Firewall
A properly configured firewall is essential as it controls traffic and prevents unauthorized access to your system. By default, most systems are configured to accept all incoming traffic, which poses some security risks. The best practice is to deny all incoming traffic by default and only allow specific traffic that you explicitly trust and need for your services.
In this guide, we’ll be using UFW (Uncomplicated Firewall) to configure the firewall, but you are free to use any other firewall application of your choice, such as iptables or firewalld, depending on your system and preferences.
Installing UFW
To get started with UFW, first, you need to install it. You can do so with the following command:
apt install ufw
This command will install UFW
and its necessary dependencies on your server.
Important: Check with your distribution’s package manager for the appropriate installation command.
Allowing Essential Services
Once UFW is installed, you need to define which types of network traffic are allowed to pass through your firewall. For a basic web server setup, you’ll likely want to allow SSH (for remote access) as well as HTTP and HTTPS (for web traffic).
To allow SSH, HTTP, and HTTPS traffic, run the following commands:
ufw limit 22/tcp # This command allows SSH connections but limits the number of login attempts to help prevent brute-force attacks (default port: 22).
ufw allow 80/tcp # This opens the HTTP port (port 80) for web traffic.
ufw allow 443/tcp # This opens the HTTPS port (port 443) for encrypted web traffic.
You can adjust the service ports if you’re using custom ports or other services. For example, if you’re running a web application on a non-standard port, you can use ufw allow <port_number>/tcp.
Setting Default Policies
Once you’ve allowed the necessary services, it’s time to set the default policies for incoming and outgoing connections.
ufw default deny incoming # This ensures that any traffic not explicitly allowed will be blocked.
ufw default allow outgoing #
These default settings mean that only the services you have explicitly allowed (such as SSH, HTTP, and HTTPS) will be accessible, while everything else is blocked, helping to reduce your attack surface.
Enabling UFW
Once you have configured your firewall rules, it’s time to enable UFW.
This will activate the firewall with the rules you’ve set up:
ufw enable
After enabling UFW, the firewall will start filtering traffic based on your rules. The ufw status command can be used to check the current status and see a list of active rules:
ufw status
This will display whether UFW is active and show the current set of allowed and denied services.
Secure SSH
SSH is commonly used for remote access, making it crucial to secure it with strong passwords, key-based authentication, and by disabling root login to prevent brute force or unauthorized logins. While SSH already provides strong encryption, there are additional best practices you can implement to further harden it and make unauthorized access even more difficult.
Use SSH Key Authentication
Before editing the SSH configuration, it’s essential to set up SSH key authentication. SSH keys are more secure than passwords and provide a more convenient way to log in to your server.
Generating SSH Keys
To generate an SSH key pair, run the following command on your local machine:
ssh-keygen -t ed25519 -C "your-email@example.com"
This command generates a new SSH key pair using the Ed25519 algorithm. You can also use the RSA algorithm by replacing -t ed25519
with -t rsa
. The -C
flag is optional and allows you to add a comment to the key. ED25519
keys are more secure and faster than RSA
keys and are recommended for most use cases.
After running this command, you will be prompted to enter a file in which to save the key. Press Enter to save the key in the default location (~/.ssh/id_ed25519
), or specify a different location if needed.
You can also set a passphrase for additional security. The passphrase is optional but highly recommended for an extra layer of protection.
Copying the Public Key to the Server
After generating the SSH key pair, you need to copy the public key to your server. You can do this using the ssh-copy-id
command:
ssh-copy-id user@hostname
Replace user
with your username (registered on the server) and hostname
with your server’s IP address or domain name. This command will copy your public key to the server and add it to the ~/.ssh/authorized_keys
file.
Logging in with SSH Keys
After copying the public key to the server, you can log in using SSH keys:
ssh user@hostname
This command will log you in to the server using the SSH key pair you generated. If you set a passphrase, you will be prompted to enter it.
If you have a custom SSH key location, you can specify it using the -i
flag:
ssh -i ~/.ssh/custom_key user@hostname
Editing SSH Configuration
Securing SSH starts with modifying the SSH server’s configuration file. This file is typically located at /etc/ssh/sshd_config
.
