Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Supercharging Linux: Tips & Tricks to Beat the Threat Landscape
LinuxSecurity ^ | 26 September 2023 | Brittany Day

Posted on 10/03/2023 9:05:02 AM PDT by ShadowAce

click here to read article


Navigation: use the links below to view more comments.
first 1-2021-29 next last

1 posted on 10/03/2023 9:05:02 AM PDT by ShadowAce
[ Post Reply | Private Reply | View Replies]

To: rdb3; JosephW; martin_fierro; Still Thinking; zeugma; Vinnie; ironman; Egon; raybbr; AFreeBird; ...

2 posted on 10/03/2023 9:05:14 AM PDT by ShadowAce (Linux - The Ultimate Windows Service Pack )
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

Bookmark


3 posted on 10/03/2023 9:13:39 AM PDT by rdl6989 ( )
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

Not sure how the article can claim that Linux has 96.4% of the webserver share

https://www.wappalyzer.com/technologies/web-servers/

I am not a linux guru, in fact I probably need a linux for dummies book

I could totally setup an IIS webserver with .Net framework cause that is really easy to do

but I can hardly mount a usb drive on linux


4 posted on 10/03/2023 9:42:16 AM PDT by algore
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

“A cybercriminal enters the network through brute force, or any credential abuse method.”

Just like any and all systems. Since 99% of Linux attack vulnerabilities are local and hands on, Local credential access is the main issue. Don’t let anyone near your machine and don’t give anyone credential root access you cannot personally hold accountable. And a very strong password that even their wildest dreams cannot figure out will prevent the 1% chance of brute force attacks from remote sources.


5 posted on 10/03/2023 9:50:21 AM PDT by Openurmind (The ultimate test of a moral society is the kind of world it leaves to its children. ~ D. Bonhoeffer)
[ Post Reply | Private Reply | To 1 | View Replies]

To: algore
Your link compares web servers.

Not the underlying OS.

6 posted on 10/03/2023 9:56:54 AM PDT by ShadowAce (Linux - The Ultimate Windows Service Pack )
[ Post Reply | Private Reply | To 4 | View Replies]

To: ShadowAce

you cannot run IIS on Linux, and even if you could, why would you?


7 posted on 10/03/2023 10:00:03 AM PDT by algore
[ Post Reply | Private Reply | To 6 | View Replies]

To: ShadowAce

bookmark


8 posted on 10/03/2023 10:03:07 AM PDT by mike70
[ Post Reply | Private Reply | To 1 | View Replies]

To: algore

There are whole nations running Linux as their government computer infrastructure.

96.3% of the top 1 million web servers run Linux. And 90% of cloud infrastructure operates on Linux.

SpaceX has used Linux-supported systems to complete 65 missions so far. This includes the famous Falcon 9 missions. Being the primary choice of governmental agencies as well as private companies, Linux users include other high-end space organizations, including NASA and ESA.

https://truelist.co/blog/linux-statistics/


9 posted on 10/03/2023 10:07:10 AM PDT by Openurmind (The ultimate test of a moral society is the kind of world it leaves to its children. ~ D. Bonhoeffer)
[ Post Reply | Private Reply | To 4 | View Replies]

To: ShadowAce

Know what I want? Unlike most who are plain lazy, I want to implement a “timed” requirement for two logins to pass with two different credentials before mine can be rooted. That way even if one is breached there is a second to pass within a time limit or it locks up.

How would I do this?


10 posted on 10/03/2023 10:45:39 AM PDT by Openurmind (The ultimate test of a moral society is the kind of world it leaves to its children. ~ D. Bonhoeffer)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Openurmind
Know what I want? Unlike most who are plain lazy, I want to implement a “timed” requirement for two logins to pass with two different credentials before mine can be rooted. That way even if one is breached there is a second to pass within a time limit or it locks up.

How would I do this

Not quite the same thing, but "port knocking" can give you additional protection.

11 posted on 10/03/2023 11:17:39 AM PDT by zeugma (Stop deluding yourself that America is still a free country.)
[ Post Reply | Private Reply | To 10 | View Replies]

To: zeugma

Cool! digging around about it, thank you!


12 posted on 10/03/2023 12:07:48 PM PDT by Openurmind (The ultimate test of a moral society is the kind of world it leaves to its children. ~ D. Bonhoeffer)
[ Post Reply | Private Reply | To 11 | View Replies]

To: ShadowAce

Those of us who use Linux regularly have to guard against our tendency to think that with regards to security we’re bullet-proof. No such thing when it comes to any computer connected to the Internet, is there?


