Linux server security best practices

The first step after you create a Linux® Cloud Server is to set the security
on it. You should perform this crucial step on every server to prevent bad actors
from obtaining unwanted access. This action results in a more secure environment that
helps prevent you and your business from being compromised. Performing these basic
steps and hardening the security on your server discourages bad actors
and makes them move on to a new target.

User management

By default, the root user is created as the first user on every Linux system.
You should disable it via Secure Shell (SSH). Disabling this root user via SSH
makes it harder for a bad actor to gain access to the system. Because the root user
is created by default on every Linux server, bad actors already have half the
information they need to log in to your server if the root user is enabled via
SSH. This situation allows for brute-force SSH attacks until the password hash breaks.

To avoid this situation, you should create a secondary user for when you need
to log in and administer the system. Each end user on the system should have
their own login credentials for logging purposes. Depending on the actions that
the end user needs to perform, they might need sudo permission to complete
administrative actions. This section provides examples about how to add a user with
sudo permission on both Debian® and Red Hat® Enterprise Linux-based systems.

Password strength guidelines

Before you create any users, ensure that you use strong passwords that require a
minimum character length (and maybe even include expiration dates). Here are common
guidelines advocated by proponents of software system security:

  • Use a minimum password length of 12 to 14 characters, if permitted.
  • Include lowercase and uppercase letters, numbers, and symbols,
    if permitted.
  • Generate passwords randomly, where feasible.
  • Avoid using the same password for multiple users, accounts, or software systems.
  • Avoid character repetition, keyboard patterns, dictionary words, letter or
    number sequences, user names, relative or pet names, romantic links (current
    or past), or personal information (for example, ID numbers, ancestors'
    names, or dates).
  • Avoid using information that is or might become publicly associated with the
    user or the account.
  • Avoid using information that the user's colleagues or acquaintances might
    know to be associated with the user.
  • Do not use passwords that consist of weak components.

Add a user (Debian and Ubuntu operating system)

For Debian and Ubuntu® operating systems, add a user by following these steps:

  1. Create a new user and set their password:

    useradd {username}
    passwd {username}

  2. Give the new user sudo permissions for privileged operations on the system.
    This user is the primary user for logging in remotely and making changes to the server.

    Use one of the following methods to implement sudo permissions for the user.

    a. Run the following command to add the user to the admin user group.

    usermod -aG admin {username}
    

    Alternatively, you can modify the sudoers file to give the user sudo permissions.

    a. Run the following command as root to edit the list of user permissions:

    visudo
    

    Note: On some distributions, systems use the vi text editor for
    visudo. Because vi is not a user-friendly editor, you might need to
    consult a vi tutorial for help.

    b. Add the following line directly after the line containing root ALL=(ALL:ALL) ALL:

    {username}     ALL=(ALL:ALL) ALL
    

    c. Save and quit.

  3. Switch to the new user and test their permissions by using sudo to run a
    command that requires root access, such as the following command:

    su {username}
    sudo systemctl status sshd
    

    A prompt asks you to enter the new user's password for verification before
    executing the command.

  4. You can also verify that your user can elevate to the root account by running the following
    command:

     sudo -i
    

If you perform these steps correctly, your user now has sudo access and can elevate permissions.
If not executed properly, you get a message indicating that the user is not in the sudoers file
when you attempt to authenticate.

Add a user (Red Hat and CentOS)

For Red Hat and CentOS® operating systems, add a user by following these steps:

  1. Create a new user with adduser and set the user’s password with passwd:

    useradd {username}
    passwd {username}
    
  2. Give the new user sudo permissions for privileged operations on the system.
    This user is the primary user for logging in remotely and making changes to the server.

    Use one of the following methods to implement sudo permissions for the user.

    a. Run the following command to add the user to the wheel group

    usermod -aG wheel {username}
    

    Alternatively, you can modify the sudoers file to give the user sudo permissions.

    a. Run the following command:

    visudo
    

    Note: On some distributions, the text editor that the system uses for
    visudo is vi. Because vi is not a user-friendly editor, you might need to
    consult a vi tutorial for help.

    b. Add the following line directly after the line containing
    root ALL=(ALL:ALL) ALL:

    {username}     ALL=(ALL)       ALL
    

    c. Save and quit.

  3. Switch to the new user and test their permissions by using sudo to run a
    command that requires root access:

    su {username}
    sudo systemctl status sshd
    

    A prompt asks you to enter the new user's password for verification before
    executing the command.

  4. You can also verify that your user can elevate to the root account by running the following
    command:

     sudo -i
    

If you performed these steps correctly, your user now has sudo access and can elevate permissions.
If not executed properly, you get a message indicating that the user is not in the sudoers file
when you attempt to authenticate.