Disable Challenge-Response Authentication
Challenge-response authentication can be used in 2FA setups but often just asks for a password, which doesn’t add much security. This setting is used by some 2FA methods, however, many 2FA methods do not require it. Unless you are using a 2FA method that specifically requires ChallengeResponseAuthentication
, disabling it can streamline the login process.
# Disable unless required by your 2FA method
ChallengeResponseAuthentication no
If you are using 2FA, consult the documentation for your specific 2FA method to determine whether ChallengeResponseAuthentication
needs to be enabled.
Enable PAM
PAM (Pluggable Authentication Modules) is a framework that allows the integration of various authentication methods beyond just passwords, such as account lockouts, password strength policies, and multi-factor authentication (2FA). UsePAM
should be enabled to allow your system to support these advanced security mechanisms.
# Enable PAM for advanced authentication features
UsePAM yes
Disable Password Authentication
Disabling password authentication entirely is one of the most important settings you can take. Brute-force attacks rely on guessing passwords. By disabling password authentication, you eliminate this attack vector entirely. SSH keys are significantly more secure and are the recommended way to access SSH servers.
# Disable password authentication; use SSH keys
PasswordAuthentication no
Disable Root Login
Allowing root login via SSH is a major security risk. This is another essential setting, disabling direct root login forces attackers to first compromise a regular user account. Even if they manage to do that, they still need to escalate privileges.
# Disable root login via SSH
PermitRootLogin no
This setting also allows for better auditing of administrative actions, as you can track which user performed sudo
commands.
Optional Settings for Additional Protection
While these options may seem useless, they can potentially limit the attack vectors.
Limit SSH to IPv6
While IPv4 is more widely used, restricting SSH to IPv6 can limit potential attack vectors and reduce some automated attacks (bots scanning for open SSH servers on IPv4), though it’s not a strict security measure and may cause issues on networks that don’t support IPv6.
# Generally NOT recommended; can cause connectivity issues
AddressFamily inet6
Generally, do not restrict SSH to IPv6. The usability problems outweigh the minimal security benefit and attackers who are determined can still scan for IPv6 addresses. It’s security by obscurity, which is generally not recommended. Focus on stronger authentication and authorization methods instead.
Change the Default Port
By default, SSH listens on port 22, which is well-known and often targeted by attackers. Changing the port to something non-standard can reduce the likelihood of automated attacks, though it is not a foolproof security measure. Choose a port number between 1024 and 65535 that isn’t already in use.
# Change SSH port (optional, but can deter some automated attacks)
Port <your_custom_port>
This setting can provide a tiny bit of extra security but should not be relied upon as a primary defense. Focus on stronger authentication and authorization methods instead.
Apply Changes and Restart SSH
After making the necessary changes, save and exit the file. To apply the changes, restart the SSH service:
systemctl restart sshd
Fail2Ban
Fail2Ban is a tool that scans log files and bans IPs that show malicious activity. It is often used to prevent brute-force attacks on services like SSH.
Installation
To get started with Fail2Ban, first, you need to install it. You can do so with the following command:
apt install fail2ban
This command will install fail2ban
and its necessary dependencies on your server.
Important: Check with your distribution’s package manager for the appropriate installation command.
Configuring Fail2Ban
After installation, you can create or edit the local configuration file to customize your settings. The default configuration is good for most users, but you can fine-tune it based on your needs.
$ cat /etc/fail2ban/jail.d/sshd.local
[DEFAULT]
bantime = 3600 # Duration of the ban in seconds
bantime.increment = true # Increment the ban time for each new ban
findtime = 600 # Time window for failed login attempts
maxretry = 5 # Number of failed login attempts before a ban is initiated
[sshd]
enabled = true # Enable Fail2Ban for SSH
port = 22 # If you changed the default SSH port, update it here
logpath = %(sshd_log)s # Fail2Ban variable for the SSH log path
backend = %(sshd_backend)s # Fail2Ban variable for the SSH backend
ignoreip = 127.0.0.1/8 your_ip_address another_ip # Add your IP to the ignore list
banaction = ufw # Optional: Use ufw if installed and configured. Otherwise, iptables is used.
Make sure the logpath
for sshd is correct and the file exists as it can result in failure while loading Fail2Ban.