13 posted on 10/03/2023 1:14:12 PM PDT by Montana_Sam (Truth lives.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

Biggest thing to help linux for home use is Steam Deck.


14 posted on 10/03/2023 1:27:05 PM PDT by for-q-clinton (Cancel Culture IS fascism...Let's start calling it that!)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Openurmind
Give me physical access to ANY* computer, and it's mine. I don't need your credentials.

except for those with encrypted disks. That would take me a while longer

15 posted on 10/03/2023 1:36:23 PM PDT by ShadowAce (Linux - The Ultimate Windows Service Pack )
[ Post Reply | Private Reply | To 10 | View Replies]

To: Montana_Sam
No such thing when it comes to any computer connected to the Internet, is there?

The largest threat is social engineering. A well-hardened/secured Linux box is much more secure, technically, than a Windows box.

In fact, I've set up all our new builds here at work so that no user (except one account) can become root--even if they know the root password. They can run a limited subset of commands as root (to enable them to do their jobs), but they cannot become root, and they cannot edit important configuration files as root--though they can edit other files as root.

16 posted on 10/03/2023 1:41:02 PM PDT by ShadowAce (Linux - The Ultimate Windows Service Pack )
[ Post Reply | Private Reply | To 13 | View Replies]

To: ShadowAce

Well of course there are those like yourself who can do that. But at that point there is no way to keep someone like you out anyhow. But... It would be nice to better harden it from the 99.999% of attempts.

It would be comparable to digging through a thousand keys to unlock the first door. Then having to dig through thousands of different keys to unlock the second inside door. But only having 5 seconds to dig through all those keys to unlock both doors quick enough to keep it from locking up completely requiring a hard power down and reboot.

No one can root it without both “known” door keys already in hand, use them quickly in sequence, or too late you are not getting in at all because the whole thing locks up and you have to start all over again from power up and reboot.

But at it’s face it would look like the first was just a failed attempt because it gives you the login form again. There would be no indicators at all that the first was successful or not. But entering the second password within 5 seconds would then root it. So the secret requirement of two logins would not even be detectable or obvious. You would have to know it was set up this way. Even if they do guess the first login, screwing around trying to guess the second login in 5 seconds would be near impossible. If they even figure out the problem is that it also needs a second.

Digging through PAM stuff now to see if something can be put together. :)


17 posted on 10/03/2023 1:45:28 PM PDT by Openurmind (The ultimate test of a moral society is the kind of world it leaves to its children. ~ D. Bonhoeffer)
[ Post Reply | Private Reply | To 15 | View Replies]

To: ShadowAce

“In fact, I’ve set up all our new builds here at work so that no user (except one account) can become root—even if they know the root password. They can run a limited subset of commands as root (to enable them to do their jobs), but they cannot become root, and they cannot edit important configuration files as root—though they can edit other files as root.”

Yes, I was just reading about creating levels of configuration access.


18 posted on 10/03/2023 1:47:32 PM PDT by Openurmind (The ultimate test of a moral society is the kind of world it leaves to its children. ~ D. Bonhoeffer)
[ Post Reply | Private Reply | To 16 | View Replies]

To: ShadowAce
Do you love Linux because of its user-friendly, exceptionally secure, heavy-duty, and open-source, making it easy to customize and maintain? If so, you’re not alone.

No, for me most of the above applies to Windows 11, as customized (which few do), thank God, but you knew that. Maybe someday MS will change too many things the wrong way and make the time needed to customize one of the multitudinous flavors of Linux warranted. No need to as of now, but thanks for being out there. Linux

It is no wonder that Linux has captured the lion's share of the IT market

I think the fact that it is free also has something to do with that.

19 posted on 10/03/2023 8:53:36 PM PDT by daniel1212 (As a damned+destitute sinner turn 2 the Lord Jesus who saves souls on His acct + b baptized 2 obey H)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Openurmind
Since 99% of Linux attack vulnerabilities are local and hands on

Quite a stat.

20 posted on 10/03/2023 9:02:56 PM PDT by daniel1212 (As a damned+destitute sinner turn 2 the Lord Jesus who saves souls on His acct + b baptized 2 obey H)
[ Post Reply | Private Reply | To 5 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-29 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson