My Go-To Guide for Linux System Hardening
This guide provides practical insights and best practices to harden Debian-based (Ubuntu) Linux systems against cyber threats, focusing on the core security goals of the CIA Triad:
Security Goal | Description |
---|---|
Confidentiality | Protecting data access to authorized users. |
Integrity | Ensuring data remains unchanged and uncorrupted. |
Availability | Maintaining reliable access to resources. |
System Maintenance
Apply security patches and updates regularly:
1
sudo apt update && sudo apt upgrade
Automatic Updates:
- Install
unattended-upgrades
:
1
sudo apt install unattended-upgrades
- Configure
/etc/apt/apt.conf.d/50unattended-upgrades
(e.g., enable automatic reboots by uncommenting//Unattended-Upgrade::Automatic-Reboot
).
1
sudo vim /etc/apt/apt.conf.d/50unattended-upgrades
- Enable the service:
1
sudo dpkg-reconfigure --priority=low unattended-upgrades
- Manual Updates (Cron):
Schedule updates using cron
(e.g., daily at 2:00 AM):
1
crontab -e
1
0 2 * * * apt update && apt upgrade -y
Caution: Schedule updates carefully to avoid disruption.
User Account Security
Strong Password Policy:
Edit /etc/pam.d/common-password
(e.g., using pam_pwquality.so
):
1
sudo vim /etc/pam.d/common-password
Example:
1
password requisite pam_pwquality.so retry=3 minlen=8 ucredit=-1 lcredit=-1 dcredit=-1 ocredit=-1
Enforce Regular Password Changes:
Edit /etc/login.defs
:
1
sudo vim /etc/login.defs
Example:
1
PASS_MAX_DAYS 90
Remove/Disable Unnecessary User Accounts:
List accounts:
1
cat /etc/passwd
Disable account (e.g., “user1”):
1
sudo passwd --lock user1
Multi-Factor Authentication (MFA) for Privileged Accounts:
- Install MFA software (e.g.,
Google Authenticator
). - Configure MFA (e.g.,
google-authenticator
).
Edit /etc/ssh/sshd_config
:
1
sudo vim /etc/ssh/sshd_config
Set ChallengeResponseAuthentication
to yes
.
Restart SSH:
1
sudo service sshd restart
Secure SSH Access
Limit Root Access:
Add non-root user to sudoers
using visudo
:
1
sudo visudo
Example:
1
dede ALL=(ALL:ALL) ALL
Use SSH Keys for Authentication:
Generate key pair (e.g., ED25519):
1
ssh-keygen -t ed25519 -C "contact@dede.dev"
Copy public key:
1
ssh-copy-id -i path/to/certificate username@remote_host
Disable password authentication:
1
vim /etc/ssh/sshd_config
1
PasswordAuthentication no
Restart SSH:
1
sudo service ssh restart
Disable Direct Root Login:
Edit /etc/ssh/sshd_config
:
1
sudo vim /etc/ssh/sshd_config
Set PermitRootLogin
to no
.
Restart SSH:
1
sudo service sshd restart
Restrict SSH Access by IP:
Edit /etc/ssh/sshd_config
.
Example:
1
AllowUsers your_username@trusted_ip
Restart SSH.
Use Strong Encryption Algorithms:
Edit /etc/ssh/sshd_config
.
Ensure Ciphers
and MACs
include strong algorithms (e.g., AES1, ChaCha20-Poly13052, Diffie-Hellman3, ECC4, SHA-25). Restart SSH.
Change Default SSH Port:
- Edit
/etc/ssh/sshd_config
.
1
sudo vim /etc/ssh/sshd_config
Change
Port
(e.g., to 2222).Restart SSH.
1
sudo service sshd restart
Remember: Allow the new port through the firewall.
Firewall Configuration (UFW)
Choose a Firewall Tool (e.g., iptables
, UFW
6).
1
2
sudo apt update
sudo apt install ufw
- Enable:
1
sudo ufw enable
- Default Policies:
1
2
sudo ufw default deny incoming
sudo ufw default allow outgoing
- Allow Specific Services/Ports (e.g., SSH):
1
sudo ufw allow ssh
- Review/Update Rules (UFW):
1
sudo ufw status numbered
- Modify/delete:
1
2
sudo ufw delete [rule_number]
sudo ufw insert [rule_number] [new_rule]
- Reload:
1
sudo ufw reload
File System Hardening
File System Encryption (e.g., dm-crypt
, LUKS
):
Install cryptsetup
:
1
sudo apt-get install cryptsetup
Encrypt partition (e.g., /dev/sdb1
):
1
sudo cryptsetup luksFormat /dev/sdb1
Open encrypted partition (e.g., secure_data
):
1
sudo cryptsetup open /dev/sdb1 secure_data
Format (e.g., ext4
) and mount (e.g., /mnt/secure
):
1
2
sudo mkfs.ext4 /dev/mapper/secure_data
sudo mount /dev/mapper/secure_data /mnt/secure
Update /etc/fstab
for automatic mounting.