Generate an SSH key pair

For a login method that is more secure than using a password, create an SSH key pair to
use with the user that you previously created. These instructions work with any Linux
distribution.

Note: These instructions are for Linux and macOS® desktops. If you are
connecting from a Windows® desktop, follow the instructions in
Generate RSA keys with SSH PUTTYgen
and
Log in with a SSH private key on Windows
to generate and add the SSH key pair.

  1. Run the following command to generate a key pair on your local Linux or
    Mac® computer:

    ssh-keygen -b 4096 -t rsa
    

    When asked where to save the key, use the default location. Adding a password is optional
    and is more secure, but can be inconvenient.

    This operation creates two files. The default names are id_rsa for your private
    key and id_rsa.pub for your public key.

  2. After you have created the key pair on your local computer, upload the
    public key to your remote server for the user that you created previously.

    Warning: Be sure to upload the public key, and not the private
    key.

    ssh-copy-id -i ~/.ssh/id_rsa.pub {username}@{remotePublicIPAddress}
    
  3. Connect to the remote server by using
    ssh {username}@{remotePublicIPAddress} and run the following command to
    verify that no extra keys were added that you do not expect:

    cat .ssh/authorized_keys
    

At this point, you have added ssh-key and password authentication for the user. The next
section goes over optional steps on how to disable password authentication.

Linux SSH daemon configuration

Now that you have a new user with sudo permissions and an SSH key
pair, you can work with the SSH daemon (server) configuration to improve security.

Note: For Managed Operations and RackConnect customers only: To ensure that our automated systems have access to your server when needed, we request that you do not change the SSH configuration and that you skip to the next section. When connecting to your server, the Rackspace Support team logs in as the user rack and uses password authentication on port 22. In addition, rebuilding existing servers or building a new server from a snapshot requires that you enable root logins by setting the PermitRootLogin option to yes. If you need to change these values, speak with a member of your Rackspace Support team so that the change is made in a way that does not impact our ability to provide you with a Fanatical Experience™.

The example commands for the rest of the article assume that you're are logged in as
your new user, using sudo to perform privileged operations.

SSH configuration options

This section covers common options in the SSH configuration file that help improve
security. This information is used to configure your firewall later.

This section outlines only a few options to change and describes what they do. For details
on other configuration options, see the
OpenSSH documentation.

This section focuses on the following options:

  • Port XX: This option is the port on which the SSH daemon listens (port 22 by
    default).
  • PermitRootLogin: This flag enables (yes) or disables (no) root login via
    SSH. By default, this line is commented and allows root login.
  • PubkeyAuthentication: This flag enables (yes) or disables (no) SSH keys
    for authentication. By default, this line is commented and allows ssh-key
    access.
  • PasswordAuthentication: This flag enables (yes) or disables (no) password
    authentication. By default, this option is enabled.

SSH uses port 22 by default for communication. Bad actors try port 22 with the
username root on every server that they attack. For this reason,
disabling the root user via SSH and changing SSH to listen on a nonstandard port
helps prevent a breach.

Changing the port won't stop a determined intruder, but it does cause most
superficial scans for SSH connection opportunities to overlook your server.
Similarly, removing SSH access for the root user interferes with casual
brute-force attacks via SSH.

You should also consider which authentication method to use when logging in.
By default, all Linux systems use password authentication. Multiple ways exists
to perform authentication on the server, but the main two are by using a password
and SSH keys.

SSH keys are generated in pairs, one public and the other private, and you can use them
only in combination with each other. You should store the private key in a safe
location on the computer from which you connect, and you should never give it out. You
can give out the public key, and it is the key that you place on the server to which you
are connecting. The private key on your local computer runs through an algorithm
when you make a connection, granting access if the key pair hash matches up with the
public key.

Modify sshd_config

By this point, you have added a new user with sudo permissions, created an SSH
key pair, and uploaded your public SSH key. You can now change your SSH configuration
file to improve your security. To do this, you can change SSH to listen on a
custom port, restrict root login via SSH, enable public key authentication,
and disable password authentication by using the following steps:

  1. Open the SSH daemon configuration file for editing:

    sudo vim /etc/ssh/sshd_config
    
  2. Change the following lines:

    Note: By default, the Port and PermitRootLogin lines are commented out
    as indicated by the # symbol. When commented out, these lines are read as default
    options, even if changes are made to the line. To implement these changes, you need
    to uncomment the associated lines by removing the # symbol at the beginning of the
    associated line. Additionally, before disabling PasswordAuthentication ensure that
    you have configured an SSH key or you cannot connect to the server.

