How-To-Secure-A-Linux-Server
How-To-Secure-A-Linux-Server copied to clipboard
An evolving how-to guide for securing a Linux server.
Hi, Thank you for putting this guide together. Looking for some assistance with creating custom application profiles for UFW for the software I use on my Pi. I'm not sure...
Secure boot
You can sign GRUB or whatever bootloader you use and after that the UEFI will check the signature before loading it. The same way you can build a chain e.g....
In some systems this bug will occur: [sshd will not start at boot if ListenAddress is set](https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/216847). I ran into it myself following this guide. It is a failure of...
Once I learned the setup, I'm never going back. http://cipherdyne.org/fwknop/
Consider adding information about not just SELinux as noted in your TODOs, but MAC (Mandatory Access Control) and Linux Security Modules (LSMs) in general. The [Arch wiki](https://wiki.archlinux.org/index.php/security#Mandatory_access_control) seems like a...
Assigning a version to this evolving guide allows people to check more easily what changed since they last visited and whether they should align their systems. This doesn't need to...
Have you considered switching fail2ban with CrowdSec? More at https://www.crowdsec.net/blog/crowdsec-not-your-typical-fail2ban-clone
eg https://dba.stackexchange.com/questions/228282/allow-access-to-specific-user-only Thanks!
**This could be a nice extra info and is very important for CLOUDFLARE users. These are some firewall rules you should add when using CLOUDFLARE.** - GitHub: - Paul-Reed/cloudflare-ufw -...