<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Five Easy Ways to Secure Your Linux System</title>
	<atom:link href="http://www.linux-mag.com/id/7732/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.linux-mag.com/id/7732/</link>
	<description>Open Source, Open Standards</description>
	<lastBuildDate>Sat, 05 Oct 2013 13:48:18 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.1</generator>
	<item>
		<title>By: voyance gratuite</title>
		<link>http://www.linux-mag.com/id/7732/#comment-1011353</link>
		<dc:creator>voyance gratuite</dc:creator>
		<pubDate>Mon, 24 Jun 2013 11:35:45 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7732/#comment-1011353</guid>
		<description>Truly when someone doesn&#039;t understand afterward its up to other users that they will help, so here it occurs.</description>
		<content:encoded><![CDATA[<p>Truly when someone doesn&#8217;t understand afterward its up to other users that they will help, so here it occurs.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Cameron</title>
		<link>http://www.linux-mag.com/id/7732/#comment-909019</link>
		<dc:creator>Cameron</dc:creator>
		<pubDate>Sat, 27 Apr 2013 09:17:21 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7732/#comment-909019</guid>
		<description>Appreciating the persistence you put into your site and detailed information you provide.

It&#039;s awesome to come across a blog every once in a while that isn&#039;t the same 
unwanted rehashed material. Excellent read! I&#039;ve bookmarked your site and I&#039;m including your RSS feeds to my 
Google account.</description>
		<content:encoded><![CDATA[<p>Appreciating the persistence you put into your site and detailed information you provide.</p>
<p>It&#8217;s awesome to come across a blog every once in a while that isn&#8217;t the same<br />
unwanted rehashed material. Excellent read! I&#8217;ve bookmarked your site and I&#8217;m including your RSS feeds to my<br />
Google account.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Black Friday Security System</title>
		<link>http://www.linux-mag.com/id/7732/#comment-37321</link>
		<dc:creator>Black Friday Security System</dc:creator>
		<pubDate>Sun, 13 Nov 2011 21:08:30 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7732/#comment-37321</guid>
		<description>Hi there, I found your blog by the use of Google even as looking for a comparable topic, your website came up, it appears great. I have bookmarked it in my google bookmarks.</description>
		<content:encoded><![CDATA[<p>Hi there, I found your blog by the use of Google even as looking for a comparable topic, your website came up, it appears great. I have bookmarked it in my google bookmarks.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: bouhg</title>
		<link>http://www.linux-mag.com/id/7732/#comment-27387</link>
		<dc:creator>bouhg</dc:creator>
		<pubDate>Tue, 08 Nov 2011 07:04:22 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7732/#comment-27387</guid>
		<description>Good riddance to Flash. &lt;a href=&quot;http://www.pelletmillguide.com/wood_chipper_and_crusher.html&quot; rel=&quot;nofollow&quot;&gt;wood chipper&lt;/a&gt; I am sick and tired to google web sites that tell, me how to install Flash Player on my Distribution X or Y.</description>
		<content:encoded><![CDATA[<p>Good riddance to Flash. <a href="http://www.pelletmillguide.com/wood_chipper_and_crusher.html" rel="nofollow">wood chipper</a> I am sick and tired to google web sites that tell, me how to install Flash Player on my Distribution X or Y.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: grdetil</title>
		<link>http://www.linux-mag.com/id/7732/#comment-8073</link>
		<dc:creator>grdetil</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7732/#comment-8073</guid>
		<description>&lt;p&gt;\&quot;On multiuser systems, you should restrict cron and at to root only.\&quot;  You don\&#039;t elaborate on the reason for this, as though the security risk in allowing non-root users access to cron or at is common knowledge.  This is news to me.  Could you provide more info or a relevant reference?
&lt;/p&gt;
</description>
		<content:encoded><![CDATA[<p>\&#8221;On multiuser systems, you should restrict cron and at to root only.\&#8221;  You don\&#8217;t elaborate on the reason for this, as though the security risk in allowing non-root users access to cron or at is common knowledge.  This is news to me.  Could you provide more info or a relevant reference?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: dragonwisard</title>
		<link>http://www.linux-mag.com/id/7732/#comment-8074</link>
		<dc:creator>dragonwisard</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7732/#comment-8074</guid>
		<description>&lt;p&gt;I think he\&#039;s going for the \&quot;disabled by default\&quot; approach. Although cron and at are relatively mundane to make such a fuss about. If a user even knows they exist, they probably meet the criteria for \&quot;based upon the user’s knowledge and responsibility levels.\&quot;&lt;/p&gt;
&lt;p&gt;If you allow long-running background process (screen) they can achieve the same results with some trivial shell coding.