    Change:

    #Port 22
    #PermitRootLogin yes
    PasswordAuthentication yes     
    

    To:

    Port 2222
    PermitRootLogin no
    PasswordAuthentication no
    

    Replace 2222 with the port you want to use. Ensure the new port isn't already in use by another
    program by using netstat.

    Important: As mentioned previously, you should not make this change to the
    sshd_config file if your server has a Managed Operations service level.
    These changes could deny Rackspace access to your server.

  3. Test the altered SSH configuration for errors by running the following command:

    sshd -t
    

If you receive no errors, SSH is now configured to run on a custom port and accept only non-root users that pass a valid SSH key. For these settings to apply and persist, you must restart the SSH service.
However, do not restart the service yet. Restarting SSH now might lock you out of the server, requiring you to use rescue mode or the web console to restore the configuration. You must configure the firewall before restarting the server. We discuss the firewall in the next section.

Amend software firewall and restart SSH

Note: RackConnect customers: To manage firewall rules, use the RackConnect management instead of iptables on the server. You shouldn't change the SSH port if you use RackConnect. For more information about firewalls and RackConnect, see
Managing RackConnect v2.0 network policies.

Each Linux distribution uses a different software firewall solution. In Red Hat Enterprise Linux (RHEL) and CentOS 7, the default firewall is firewalld. On Debian and Ubuntu-based distributions, the default firewall solution is Uncomplicated Firewall (UFW). For RHEL and CentOS 6, the default solution is iptables. Refer to the following section for your server's OS.

RHEL, CentOS 7, and firewalld
  1. Open the new SSH port by running the following commands:

    sudo firewall-cmd --permanent --remove-service=ssh
    sudo firewall-cmd --permanent --add-port=2222/tcp
    sudo firewall-cmd --reload
    

    Replace 2222 with the port that you used for the SSH daemon.

  2. Restart the sshd service by running the following command:

    sudo systemctl restart sshd
    
  3. Verify that the your custom SSH port opened on the server:

    netstat -plnt | grep ssh
    

If you followed these steps, you should see something similar to the following output:

    tcp        0      0 0.0.0.0:2222            0.0.0.0:*               LISTEN      1341/sshd           
    tcp6       0      0 :::2222                 :::*                    LISTEN      1341/sshd 
Ubuntu, Debian, and UFW
  1. Open the new SSH port by running the following commands:

    sudo ufw allow 2222
    

    Replace 2222 with the port that you used for the SSH daemon.

  2. Restart the sshd service by running the following command:

    sudo systemctl restart sshd
    
  3. Verify that your custom SSH port opened on the server by running the following command:

    netstat -plnt | grep ssh
    

If you followed these steps, you should see something similar to the following output:

    tcp        0      0 0.0.0.0:2222            0.0.0.0:*               LISTEN      1341/sshd           
    tcp6       0      0 :::2222                 :::*                    LISTEN      1341/sshd 
CentOS 6 and iptables

Note: RHEL and CentOS 6 will be marked End of Life in November 2020. For best security practices, we strongly advise that you consider a newer OS version to host your application or website.

  1. Open the new SSH port by running the following command:

    sudo iptables -I INPUT -m state --state NEW -m tcp -p tcp --dport 2222 -j ACCEPT
    sudo service iptables-save
    

    Replace 2222 with the port that you used for the SSH daemon.

  2. Run the following command to restart the SSH daemon so that the daemon
    applies the new configuration you set up:

    sudo service sshd restart
    
  3. Verify that your custom SSH port opened on the server by running the following command:

    netstat -plnt | grep ssh
    

If you followed these steps, you should see something similar to the following output:

    tcp        0      0 0.0.0.0:2222            0.0.0.0:*               LISTEN      1341/sshd           
    tcp6       0      0 :::2222                 :::*                    LISTEN      1341/sshd 

After you make the changes for your OS, open another terminal window on your local machine and log in to the server as the user that you created previously. Remember to specify the newly changed port. Keep your original connection active in case you need to troubleshoot the configuration.

To connect to SSH with the new configuration, you might need to specify the port number and key to use. For example:

    ssh -p 2222 -i ~/.ssh/id_rsa {username}@{remotePublicIPAddress}

The -p option specifies the port, and the -i option specifies the private key to use for the connection.

If you're connecting from a Windows desktop, when you create the connection in PuTTY, you can specify the port number and a private key.

Simple intrusion prevention

Most would-be intruders run multiple attacks against the same port to try to
find something that they can exploit in the software running on that port.
Fortunately, you can set up an intrusion prevention tool like
fail2ban on your server to
block repeated attacks on a port.

