Ubuntu and Debian Security Applications Review
sizcache = "0" sizset = "55">
Securing servers from potential attacks is crucial in today's economic climate. This article is a personal overview of some of the best applications I've reviewed recently to ensure your server, as well as others. This document contains applications that May or May not fit every situation, in order to properly secure Internet facing systems. But that does not use fully open source and free software on the host, so it will run without the need for costly external hardware.
When reviewing existing security policies of several factors must be considered first. These are performance, stability and overall use of system resources. Use this to determine the needs for each of their own requirements. Instead of just pushing all the suggested on a single server. As some applications reviewed are not always fully interchangeable with the others mentioned.
That being said, we start with the worlds most popular Apache web server.
Mod Security
Without a doubt one of my personal favorite Apache Modules mod security. Although it does not require registration to download and is completely free with no restrictions. Mod Security is an invaluable web application firewall that discourages a lot of scum and random robots floating around the Internet today. According to the website security mode for more than 70% of all attacks carried out on the web today are done on the Web application level. What is very relevant, because a compromised Web site can often leak out thousands if not hundreds of thousands of passwords and user credentials in a single compromise.
professional
Mod Security has very strict rules, a set that is capable of blocking many types of web application attacks, most of them can be found in the guidelines established OWASP top 10.
cons
default rules can break the functionality of web applications in the first place. But it can be fixed, if you can find the offending rule review log files and commenting and off. Common things that can happen is that users are unable to login, or some other functionality such as custom search can be broken.
Snort
the following very interesting program Snort known de facto standard for intrusion detection. Snorts job is to monitor the network, while as light as humanly possible. As it does not consume many system resources and slow down the system user can run on. What really makes it unique Snort, however, that the heritage of a very stable and robust IDS with both open source rule sets and more advanced business rule sets that are available through subscription.
professional
Lightweight and flexible, reliable and stable.
cons
free rules are available a lot to be desired in relation to the subscription rules.
AIDE
AIDE integrity check can be used to create hashes of files or directories, and general replacement for older Linux applications trip wires. If the request is changed without the approval of a simple cross reference to the image disk can reveal insights quickly as the files may have changed in this process. Providing SHA1 hashes, or other algorithms. It is therefore very useful to analyze the exact cause of vulnerability in case of possible attacks and in many respects be regarded as root kit detector without all the fancy bells and whistles like our next program.
professional
Supports custom algorithms and makes for a trip where the wire and the other one failed.
cons
lack of documentation in order to properly implement and use for less experienced users to be a concept you can give up quickly. (I'm not wrong, but it's worth .)
rkhunter
Another good root kit detector rkhunter and works very much the same as an aide, but it is more accurate root kit detector in that it scans all the usual locations where it would make sense for a root-kit to hide naLinux system and where historically have been stored.
professional
is very in depth and has support for a wide range of common root-kits.
cons
By default on Debian and Ubuntu it flags a false positive for a fool, awk, and several other directories, but I believe this is only to be falsely positive.
fail2ban
fail2ban helps to block automated queries and often brutal robot or potential attackers through SSH to make too many incorrect login attempts.
professional
Do not automatically prohibit bots only do you protect your system from compromise, but also help keep the server performance to more optimal levels.
cons
myself temporarily locked out before by not setting the threshold high enough and forgot what my password. As long as you do that you should be fine.
Choose the right web host
Although this is not a program I believe that equally important and major factor in keeping your web server is certain to choose the right web host for your environment and needs. While many of their cows, dad, gators and other sharks are trying to add 1 & 1 together $ 5 or less discount hosting of the war. Take some time to consider what you're paying for and if you can afford to pay that bit extra to get the benefits of well-known provider whenever you can.
10:15 PM
|
Labels:
debian security applications,
security applications,
security applications review,
ubuntu debian security applications review,
web application
|
This entry was posted on 10:15 PM
and is filed under
debian security applications
,
security applications
,
security applications review
,
ubuntu debian security applications review
,
web application
.
You can follow any responses to this entry through
the RSS 2.0 feed.
You can leave a response,
or trackback from your own site.
0 comments:
Post a Comment