File Permissions/Access Restriction:
Identify sensitive files. Set permissions (e.g., database.conf
):
1
sudo chmod 600 /path/to/database.conf
File Integrity Monitoring (e.g., AIDE
, Tripwire
):
Install AIDE
:
1
sudo apt-get install aide -y
Initialize database:
1
sudo aideinit
Schedule checks (e.g., daily at midnight):
1
sudo crontab -e
Add to crontab:
1
0 0 * * * /usr/sbin/aide --check
Network Services
List enabled services:
1
sudo systemctl list-unit-files --type=service | grep enabled
Disable Unnecessary Services (e.g., avahi-daemon
, cups
):
1
2
sudo systemctl disable avahi-daemon.service
sudo systemctl disable cups.service
Caution: Verify service necessity before disabling.
Update/Patch Software:
1
2
sudo apt update
sudo apt upgrade
Use Secure Protocols:
Use HTTPS
for web management, SFTP
for file transfer, SSH
instead of Telnet
.
Logging and Auditing
Enable System Logging (rsyslog
):
Check status:
1
sudo systemctl status rsyslog
Start:
1
sudo systemctl start rsyslog
Enable on boot:
1
sudo systemctl enable rsyslog
Secure Log Files:
1
2
sudo chown root:root /var/log
sudo chmod 0700 /var/log
Review Logs:
View recent entries (/var/log/syslog
):
1
sudo tail -f /var/log/syslog
Search for patterns (e.g., /var/log/auth.log
):
1
sudo cat /var/log/auth.log | grep 'Failed password'
Automate reviews (logcheck
):
1
sudo apt-get install logcheck
Centralized Log Management: Logstash: Install:
1
2
3
wget -qO - [https://artifacts.elastic.co/GPG-KEY-elasticsearch](https://artifacts.elastic.co/GPG-KEY-elasticsearch) | sudo apt-key add -
echo "deb [https://artifacts.elastic.co/packages/7.x/apt](https://artifacts.elastic.co/packages/7.x/apt) stable main" | sudo tee -a /etc/apt/sources.list.d/elastic-7.x.list
sudo apt-get update && sudo apt-get install logstash
Configure (e.g., /etc/logstash/conf.d/01-netflow-input.conf
, 10-syslog-filter.conf
, 30-elasticsearch-output.conf
). Start:
1
sudo systemctl start logstash
Enable on boot:
1
sudo systemctl enable logstash
Graylog:
Install MongoDB:
1
2
sudo apt update
sudo apt install -y mongodb
Install Elasticsearch:
1
2
3
4
5
6
7
wget -qO - [https://artifacts.elastic.co/GPG-KEY-elasticsearch](https://artifacts.elastic.co/GPG-KEY-elasticsearch) | sudo apt-key add -
echo "deb [https://artifacts.elastic.co/packages/7.x/apt](https://artifacts.elastic.co/packages/7.x/apt) stable main" | sudo tee -a /etc/apt/sources.list.d/elastic-7.x.list
sudo apt update
sudo apt install -y elasticsearch
sudo systemctl daemon-reload
sudo systemctl enable elasticsearch.service
sudo systemctl restart elasticsearch.service
Install Graylog:
1
2
3
4
wget [https://packages.graylog2.org/repo/packages/graylog-4.0-repository_latest.deb](https://packages.graylog2.org/repo/packages/graylog-4.0-repository_latest.deb)
sudo dpkg -i graylog-4.0-repository_latest.deb
sudo apt-get update
sudo apt-get install graylog-server
Configure (/etc/graylog/server/server.conf
):
Set password_secret
(e.g., using pwgen -N 1 -s 96
).
- Set
root_password_sha2
(e.g., usingecho -n "Enter Your Password: " | sha256sum
).
Start:
1
2
3
sudo systemctl daemon-reload
sudo systemctl enable graylog-server.service
sudo systemctl start graylog-server.service
Access web interface: http://your_server_ip:9000
Backup Strategy: Rclone & Google Drive
The transition from on-premises to cloud-based backup solutions is driven by scalability, flexibility, cost-effectiveness, and global accessibility.
Rclone is a command-line tool designed to manage files on cloud storage, it offers encryption, which makes it particularly well-suited for backups. It supports a wide range of cloud services, including Google Drive.
Google Drive is known for its flexibility, portability, and reliability.
