5 Easy Tweaks to increase your Linux Server's Security

Поделиться
HTML-код
  • Опубликовано: 21 окт 2024

Комментарии • 40

  • @nightmarenova6748
    @nightmarenova6748 3 года назад +12

    Great video Jay, i think this should be somewhat of a series if possible "Securing Linux servers 101"

  • @camerontgore
    @camerontgore 3 года назад +6

    Love the security content! Keep it coming!

  • @TheBlues1961
    @TheBlues1961 3 года назад +4

    Great video as always. It is amazing the amount of information you are able to deliver on the topics and surrounding the topics on such a clear manner.
    For the same reason, to me, the third edition of your book "mastering ubuntu server" is a master piece.

  • @cstephan7
    @cstephan7 3 года назад +1

    Back on track again :) Thanks for all that you do, Jay.

  • @FedecraftITALIA
    @FedecraftITALIA 3 года назад +6

    5 easy tweaks, 40 minutes long video 😵
    JK, now I will watch it.

  • @MrPDC-jr5yl
    @MrPDC-jr5yl 3 года назад +2

    Super video Jay. Is there an ansible playbook for this? :) Also, do you create a separate sudo user for ansible commands or same non-root user can be used? as well separate key for this without a pass?

    • @schriebfehler
      @schriebfehler Год назад

      Good questions. did you find your anwsers youre self? I was wondering the same

  • @grahammccann8554
    @grahammccann8554 3 года назад

    Hi Jay, Thank you for the video, very helpful.

  • @Ranblv
    @Ranblv 3 года назад +1

    excellent video as always

  • @jamiej.2365
    @jamiej.2365 3 года назад +1

    Good info. Thanks Jay!! If u get a chance i would love to see a video showing how to manually set up an open lightspeed server with wordpress and SSL config.

  • @unbekannter_Nutzer
    @unbekannter_Nutzer 3 года назад +1

    7:00 I doubt `sudo ls /etc` is a good command, to test, whether the sudo command works, since normally, you can do `ls /etc` without sudo with the same result. `sudo ls /etc/ssl/*` would be fine, which normally gives you a mixed output of files you are allowed to see and an error message for /etc/ssl/private.
    Imho it is a bad practice, to constantly clear the screen while teaching. I'm often still reading in the output or the last command. At 9:40 for instance, you clear the screen and talk until 10:15, without typing anything at the prompt. If you do a double enter when starting a new point, it is easy to follow and to find the breaks while being able to read commands and output and think about them.

  • @hoterychannel
    @hoterychannel 3 года назад +2

    if sudo still can be considered secure and more, recommended fo use? And if we going to use sudo, we can disable root account completely. or use “su” and have separate password (for root user)?
    Dont understand, if we can add our ip (or ip range) in ignoreip in fail2ban, why we cant just allow only that ips with firewall?

  • @chillpill7348
    @chillpill7348 4 месяца назад

    Wonderful video as usual brother , thanks a lot for ur rfforts & work. I m ew to linux, request you to pleaase make such tweaks & security things for desktop distros too. I m on LinuxMint 21.3 Cinemon. Really appreciate u, thanks once again. TC.

  • @vordreller6428
    @vordreller6428 3 года назад +1

    Personally I'd advise against unattended upgrades. Don't want an upgrade to docker being installed on a live system, potentially restarting all containers. At the very least, specific packages should be put on hold when they're operation critical and cannot be restarted under normal circumstances.

  • @Max95Cohen
    @Max95Cohen 3 года назад

    Hi, Jay. What is the music on chapter changing?

  • @Bogomil76
    @Bogomil76 3 года назад +3

    18:05 Is „false“ right there? (Unattended-Upgrade::Remove-Unused_Dependencies)?

    • @d00dEEE
      @d00dEEE 3 года назад

      Hmm, good question! Does the setting above that (remove-NEW...) get rid of enough, or should they both be true? Seems to me they should both be true, but let's see what Jay says.

    • @sirsuse
      @sirsuse 3 года назад

      I have the same question. I decided to go ahead and change this to "true" because it makes sense, but I'm no expert.

    • @jkommisar
      @jkommisar 3 года назад

      So, but leaving the "False" Commented as before, It was true then...??.?.?.?

  • @ziggyspaz
    @ziggyspaz 3 года назад +1

    This video is geared towards linux distros that use `apt`

  • @guilherme5094
    @guilherme5094 3 года назад

    Thanks Jay.

  • @JeanPaulB
    @JeanPaulB Год назад

    Question: isn't the 'ignoreip' option in fail2ban irrelevant if we're using a public key to access the server?

  • @Bluelight82
    @Bluelight82 3 года назад

    Is this way of connecting to servers on by default if you install a Linux Mint server at home to connect to? I would prefer to only allow LAN connections.

  • @MorphicStates
    @MorphicStates 2 года назад

    supersecure as a password? I like it. ;-)

  • @n.aminr.7175
    @n.aminr.7175 11 месяцев назад

    Can I enable VPN on my router to my server? Is this possible?

  • @ryanbell85
    @ryanbell85 3 года назад

    Can you prevent your SSH passphrase from being cached?

  • @lsdowdle
    @lsdowdle 3 года назад

    On RHEL/clones and Fedora, try update-crypto-policies. Really nice tool. It allows for easy, global cyrpto settings changes that previously would have required knowledge of every service and their particular crypto config syntax.

  • @SkyFly19853
    @SkyFly19853 3 года назад

    Thanks for this tutorial!
    Btw, can these tweaks be used for Linux Desktop environment?

  • @kjakobsen
    @kjakobsen 3 года назад

    Just like your rant about using root as primary user. Please don't base 24hr service, on servers never having to reboot. HA means systems stadig up, even is services or servers needs downtime.

  • @mulletman1705
    @mulletman1705 3 года назад +1

    Rather pointless using a non root user with sudo privileges, root and non root sudo have the exact same privillage, it is completely pointless in terms of increasing security

    • @JeffreyHorn
      @JeffreyHorn 3 года назад

      I don’t believe this is true. Brute force attacks, both external and internal, target the root user. If I set my user to some arbitrary value, it is less likely to be discovered and battered.

    • @mulletman1705
      @mulletman1705 3 года назад

      @@JeffreyHorn for good security you should not be allowing people to brute force usernames and passwords to try gain access, security by obscurity is bad advice

    • @talktothehand1212
      @talktothehand1212 2 года назад

      @@mulletman1705 but this isn't security through obscurity? If more scrips target root than brute forcing, wouldn't disallowing root login just be security, since you're shutting out at least a plurality of threats?

    • @mulletman1705
      @mulletman1705 2 года назад

      @@talktothehand1212 no because your hoping by obscuring a username that the attacker will not be able to brute force access by guessing the username.

    • @talktothehand1212
      @talktothehand1212 2 года назад

      @@mulletman1705 like, I understand that a username and password shouldn't be treated as a line of defense, but I also don't see why using a non-root user is a bad practice. It's not going to make things more secure, but I don't see why you'd discourage the practice, especially on something you expect to be logging into at some point.

  • @olliefromsteam5219
    @olliefromsteam5219 2 года назад

    5 easy things - video is 40 min long