. Let's argue in the replies.)

        Read it here: https://blog.hofstede.it/linux-firewalls-how-to-actually-secure-a-cloud-server-iptables-nftables-firewalld-ufw/

        #Linux #Sysadmin #DevOps #Security #Netfilter #Docker #Networking

        x_cli@infosec.exchangeX This user is from outside of this forum
        x_cli@infosec.exchangeX This user is from outside of this forum
        x_cli@infosec.exchange
        wrote last edited by
        #4

        @Larvitz
        Please bear in mind that nft is a userland interface to the nftables kernelland interface to netfilter. You can configure netfilter via nftables with iptables.

        Thanks for sharing 🫰

        1 Reply Last reply
        0
        • larvitz@burningboard.netL larvitz@burningboard.net

          @npub1600yr4qg5vcfp7svf6ysj0008tn7aphnu0gjs6lw5hjn74n0laasjx889v I know them. Had that on my servers in the past. Nowadays, I have a static IP and restrict SSH to my servers only to my personal IP addresses.

          npub1600yr4qg5vcfp7svf6ysj0008tn7aphnu0gjs6lw5hjn74n0laasjx889v@momostr.pinkN This user is from outside of this forum
          npub1600yr4qg5vcfp7svf6ysj0008tn7aphnu0gjs6lw5hjn74n0laasjx889v@momostr.pinkN This user is from outside of this forum
          npub1600yr4qg5vcfp7svf6ysj0008tn7aphnu0gjs6lw5hjn74n0laasjx889v@momostr.pink
          wrote last edited by
          #5
          I went the tried and trusted SSH key method instead. They can bruteforce me all they want and waste their compute trying.
          1 Reply Last reply
          0
          • larvitz@burningboard.netL larvitz@burningboard.net

            You just provisioned a fresh Linux server. Within minutes, the SSH brute-force bots will arrive.

            There are too many ways to build a firewall in Linux. I wrote a practical guide to the four major tools: iptables, nftables, firewalld, and ufw, including their mental models and deployable configs.

            Also includes a deep dive into the "Docker Trap" (why Docker silently bypasses your default-deny rules) and how to fix it.

            (And yes, I still spend the intro and conclusion reminding everyone that FreeBSD's PF is the undisputed king of packet filtering. Let's argue in the replies.)

            Read it here: https://blog.hofstede.it/linux-firewalls-how-to-actually-secure-a-cloud-server-iptables-nftables-firewalld-ufw/

            #Linux #Sysadmin #DevOps #Security #Netfilter #Docker #Networking

            decapitae@mastodon.socialD This user is from outside of this forum
            decapitae@mastodon.socialD This user is from outside of this forum
            decapitae@mastodon.social
            wrote last edited by
            #6

            @Larvitz FOSS FTW!

            1 Reply Last reply
            0
            • larvitz@burningboard.netL larvitz@burningboard.net

              You just provisioned a fresh Linux server. Within minutes, the SSH brute-force bots will arrive.

              There are too many ways to build a firewall in Linux. I wrote a practical guide to the four major tools: iptables, nftables, firewalld, and ufw, including their mental models and deployable configs.

              Also includes a deep dive into the "Docker Trap" (why Docker silently bypasses your default-deny rules) and how to fix it.

              (And yes, I still spend the intro and conclusion reminding everyone that FreeBSD's PF is the undisputed king of packet filtering. Let's argue in the replies.)

              Read it here: https://blog.hofstede.it/linux-firewalls-how-to-actually-secure-a-cloud-server-iptables-nftables-firewalld-ufw/

              #Linux #Sysadmin #DevOps #Security #Netfilter #Docker #Networking

              nokke@mastodon.socialN This user is from outside of this forum
              nokke@mastodon.socialN This user is from outside of this forum
              nokke@mastodon.social
              wrote last edited by
              #7

              @Larvitz One of the "hidden" problems I run into on cloud servers is half open SYN attacks on port 80. Disparate providers and regions, no connections between servers I'm running.

              For whatever reasons, it appears the Brazilian telco systems are... compromised? (not sure) - I'm up to 33 .br subnets (/19 to /22 size) having been dropped for targeting all my random servers with port 80 SYN floods. The process is currently manual - when on a server, look at `ss -tn` then cull subnets out of whois.

              1 Reply Last reply
              0
              • larvitz@burningboard.netL larvitz@burningboard.net

                You just provisioned a fresh Linux server. Within minutes, the SSH brute-force bots will arrive.

                There are too many ways to build a firewall in Linux. I wrote a practical guide to the four major tools: iptables, nftables, firewalld, and ufw, including their mental models and deployable configs.

                Also includes a deep dive into the "Docker Trap" (why Docker silently bypasses your default-deny rules) and how to fix it.

                (And yes, I still spend the intro and conclusion reminding everyone that FreeBSD's PF is the undisputed king of packet filtering. Let's argue in the replies.)

                Read it here: https://blog.hofstede.it/linux-firewalls-how-to-actually-secure-a-cloud-server-iptables-nftables-firewalld-ufw/

                #Linux #Sysadmin #DevOps #Security #Netfilter #Docker #Networking

                infosec812@foojay.socialI This user is from outside of this forum
                infosec812@foojay.socialI This user is from outside of this forum
                infosec812@foojay.social
                wrote last edited by
                #8

                @Larvitz I went a different direction. I have #OpenVPN on my servers and only allow SSH from OpenVPN connected hosts. I originally started with #WireGuard, but too many public Wifi block WireGuard.

                1 Reply Last reply
                0
                • larvitz@burningboard.netL larvitz@burningboard.net

                  You just provisioned a fresh Linux server. Within minutes, the SSH brute-force bots will arrive.

                  There are too many ways to build a firewall in Linux. I wrote a practical guide to the four major tools: iptables, nftables, firewalld, and ufw, including their mental models and deployable configs.

                  Also includes a deep dive into the "Docker Trap" (why Docker silently bypasses your default-deny rules) and how to fix it.

                  (And yes, I still spend the intro and conclusion reminding everyone that FreeBSD's PF is the undisputed king of packet filtering. Let's argue in the replies.)

                  Read it here: https://blog.hofstede.it/linux-firewalls-how-to-actually-secure-a-cloud-server-iptables-nftables-firewalld-ufw/

                  #Linux #Sysadmin #DevOps #Security #Netfilter #Docker #Networking

                  mason@partychickens.netM This user is from outside of this forum
                  mason@partychickens.netM This user is from outside of this forum
                  mason@partychickens.net
                  wrote last edited by
                  #9

                  @Larvitz My favourite solution is port knocking. It's the best log cleaning money can buy. Anything that shows up in your logs is of interest.

                  1 Reply Last reply
                  0
                  • larvitz@burningboard.netL larvitz@burningboard.net

                    You just provisioned a fresh Linux server. Within minutes, the SSH brute-force bots will arrive.

                    There are too many ways to build a firewall in Linux. I wrote a practical guide to the four major tools: iptables, nftables, firewalld, and ufw, including their mental models and deployable configs.

                    Also includes a deep dive into the "Docker Trap" (why Docker silently bypasses your default-deny rules) and how to fix it.

                    (And yes, I still spend the intro and conclusion reminding everyone that FreeBSD's PF is the undisputed king of packet filtering. Let's argue in the replies.)

                    Read it here: https://blog.hofstede.it/linux-firewalls-how-to-actually-secure-a-cloud-server-iptables-nftables-firewalld-ufw/

                    #Linux #Sysadmin #DevOps #Security #Netfilter #Docker #Networking

                    asynchronaut@fosstodon.orgA This user is from outside of this forum
                    asynchronaut@fosstodon.orgA This user is from outside of this forum
                    asynchronaut@fosstodon.org
                    wrote last edited by
                    #10

                    @Larvitz Could mention bpfilter: https://github.com/facebook/bpfilter

                    1 Reply Last reply
                    0
                    • larvitz@burningboard.netL This user is from outside of this forum
                      larvitz@burningboard.netL This user is from outside of this forum
                      larvitz@burningboard.net
                      wrote last edited by
                      #11

                      @nathanael wdym?

                      1 Reply Last reply
                      0
                      Reply
                      • Reply as topic
                      Log in to reply
                      • Oldest to Newest
                      • Newest to Oldest
                      • Most Votes


                      • Login

                      • Login or register to search.
                      • First post
                        Last post
                      0
                      • Categories
                      • Recent
                      • Tags
                      • Popular
                      • World
                      • Users
                      • Groups