Note: Managed Operations servers have fail2Ban installed and configured
by default to watch over SSH login attempts. Contact your Support team if you
have any questions or concerns.

fail2ban monitors logs and automatically blocks connections if it sees too many
from the same host in a short period of time. To set up and configure fail2ban
on your server, use the following steps:

  1. To install fail2ban on your server, run one of the following commands.

    RHEL and CentOS:

    sudo yum install fail2ban
    

    Debian and Ubuntu:

    sudo apt-get install fail2ban
    
  2. Use the following command to copy your default fail2ban config. The newly created file overrides
    the default config and allows you to modify the file safely.

    sudo cp -pf /etc/fail2ban/jail.conf /etc/fail2ban/jail.local
    
  3. Modify your file to customize your security level in fail2ban.

    vim /etc/fail2ban/jail.local
    

    In this file, you can set the following options:

    • ignoreip: This parameter allows you to specify any IP address that should not be banned.
    • bantime: This parameter allows you to specify the number of seconds to ban an IP address.
    • findtime: This parameter checks for indications of maxretry triggers in the specified time.
    • maxretry: This parameter sets the number of retries allows before the IP address is banned.
  4. Create a jail file for SSH login attempts.

    vim /etc/fail2ban/jail.d/sshd.local
    
  5. In the file created, copy and paste the following text:

    [sshd]
    enabled = true
    port = ssh
    #action = firewallcmd-ipset
    logpath = %(sshd_log)s
    maxretry = 3
    bantime = 86400
    

    These options ban an IP address after three failed attempts to connect via SSH for 24 hours.
    If you know your local IP address, we strongly recommended that you add this IP address in
    the preceding section as an ignoreip parameter.

  6. Start and enable fail2ban on your server by using the following commands:

    RHEL and CentOS 7 or Debian and Ubuntu:

    sudo systemctl start fail2ban
    sudo systemctl enable fail2ban
    

    RHEL and CentOS 6:

    sudo service fail2ban start
    sudo chkconfig fail2ban on
    

Intrusion detection

An intrusion detection system (IDS) can help an administrator monitor systems
for suspicious activity and possible exploits. An IDS is more robust than a
prevention tool like fail2ban but can be more complicated to set up and
maintain.

A popular open-source IDS is OSSEC. OSSEC maintains
agents on multiple systems that report back to the main server, allowing
investigation of logs and alerts from a potentially compromised server even if
that server is shut down.

If you suspect that a system is already compromised, you can investigate with
procedures such as checking for backdoors and intruders
and rescue mode investigation.

Keep your OS up to date (patching)

Keeping your kernel, packages, and dependencies up-to-date is very important, especially for security-related modules and packages. Some updates, such as kernel updates, require you to reboot your server. You should schedule maintenances to take place during times that are least disruptive to users because these maintenances cause a short period of downtime.

Important: While keeping your system up to date is of vital importance, ensure that the updates you're applying do not negatively impact your production environment.

To check for and install updates on Ubuntu operating systems and Debian, run the following commands:

sudo apt-get update
sudo apt-get upgrade

To check for and install updates on CentOS, Red Hat, and Fedora systems, run the following command:

sudo yum update

Operating system end-of-life

Find out when the Linux distribution release that you are running on
your servers reaches its end-of-life (EOL). When a release reaches its EOL, the
distribution's maintainers no longer support it or supply package updates
through their official repositories. You should plan your migration to a newer
release well before your current release reaches its EOL.

Use the following links to find out when your Linux distribution release is
set to reach its EOL:

Account-level security

Although securing your servers is an essential part of operations on the Internet,
securing your account is also necessary. Your account name, password, and API
keys are essential parts of how you interact with the Rackspace Cloud
offerings. Just like any other password or access credentials, you want to keep
them secure. However, you also need to allow your team to take action and perform
necessary tasks.

By using
Role Based Access Control (RBAC),
you can create users and grant permissions to individuals or applications that
are responsible for using various Rackspace services. By leveraging RBAC, you
can give your team and contractors access to only the utilities that they need
and revoke the access if necessary.

Following are some usage scenarios:

  • Give contractors access to set up the environment that you have hired them
    to create, but limit their ability to view or change any credit card
    information or delete your account.
  • Allow your accountant to see the bill but not to delete your servers.
  • Hire a Database administrator (DBA) and give the DBA access to your DBaaS instances.
  • Allow a client to upload files directly to your Cloud Files account.
  • Configure your servers to register and use specific users for your
    monitoring and backup agents that are separate from your admin account.

For more information about RBAC, see the Role-Based Access Control (RBAC) FAQ.