Enable Fail2Ban
To enable Fail2Ban run the following command:
systemctl enable --now fail2ban.service
Fail2Ban will now monitor the SSH log file for failed login attempts and automatically block IP addresses that exceed the configured maxretry
limit. The bantime
, findtime
, and maxretry
settings can be adjusted in the `` section of a .local jail file.
Auto updates
Keeping your system up-to-date with the latest security patches is vital to protect against known vulnerabilities. unattended-upgrades
can automate this process, but it’s important to understand the trade-offs. While automatic updates are highly recommended for security, they can occasionally cause unexpected issues (configuration conflicts, dependency problems), especially on servers. Therefore, many administrators prefer a more controlled approach.
Unattended upgrades are usually most important for security updates. It’s often acceptable to handle other types of updates (like feature updates or package upgrades) manually.
installing unattended-upgrades
Start by installing the unattended-upgrades
package using the following command:
apt install unattended-upgrades
This command will install unattended-upgrades
and its necessary dependencies on your server.
Important: Check with your distribution’s package manager for the appropriate installation command.
configuring unattended-upgrades
After installing the package, you’ll need to configure it. The dpkg-reconfigure
command allows you to easily adjust the settings for unattended upgrades, including setting the priority level.
To enable unattended-upgrades and configure its settings, run:
dpkg-reconfigure unattended-upgrades
Configuration file
The default configuration file for the unattended-upgrades
package is at /etc/apt/apt.conf.d/50unattended-upgrades
. Any local customization should be in /etc/apt/apt.conf.d/52unattended-upgrades-local
. For more details, you can read the official documentation at Debian’s wiki on unattended upgrades
Control which updates are installed
This setting controls which updates are allowed to be installed automatically by editing the Unattended-Upgrade::Allowed-Origins
section. To install only security updates (the recommended configuration), add the following to your local customization file:
Unattended-Upgrade::Allowed-Origins {
"dists/${distro}-security";
};
Enable automatic reboots
If you want the system to reboot automatically after installing updates, you can enable this feature by setting the Unattended-Upgrade::Automatic-Reboot
and Unattended-Upgrade::Automatic-Reboot-Time
options.
Unattended-Upgrade::Automatic-Reboot "true";
Unattended-Upgrade::Automatic-Reboot-Time "02:00"; // Adjust the time as needed
Exclude specific packages from automatic updates
Adjust the section Unattended-Upgrade::Package-Blacklist
to exclude specific packages from automatic updates. For example:
Unattended-Upgrade::Package-Blacklist {
"package_name";
};
Combined configuration
Here’s an example of a combined configuration file:
Unattended-Upgrade::Origins-Pattern {
"origin=Debian,codename=${distro_codename},label=Debian-Security";
"origin=Debian,codename=${distro_codename},label=Debian";
"origin=Debian,codename=${distro_codename},label=Debian-Updates";
"origin=Debian,codename=${distro_codename},label=Debian";
};
Unattended-Upgrade::Package-Blacklist {
"package_name";
};
Unattended-Upgrade::Automatic-Reboot "true";
Unattended-Upgrade::Automatic-Reboot-Time "02:00";
how unattended-upgrades works
Unattended-upgrades is a separate package that works in conjunction with the regular apt update mechanism. It’s not a replacement for apt update and apt upgrade.
Once enabled and configured, unattended-upgrades
will periodically check for and install updates. These updates are automatically downloaded and installed, reducing the need for manual intervention. This helps keep your system secure by ensuring that critical updates are applied quickly. A typical workflow is:
sudo apt update
: Refreshes the local package list.sudo apt upgrade
: Installs available updates (this is usually done manually).unattended-upgrades
: Periodically checks for and installs updates as configured (usually just security updates).
Important: Some updates, especially kernel updates, require a reboot to take effect. Configure unattended-upgrades to reboot automatically (or plan for manual reboots) to ensure that all updates are applied correctly.
App Armor or SELinux
These security modules provide Mandatory Access Control (MAC)** to restrict what applications can do, but their complexity makes them slightly less critical than the above steps, depending on the use case.
Important: You should only enable either AppArmor or SELinux. Do use use both, as they conflict which each other.
SELinux
SELinux is typically used with distributions like CentOS, Fedora, and RHEL, but it can also be used on Ubuntu if needed. You can configure SELinux in enforcing mode, which strictly enforces security policies, or permissive mode for testing.
