Background: 15 years of experience in software and apparently spoiled because it was already set up correctly.

Been practicing doing my own servers, published a test site and 24 hours later, root was compromised.

Rolled back to the backup before I made it public and now I have a security checklist.

  • Xanza@lemm.ee
    link
    fedilink
    English
    arrow-up
    10
    ·
    4 hours ago

    You can’t really disable the root user. You can make it so they can’t login remotely, which is highly suggested.

      • Xanza@lemm.ee
        link
        fedilink
        English
        arrow-up
        1
        ·
        40 minutes ago

        There’s no real advantage to disable the root user, and I really don’t recommend it. You can disable SSH root login, and as long as you ensure root has a secure password that’s different than your own account your system is just as safe with the added advantage of having the root account incase something happens.

    • MehBlah@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      4 hours ago

      Another thing you can do under certain circumstances which I’m sure someone on here will point out is depreciated is use TCP Wrappers. If you are only connecting to ssh from known IP addresses or IP address ranges then you can effectively block the rest of the world from accessing you. I used a combination of ipset list, fail2ban and tcp wrappers along with my firewall which like is also something old called iptables-persistent. I’ve also moved my ssh port up high and created several other fake ports that keep anyone port scanning my IP guessing.

      These days I have all ports closed except for my wireguard port and access all of my hosted services through it.