&lt;/p&gt;
</description>
		<content:encoded><![CDATA[<p>I think he\&#8217;s going for the \&#8221;disabled by default\&#8221; approach. Although cron and at are relatively mundane to make such a fuss about. If a user even knows they exist, they probably meet the criteria for \&#8221;based upon the user’s knowledge and responsibility levels.\&#8221;</p>
<p>If you allow long-running background process (screen) they can achieve the same results with some trivial shell coding.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: sandholm</title>
		<link>http://www.linux-mag.com/id/7732/#comment-8075</link>
		<dc:creator>sandholm</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7732/#comment-8075</guid>
		<description>&lt;p&gt;I don\&#039;t agree with the root ssh lockout suggestion.  During a crisis situation you need to be able to get into a system as root very quickly.  Support can\&#039;t fumble around with su &amp; looking up passwords for the root account.  We manage a medium sized data center (approx 150 to 200 systems), and have exchanged root public keys from the bastion to all the remote systems.  To improve security and reduce risk, we use the /etc/security/access.conf file and limit root ssh login to just a couple of machines; only systems the support staff have access to (the bastion).  Our current monitoring scripts rely on remote root access, and by locking out root ssh, that would break all our monitoring.  It\&#039;s not perfect, but to manage a few hundred systems in batch, it\&#039;s necessary.
&lt;/p&gt;
</description>
		<content:encoded><![CDATA[<p>I don\&#8217;t agree with the root ssh lockout suggestion.  During a crisis situation you need to be able to get into a system as root very quickly.  Support can\&#8217;t fumble around with su &#38; looking up passwords for the root account.  We manage a medium sized data center (approx 150 to 200 systems), and have exchanged root public keys from the bastion to all the remote systems.  To improve security and reduce risk, we use the /etc/security/access.conf file and limit root ssh login to just a couple of machines; only systems the support staff have access to (the bastion).  Our current monitoring scripts rely on remote root access, and by locking out root ssh, that would break all our monitoring.  It\&#8217;s not perfect, but to manage a few hundred systems in batch, it\&#8217;s necessary.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: jpforte</title>
		<link>http://www.linux-mag.com/id/7732/#comment-8076</link>
		<dc:creator>jpforte</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7732/#comment-8076</guid>
		<description>&lt;p&gt;Ha Ha, three strike. I had a junior admin who tried that once. We just kept trying to login to his account until it locked for days. Then he decided that 99 was a better number. A DOS attack on a system could be done by just attempting logins a few times.
&lt;/p&gt;
</description>
		<content:encoded><![CDATA[<p>Ha Ha, three strike. I had a junior admin who tried that once. We just kept trying to login to his account until it locked for days. Then he decided that 99 was a better number. A DOS attack on a system could be done by just attempting logins a few times.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: khess</title>
		<link>http://www.linux-mag.com/id/7732/#comment-8077</link>
		<dc:creator>khess</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7732/#comment-8077</guid>
		<description>&lt;p&gt;If you work in a large environment, like I do (thousands of servers), account lockout after 6 tries and no root SSH is the norm. So is disabled CRON and AT for normal users.
&lt;/p&gt;
</description>
		<content:encoded><![CDATA[<p>If you work in a large environment, like I do (thousands of servers), account lockout after 6 tries and no root SSH is the norm. So is disabled CRON and AT for normal users.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: ffej01</title>
		<link>http://www.linux-mag.com/id/7732/#comment-8078</link>
		<dc:creator>ffej01</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7732/#comment-8078</guid>
		<description>&lt;p&gt;I left my ssh port open for just a few days, to see what traffic I would get...what a mistake !!!  84 pages of security log in violations recorded.  Most were from China, Brazil, and Hungary....Oh and a middle school in Japan.  It was amazing to see the user names that they tried. &lt;/p&gt;
&lt;p&gt;I use Denyhost since then, and think that my server is bored now.   hehehehe.