SELinux has two operational modes:
- Enforcing (default) → Strictly applies security policies.
- Permissive → Logs violations but does not block actions (useful for debugging).
Important: If you plan on using SELinux on Ubuntu, make sure to uninstall AppArmor, as it comes pre-installed and conflicts with SELinux.
Installing SELinux
To install the required SELinux packages on Ubuntu run the command below:
apt install policycoreutils selinux-basics selinux-utils
This command will install selinux
and its necessary dependencies on your server.
Important: If you are not using Ubuntu, it’s better and recommended to check your distribution’s documentation for the most complete SELinux installation instructions.
Activating SELinux
Activate SELinux by running the command below.
selinux-activate
The activation will ask to reboot the system, and it is required, but first, finish the configuration before rebooting.
Change Policy to Targeted
Setting the SELinux policy to targeted
or a more specialized policy ensures the system will confine processes that are likely to be targeted for exploitation, such as network or system services.
The SELinux targeted policy is appropriate for general-purpose desktops and servers, as well as systems in many other roles. To configure the system to use this policy, add or correct the following line in /etc/selinux/config
:
SELINUX=enforcing
SELINUXTYPE=targeted
Other policies, such as mls
, provide additional security labeling and greater confinement but are not compatible with many general-purpose use cases which may break some applications.
Rebooting
Once configured, reboot the system (It’s required after activating SELinux):
shutdown -r now
Checking SELinux Status
To view the current state of your new SELinux host after rebooting. Run the commands getenforce
and sestatus
. Both commands will show the state of SELinux. The only difference is that sestatus
will provide more detailed output.
getenforce
If SELinux is installed and active, you’ll see:
Enforcing
This means that your SELinux is ready to work and it’s active.
AppArmor
AppArmor is often easier to configure and is commonly used on Ubuntu-based distributions. AppArmor works by confining programs to a limited set of resources. It is default on Ubuntu and provides security without requiring complex policy management.
Installing AppArmor
To install AppArmor, run the following command:
apt install apparmor
This command will install apparmor
and its necessary dependencies on your server.
Important: Check with your distribution’s package manager for the appropriate installation command.
Checking AppArmor Status
To check the status of AppArmor use:
aa-status
If active, you’ll see something like:
apparmor module is loaded.
105 profiles are loaded.
10 profiles are in enforce mode.
[...]
Managing AppArmor Profiles
AppArmor
uses profiles to define allowed behaviors for specific applications. The profiles are usually located in /etc/apparmor.d/
. Also,
The aa-status
command will show which profiles are loaded and in which mode (enforce or complain). To list all loaded profiles:
aa-status
To disable a specific profile (e.g., for nginx):
aa-disable /etc/apparmor.d/usr.sbin.nginx
To enable a profile:
aa-enforce /etc/apparmor.d/usr.sbin.nginx
Disabling AppArmor (if switching to SELinux)
To permanently disable AppArmor before switching to SELinux:
systemctl stop apparmor
systemctl disable apparmor
apt remove apparmor
Then, reboot before installing SELinux.
kernel configuration
While important for system hardening, kernel tweaks are typically advanced and often require deeper knowledge of system operations. It’s critical but can be tackled once the primary security measures are in place.
The sysctl
utility is used to modify kernel parameters at runtime. These parameters control a wide variety of aspects of system performance and behavior. By editing the sysctl.conf
or adding specific configuration files in /etc/sysctl.d/
, you can harden the Linux kernel to better defend against various attacks and secure your server.
Below is an example of how you can secure your server using sysctl
settings. We’ll create and edit a custom configuration file to ensure that the settings persist across reboots.
Create and Edit the sysctl
Configuration File
To begin, create a custom configuration file:
vim /etc/sysctl.d/secure-server.conf
You can now add the following settings to the file:
Prevent IP Spoofing:
The rp_filter
(reverse path filtering) recommended setting is to enable strict mode to prevent IP spoofing from DDos attacks. If using asymmetric routing or other complicated routing, then loose mode is recommended (3).
net.ipv4.conf.all.rp_filter=1
net.ipv4.conf.default.rp_filter=1
net.ipv6.conf.all.rp_filter=1
net.ipv6.conf.default.rp_filter=1
Disable Accepting ICMP Redirects:
ICMP redirects are used by routers to inform hosts of a better route to reach a destination. However, this can be exploited by attackers in Man-in-the-Middle (MITM) attacks. By disabling ICMP redirects, we ensure that the server won’t participate in these redirects.