Installation and Configuration
Install Rclone:
1 2
sudo apt update sudo apt install rclone
Configure Rclone for Google Drive:
- Run
rclone config
and follow the prompts. - Choose
"n) New remote"
and give it a name (e.g., “gdriveBackup”). - Select
Google Drive
as the storage type. - When prompted for “client_id” and “client_secret,” you can leave them blank for automatic configuration.
Rclone
will open a browser window for authentication. On headless systems, please follow the prompt. - Grant
Rclone
access to your Google Drive. - Confirm the configuration.
- Run
What to Backup
- Identify critical data:
/etc/
,/home/
, databases, application data, etc… - Consider using a combination of full and incremental backups.
- Encryption:
- Rclone supports server-side and client-side encryption.
Client-side encryption is highly recommended for Google Drive backups.
- When configuring your backup script, use the
--crypt-server-side
flag to encrypt the data before it leaves the system. Example of creating an encrypted remote:
1
rclone config create gdrive_encrypted crypt remote=gdrive_backup password=YOURPASSWORD password2=YOURSALTPASSWORD
- Be sure to store your passwords in a secure location.
- Compression:
- Compress your data before uploading it to Google Drive to save space and reduce upload time.
- Use
tar
orgzip
for compression.
- Automation:
- Create a Backup Script:
- Write a shell script that performs the following:
- Compresses the data.
- Encrypts the compressed data.
- Uses rclone to upload the encrypted data to Google Drive.
- Deletes old backups (recommended).
- Example script
- Write a shell script that performs the following:
- Schedule Backups with Cron:
- Run
crontab -e
and add a line like this to run the script weekly at 2:00 AM on Sundays.
1 2
# Weekly @ 2:00 AM on Sundays: 0 2 * * 0 /path/to/backup_script.sh
- Run
Security Considerations
- Rclone Configuration: Store your Rclone configuration file (
~/.config/rclone/rclone.conf
) securely. Restrict access to the backup script and Rclone configuration. - Encryption Keys: Protect your encryption keys and passwords, consider using a password manager.
- Google Account Security: Enable two-factor authentication (2FA) on your Google account, use a strong, unique password for your Google account.
Logging & Monitoring
It’s crucial to log backup activity, and systemd
is very efficient for monitoring backup services. It is equally important to test restores to verify integrity and functionality of backups.
Reverse Proxy with Traefik
Setting up a reverse proxy with Traefik for Linux hardening can significantly enhance your server’s security by adding layers of protection and control.
2. Installation and Configuration
- Install Docker and Docker Compose (Recommended): Traefik is typically run as a Docker container, so you’ll need Docker installed on your Linux server.
- Example for Ubuntu/Debian:
1 2
sudo apt update sudo apt install docker.io docker-compose
- Example for Ubuntu/Debian:
- Create a
traefik.yml
Configuration File:- This file defines the Traefik configuration.
Example:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21
version: "3.9" services: traefik: image: "traefik:v2.10" command: - "--api.insecure=true" - "--providers.docker=true" - "--providers.docker.exposedbydefault=false" - "--entrypoints.web.address=:80" - "--entrypoints.websecure.address=:443" - "--certificatesresolvers.myresolver.acme.tlschallenge=true" - "--certificatesresolvers.myresolver.acme.email=your_email@example.com" - "--certificatesresolvers.myresolver.acme.storage=/letsencrypt/acme.json" ports: - "80:80" - "443:443" - "8080:8080" # Traefik dashboard (insecure, for testing) volumes: - "./letsencrypt:/letsencrypt" - "/var/run/docker.sock:/var/run/docker.sock:ro"
- Explanation:
--api.insecure=true
: Enables the Traefik dashboard (for testing). Disable this in production!--providers.docker=true
: Enables Docker provider.--providers.docker.exposedbydefault=false
: Prevents all Docker containers from being exposed by default.--entrypoints.web.address=:80
and--entrypoints.websecure.address=:443
: Defines the HTTP and HTTPS entry points.--certificatesresolvers.myresolver.acme.tlschallenge=true
: Enables ACME TLS challenge for Let’s Encrypt.--certificatesresolvers.myresolver.acme.email=your_email@example.com
: Your email address for Let’s Encrypt.--certificatesresolvers.myresolver.acme.storage=/letsencrypt/acme.json
: Location to store Let’s Encrypt certificates.volumes
: Mounts the Let’s Encrypt storage and the Docker socket.
- Start Traefik:
- Navigate to the directory containing your
traefik.yml
file. - Run:
docker-compose up -d
- Navigate to the directory containing your
3. Configuring Backend Services
- Add Traefik Labels to Your Docker Services:
- For each service you want to expose through Traefik, add labels to its Docker Compose configuration.