&lt;/p&gt;
</description>
		<content:encoded><![CDATA[<p>I left my ssh port open for just a few days, to see what traffic I would get&#8230;what a mistake !!!  84 pages of security log in violations recorded.  Most were from China, Brazil, and Hungary&#8230;.Oh and a middle school in Japan.  It was amazing to see the user names that they tried. </p>
<p>I use Denyhost since then, and think that my server is bored now.   hehehehe.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: jobst</title>
		<link>http://www.linux-mag.com/id/7732/#comment-8079</link>
		<dc:creator>jobst</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7732/#comment-8079</guid>
		<description>&lt;p&gt;Saying \&quot;don\&#039;t login as root\&quot; is silly and useless paranoid. It stems from the days when people sniffed the first packets of sessions so logging in as yourself and su-ing decreased the chance an attacker would see the root pw, and decreased the chance you got spoofed as to your telnet host target. You\&#039;d get your password spoofed but not root\&#039;s pw. Gimme a break .... this is 2010 - We have ssh 4.8, used properly it\&#039;s secure. Used improperly NONE of the OTHER security settings of the machine will make a damn bit of difference.&lt;br /&gt;
Use \&quot;Protocol 2\&quot;, \&quot;AllowUsers root blah1 blah2\&quot;, \&quot;ClientAliveInterval 300\&quot;, \&quot;IgnoreRhosts yes\&quot;, \&quot;HostbasedAuthentication no\&quot;, use TCPWRAPPERS, use Public Key Based Authentication ONLY, \&quot;PermitEmptyPasswords no\&quot;, limit access from a small range of IP addresses ONLY and a few more things and ssh is secure and you can enjoy simple access to other machines and do your job, simply.&lt;br /&gt;
I do not want to create another \&quot;windows X\&quot; environment where it is difficult to do things quickly ... using ssh properly I can even be ssh\&#039;ed into a machine, do a \&quot;yum update sshd\&quot;, then initiate a delayed \&quot;sshd restart\&quot;, logout, wait a bit and login again and run the latest ssh version on a machine that is 2000km away!
&lt;/p&gt;
</description>
		<content:encoded><![CDATA[<p>Saying \&#8221;don\&#8217;t login as root\&#8221; is silly and useless paranoid. It stems from the days when people sniffed the first packets of sessions so logging in as yourself and su-ing decreased the chance an attacker would see the root pw, and decreased the chance you got spoofed as to your telnet host target. You\&#8217;d get your password spoofed but not root\&#8217;s pw. Gimme a break &#8230;. this is 2010 &#8211; We have ssh 4.8, used properly it\&#8217;s secure. Used improperly NONE of the OTHER security settings of the machine will make a damn bit of difference.<br />
Use \&#8221;Protocol 2\&#8221;, \&#8221;AllowUsers root blah1 blah2\&#8221;, \&#8221;ClientAliveInterval 300\&#8221;, \&#8221;IgnoreRhosts yes\&#8221;, \&#8221;HostbasedAuthentication no\&#8221;, use TCPWRAPPERS, use Public Key Based Authentication ONLY, \&#8221;PermitEmptyPasswords no\&#8221;, limit access from a small range of IP addresses ONLY and a few more things and ssh is secure and you can enjoy simple access to other machines and do your job, simply.<br />
I do not want to create another \&#8221;windows X\&#8221; environment where it is difficult to do things quickly &#8230; using ssh properly I can even be ssh\&#8217;ed into a machine, do a \&#8221;yum update sshd\&#8221;, then initiate a delayed \&#8221;sshd restart\&#8221;, logout, wait a bit and login again and run the latest ssh version on a machine that is 2000km away!</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: wrdieter</title>
		<link>http://www.linux-mag.com/id/7732/#comment-8080</link>
		<dc:creator>wrdieter</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7732/#comment-8080</guid>
		<description>&lt;p&gt;On blocking out users after three bad login attempts, I have to agree with jpforte that it is a great way for someone to launch a denial of service attack.  DenyHosts is a better alternative because only the attacking IP is blocked.  There are definitely people out there probing.  At last count my /etc/hosts.deny had 883 hosts, all put there by DenyHosts.&lt;/p&gt;
&lt;p&gt;On root logins, I prefer to disallow root ssh logins if only for audit purposes when more than one person needs to have root privileges.  If someone logs in directly as root you have no idea who it was.  If someone logs in as a regular user then does su or sudo, you know who it was (or at least whose remote account has been compromised).  The audit is not always because you suspect someone of being malicious.  It can help recover from mistakes, too.
&lt;/p&gt;
</description>
		<content:encoded><![CDATA[<p>On blocking out users after three bad login attempts, I have to agree with jpforte that it is a great way for someone to launch a denial of service attack.  DenyHosts is a better alternative because only the attacking IP is blocked.  There are definitely people out there probing.  At last count my /etc/hosts.deny had 883 hosts, all put there by DenyHosts.</p>
<p>On root logins, I prefer to disallow root ssh logins if only for audit purposes when more than one person needs to have root privileges.  If someone logs in directly as root you have no idea who it was.  If someone logs in as a regular user then does su or sudo, you know who it was (or at least whose remote account has been compromised).  The audit is not always because you suspect someone of being malicious.  It can help recover from mistakes, too.</p>
]]></content:encoded>
	</item>
</channel>
</rss>