This feature of the IPv4 protocol has few legitimate uses. It should be disabled unless absolutely required."
net.ipv4.conf.all.accept_redirects = 0
net.ipv4.conf.default.accept_redirects = 0
net.ipv4.conf.all.secure_redirects = 0
net.ipv6.conf.all.accept_redirects = 0
net.ipv6.conf.default.accept_redirects = 0
net.ipv6.conf.all.secure_redirects = 0
Disable Sending ICMP Redirects:
Just as you shouldn’t accept ICMP redirects, you should also prevent your server from sending them. These messages contain information from the system’s route table possibly revealing portions of the network topology. This further secures the server by ensuring that it does not act as a router in the network.
The ability to send ICMP redirects is only appropriate for systems acting as routers, thus, it should be disabled unless absolutely required.
net.ipv4.conf.all.send_redirects = 0
net.ipv4.conf.default.send_redirects = 0
net.ipv6.conf.all.send_redirects = 0
net.ipv6.conf.default.send_redirects = 0
Disable IP Source Routing:
Source routing allows a sender to specify the route that packets should take through the network. This feature can be exploited by attackers to bypass firewalls or other network defenses. This setting should be disabled unless it is absolutely required, such as when IPv4 forwarding is enabled and the system is legitimately functioning as a router.
net.ipv4.conf.all.accept_source_route = 0
net.ipv4.conf.default.accept_source_route = 0
net.ipv6.conf.all.accept_source_route = 0
net.ipv6.conf.default.accept_source_route = 0
Disable Router Advertisements:
An illicit router advertisement message could result in a man-in-the-middle attack.
net.ipv6.conf.all.accept_ra = 0
net.ipv4.conf.all.accept_ra = 0
Enable Martian Packets Log:
Martian packets are packets with addresses that are reserved for special use and are not routable on the network. These are often signs of malicious activity or misconfiguration. By logging these packets, you can detect abnormal traffic that might indicate an attack or misconfigured device.
net.ipv4.conf.all.log_martians = 1
net.ipv4.conf.default.log_martians = 1
net.ipv6.conf.all.log_martians = 1
net.ipv6.conf.default.log_martians = 1
Disable echo requests:
Responding to broadcast (ICMP) echoes facilitates network mapping and provides a vector for amplification attacks.
Ignoring ICMP echo requests (pings) sent to broadcast or multicast addresses makes the system slightly more difficult to enumerate on the network.
net.ipv4.icmp_echo_ignore_broadcasts = 1
net.ipv6.icmp_echo_ignore_broadcasts = 1
Disable IP Forwarding:
Routing protocol daemons are typically used on routers to exchange network topology information with other routers. If this capability is used when not required, system network information may be unnecessarily transmitted across the network.
net.ipv4.ip_forward = 0
net.ipv6.conf.all.forwarding = 0
Prevent TCP SYN Flood attack:
A TCP SYN flood attack can cause a denial of service by filling a system’s TCP connection table with connections in the SYN_RCVD state. Syncookies can be used to track a connection when a subsequent ACK is received, verifying the initiator is attempting a valid connection and is not a flood source. This feature is activated when a flood condition is detected, and enables the system to continue servicing valid connection requests.
net.ipv4.tcp_syncookies = 1
net.ipv6.tcp_syncookies = 1
Conclusion
Setting up SSH on a server is a fundamental step in securing remote access. By properly configuring SSH, disabling root login, using key-based authentication, and tweaking security settings, you can significantly reduce the risk of unauthorized access.
If you haven’t already, consider taking additional security measures, such as using a firewall (e.g., ufw or iptables), implementing Fail2Ban to prevent brute-force attacks, and keeping your system updated.
By following these best practices, you ensure that your SSH server remains both secure and efficient, allowing you to manage your systems with confidence. Remember that security is an ongoing process, and it’s essential to stay informed about the latest security threats and updates. Regularly review and update your security measures to protect your server from potential vulnerabilities.