Example:
1 2 3 4 5 6 7 8 9 10
version: "3.9" services: your_service: image: "your_service_image" labels: - "traefik.enable=true" - "traefik.http.routers.your_service.rule=Host(`your_domain.com`)" - "traefik.http.routers.your_service.entrypoints=websecure" - "traefik.http.routers.your_service.tls.certresolver=myresolver"
- Explanation:
traefik.enable=true
: Enables Traefik for this service.traefik.http.routers.your_service.rule=Host(\
your_domain.com`)`: Defines the domain name for the service.traefik.http.routers.your_service.entrypoints=websecure
: Uses the HTTPS entry point.traefik.http.routers.your_service.tls.certresolver=myresolver
: Uses the Let’s Encrypt certificate resolver.
4. Implementing Security Middleware
- Add Security Headers:
Example labels:
1 2 3 4 5 6 7 8
labels: - "traefik.http.middlewares.securityHeaders.headers.customresponseheaders.X-Robots-Tag=noindex,nofollow,nosnippet,noarchive,notranslate,noimageindex" - "traefik.http.middlewares.securityHeaders.headers.customresponseheaders.X-Frame-Options=DENY" - "traefik.http.middlewares.securityHeaders.headers.customresponseheaders.X-Content-Type-Options=nosniff" - "traefik.http.middlewares.securityHeaders.headers.customresponseheaders.Referrer-Policy=same-origin" - "traefik.http.middlewares.securityHeaders.headers.customresponseheaders.Permissions-Policy=geolocation=(), microphone=(), camera=()" - "traefik.http.middlewares.securityHeaders.headers.customresponseheaders.Strict-Transport-Security=max-age=31536000;includeSubDomains" - "traefik.http.routers.your_service.middlewares=securityHeaders"
- Rate Limiting:
Example labels:
1 2 3 4
labels: - "traefik.http.middlewares.rateLimit.rateLimit.average=100" - "traefik.http.middlewares.rateLimit.rateLimit.burst=200" - "traefik.http.routers.your_service.middlewares=securityHeaders,rateLimit"
- Authentication:
- Traefik supports various authentication methods (e.g., BasicAuth, ForwardAuth).
- Refer to the Traefik documentation for details.
5. Hardening Traefik
- Disable Insecure API: Remove
--api.insecure=true
from your Traefik configuration in production. - Use Secure Dashboard: Configure a secure dashboard with authentication.
- Restrict Access to Docker Socket: Limit access to the Docker socket.
- Keep Traefik Updated: Regularly update Traefik to the latest version.
Important Notes:
- Replace placeholders (e.g.,
your_email@example.com
,your_domain.com
,your_service_image
) with your actual values. - Refer to the Traefik documentation for detailed information on configuration options and middleware.
- Test your configuration thoroughly before deploying it to production.
- Consider using a dedicated security scanner to identify potential vulnerabilities.
Conclusion
Securing a Linux system is an ongoing process that requires vigilance and adaptation. This guide outlined essential hardening techniques, from basic system updates to some advanced security measures. These practices can significantly reduce attack surface and protect sensitive data.
Remember that staying informed about the latest security threats and regularly reviewing security posture are crucial for maintaining a robust defense. As technology evolves and new vulnerabilities emerge, continuous learning and adaptation are key to ensuring the long-term security of your Linux environment.
Resources
- Limit SSH access to specific clients by IP address
- How To Secure A Linux Server by imthenachoman
- 40 Linux Server Hardening Security Tips [2023 edition]
- Linux Security and Hardening, The Practical Security Guide by Jason Cannon
- The Future of Cloud Backup: a Multi-Cloud Perspective
- Gemini AI
Reverse Footnote
AES (Advanced Encryption Standard): AES is a widely used symmetric encryption algorithm that provides strong security. It supports key sizes of 128, 192, and 256 bits. ↩︎
ChaCha20-Poly1305: This is a modern symmetric encryption algorithm that offers high security and performance. It is often considered as an alternative to AES. ↩︎
Diffie-Hellman (DH) Key Exchange: DH is a secure key exchange algorithm used to establish a shared secret key between the client and server. It ensures secure communication by allowing the parties to generate a shared secret without transmitting it over the network. ↩︎
Elliptic Curve Cryptography (ECC): ECC is a modern public-key cryptography algorithm that offers strong security with relatively shorter key lengths compared to traditional algorithms like RSA. It is widely used in SSH for key exchange and authentication. ↩︎
SHA-2 (Secure Hash Algorithm 2): SHA-2 family of hash functions, such as SHA-256 and SHA-512, are widely used for generating message digests and providing integrity in SSH connections. ↩︎
UFW:
UFW
stands for Uncomplicated Firewall. It is a user-friendly command-line tool for managing firewall rules on Linux systems. ↩︎