Re: attempts to hack in?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Allegedly, on or about 04 July 2017, William Mattison sent:
> Yesterday evening, I used the firewall configuration tool to turn off ssh in the public zone, and then make the the change permanent.  I also entered the commands
> * systemctl stop sshd

Stopped it now.

> * systemctl mask sshd

Should stop it from being restarted ever again.

> * systemctl stop httpd
> * systemctl mask httpd

Likewise.

> This evening, I see nothing in the journalctl logs for today that look
> like attempts to hack in.  Definitely good news!  Thank-you, everyone.

I'd expect that too.  If the server isn't running, there's nothing to
poke at, and there won't be any logs from the server (proving the
point).

> Follow-up questions:
> 1. I recall over the years several ways of connecting among computers:
> kermit (am I dating myself here?!), ftp, rlogin, telnet, ssh, sftp,
> and others.  Are ***all*** these now blocked incoming?

I was under the impression that all of those protocols were blocked by
default, though someone (I can't remember who, now) pointed out that SSH
was allowed by default.  If you look at your firewall configurator, it
ought to list what's allowed/disallowed.  Or, you can look at iptable
rules on the command line.

On a home system, one that you say you're not going to access remotely,
or within a LAN, there's no point having any of those running, nor
allowed.

> 2. I'm trying to get a fedora.people account.  I'll be need to ssh and
> (s?)ftp(s?) out from my workstation into theirs.  Will I still be able
> to do that?

Outgoing connections from clients don't depend on you running a server
on your machine, they connect to the server on their machine.  And, by
default, all traffic is allowed to go out through your firewall.

> 3. It was suggested that I block ssh login to root and ssh login via
> password.  Am I correct in assuming that I no longer need to do those
> things?  If no, how do I do those things?

If you don't have the service running, nobody can connect.  I don't
configure services that I don't run.  Though, if you ever intend to turn
the service on, you should look into doing that.

I agree with the block root SSH access by default, as a way that you
should configure it (if you're using it).  And that's a fairly painless
thing to do, just set one option in the config file.  But going
passwordless means that you need to set up keyfiles on the server,
manage keyfiles on flashdrives or some other way (for your computers
doing remote access).  And I would challenge anybody to ever be able to
crack a passphrase like finkelbluetoadgrumpypelicans.  You have no clues
to point to a nonsense phrase, no clues that you've almost guessed it,
and the number of permutations of just throwing every word in the
dictionary trying to brute force it would have to be astronomical.  On
the other hand, if you're stupid enough to actually use "password," then
you deserve to get hacked.

I'm not convinced that SSH needs to be passwordless (if you're running
it).  However, if you were to use the same password for a login as you
would to fetch mail or do other things (and that's the default way Linux
works, one password for almost everything you do), then you'd want to:

(a) Make sure that all login attempts are strongly encrypted (mail was
always plain text, but is moving towards encrypted logins), else
somewhere you'd have a service login that exposed your password,
allowing snoopers to grab your password all-too-easily.

(b) Make sure that anything that couldn't use encryption used a
different password than everything else (not so easy to implement for
some services).

-- 
[tim@localhost ~]$ uname -rsvp
Linux 3.9.10-100.fc17.x86_64 #1 SMP Sun Jul 14 01:31:27 UTC 2013 x86_64 
(always current details of the computer that I'm writing this email on)

Boilerplate:  All mail to my mailbox is automatically deleted, there is
no point trying to privately email me, I only get to see the messages
posted to the mailing list.

Windows (TM) [Typhoid Mary]. They refuse to believe that there's
anything wrong with it, but everyone else knows Windows is a disease
that spreads.


_______________________________________________
users mailing list -- users@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to users-leave@xxxxxxxxxxxxxxxxxxxxxxx



[Index of Archives]     [Older Fedora Users]     [Fedora Announce]     [Fedora Package Announce]     [EPEL Announce]     [EPEL Devel]     [Fedora Magazine]     [Fedora Summer Coding]     [Fedora Laptop]     [Fedora Cloud]     [Fedora Advisory Board]     [Fedora Education]     [Fedora Security]     [Fedora Scitech]     [Fedora Robotics]     [Fedora Infrastructure]     [Fedora Websites]     [Anaconda Devel]     [Fedora Devel Java]     [Fedora Desktop]     [Fedora Fonts]     [Fedora Marketing]     [Fedora Management Tools]     [Fedora Mentors]     [Fedora Package Review]     [Fedora R Devel]     [Fedora PHP Devel]     [Kickstart]     [Fedora Music]     [Fedora Packaging]     [Fedora SELinux]     [Fedora Legal]     [Fedora Kernel]     [Fedora OCaml]     [Coolkey]     [Virtualization Tools]     [ET Management Tools]     [Yum Users]     [Yosemite News]     [Gnome Users]     [KDE Users]     [Fedora Art]     [Fedora Docs]     [Fedora Sparc]     [Libvirt Users]     [Fedora ARM]

  Powered by Linux