The first step after you create a Linux® Cloud Server is to set the security on it. You should perform this crucial step on every server to prevent bad actors from obtaining unwanted access. This action results in a more secure environment that helps prevent you and your business from being compromised. Performing these basic steps and hardening the security on your server discourages bad actors and makes them move on to a new target.
User management#
By default, the root user is created as the first user on every Linux system. You should disable it via Secure Shell (SSH). Disabling this root user via SSH makes it harder for a bad actor to gain access to the system. Because the root user is created by default on every Linux server, bad actors already have half the information they need to log in to your server if the root user is enabled via SSH. This situation allows for brute-force SSH attacks until the password hash breaks.
To avoid this situation, you should create a secondary user for when you need
to log in and administer the system. Each end user on the system should have
their own login credentials for logging purposes. Depending on the actions that
the end user needs to perform, they might need sudo
permission to complete
administrative actions. This section provides examples about how to add a user with
sudo permission on both Debian® and Red Hat® Enterprise Linux-based systems.
Password strength guidelines#
Before you create any users, ensure that you use strong passwords that require a minimum character length (and maybe even include expiration dates). Here are common guidelines advocated by proponents of software system security:
Use a minimum password length of 12 to 14 characters, if permitted.
Include lowercase and uppercase letters, numbers, and symbols, if permitted.
Generate passwords randomly, where feasible.
Avoid using the same password for multiple users, accounts, or software systems.
Avoid character repetition, keyboard patterns, dictionary words, letter or number sequences, user names, relative or pet names, romantic links (current or past), or personal information (for example, ID numbers, ancestors’ names, or dates).
Avoid using information that is or might become publicly associated with the user or the account.
Avoid using information that the user’s colleagues or acquaintances might know to be associated with the user.
Do not use passwords that consist of weak components.
Add a user (Debian and Ubuntu operating system)#
For Debian and Ubuntu® operating systems, add a user by following these steps:
Create a new user and set their password:
useradd {username} passwd {username}
Give the new user
sudo
permissions for privileged operations on the system. This user is the primary user for logging in remotely and making changes to the server.Use one of the following methods to implement
sudo
permissions for the user.a. Run the following command to add the user to the
admin
user group.usermod -aG admin {username}
Alternatively, you can modify the sudoers file to give the user
sudo
permissions.a. Run the following command as root to edit the list of user permissions:
visudo
Note: On some distributions, systems use the
vi
text editor forvisudo
. Becausevi
is not a user-friendly editor, you might need to consult a vi tutorial for help.b. Add the following line directly after the line containing
root ALL=(ALL:ALL) ALL
:{username} ALL=(ALL:ALL) ALL
c. Save and quit.
Switch to the new user and test their permissions by using
sudo
to run a command that requires root access, such as the following command:su {username} sudo systemctl status sshd
A prompt asks you to enter the new user’s password for verification before executing the command.
You can also verify that your user can elevate to the
root
account by running the following command:sudo -i
If you perform these steps correctly, your user now has sudo
access and can elevate permissions.
If not executed properly, you get a message indicating that the user is not in the sudoers file
when you attempt to authenticate.
Add a user (Red Hat and CentOS)#
For Red Hat and CentOS® operating systems, add a user by following these steps:
Create a new user with
adduser
and set the user’s password withpasswd
:useradd {username} passwd {username}
Give the new user
sudo
permissions for privileged operations on the system. This user is the primary user for logging in remotely and making changes to the server.Use one of the following methods to implement
sudo
permissions for the user.a. Run the following command to add the user to the
wheel
groupusermod -aG wheel {username}
Alternatively, you can modify the sudoers file to give the user
sudo
permissions.a. Run the following command:
visudo
Note: On some distributions, the text editor that the system uses for
visudo
isvi
. Becausevi
is not a user-friendly editor, you might need to consult a vi tutorial for help.b. Add the following line directly after the line containing
root ALL=(ALL:ALL) ALL
:{username} ALL=(ALL) ALL
c. Save and quit.
Switch to the new user and test their permissions by using
sudo
to run a command that requires root access:su {username} sudo systemctl status sshd
A prompt asks you to enter the new user’s password for verification before executing the command.
You can also verify that your user can elevate to the
root
account by running the following command:sudo -i
If you performed these steps correctly, your user now has sudo
access and can elevate permissions.
If not executed properly, you get a message indicating that the user is not in the sudoers file
when you attempt to authenticate.
Generate an SSH key pair#
For a login method that is more secure than using a password, create an SSH key pair to use with the user that you previously created. These instructions work with any Linux distribution.
Note: These instructions are for Linux and macOS® desktops. If you are connecting from a Windows® desktop, follow the instructions in Generate RSA keys with SSH PUTTYgen and Log in with a SSH private key on Windows to generate and add the SSH key pair.
Run the following command to generate a key pair on your local Linux or Mac® computer:
ssh-keygen -b 4096 -t rsa
When asked where to save the key, use the default location. Adding a password is optional and is more secure, but can be inconvenient.
This operation creates two files. The default names are
id_rsa
for your private key andid_rsa.pub
for your public key.After you have created the key pair on your local computer, upload the public key to your remote server for the user that you created previously.
Warning: Be sure to upload the public key, and not the private key.
ssh-copy-id -i ~/.ssh/id_rsa.pub {username}@{remotePublicIPAddress}
Connect to the remote server by using
ssh {username}@{remotePublicIPAddress}
and run the following command to verify that no extra keys were added that you do not expect:cat .ssh/authorized_keys
At this point, you have added ssh-key
and password authentication for the user. The next
section goes over optional steps on how to disable password authentication.
Linux SSH daemon configuration#
Now that you have a new user with sudo
permissions and an SSH key
pair, you can work with the SSH daemon (server) configuration to improve security.
Note: For Managed Operations and RackConnect customers only: To ensure that our automated systems have access to your server when needed, we request that you do not change the SSH configuration and that you skip to the next section. When connecting to your server, the Rackspace Support team logs in as the user rack
and uses password authentication on port 22. In addition, rebuilding existing servers or building a new server from a snapshot requires that you enable root logins by setting the PermitRootLogin
option to yes
. If you need to change these values, speak with a member of your Rackspace Support team so that the change is made in a way that does not impact our ability to provide you with a Fanatical Experience™.
The example commands for the rest of the article assume that you’re are logged in as
your new user, using sudo
to perform privileged operations.
SSH configuration options#
This section covers common options in the SSH configuration file that help improve security. This information is used to configure your firewall later.
This section outlines only a few options to change and describes what they do. For details on other configuration options, see the OpenSSH documentation.
This section focuses on the following options:
Port XX
: This option is the port on which the SSH daemon listens (port 22 by default).PermitRootLogin
: This flag enables (yes) or disables (no) root login via SSH. By default, this line is commented and allows root login.PubkeyAuthentication
: This flag enables (yes) or disables (no) SSH keys for authentication. By default, this line is commented and allowsssh-key
access.PasswordAuthentication
: This flag enables (yes) or disables (no) password authentication. By default, this option is enabled.
SSH uses port 22 by default for communication. Bad actors try port 22 with the
username root
on every server that they attack. For this reason,
disabling the root user via SSH and changing SSH to listen on a nonstandard port
helps prevent a breach.
Changing the port won’t stop a determined intruder, but it does cause most superficial scans for SSH connection opportunities to overlook your server. Similarly, removing SSH access for the root user interferes with casual brute-force attacks via SSH.
You should also consider which authentication method to use when logging in. By default, all Linux systems use password authentication. Multiple ways exists to perform authentication on the server, but the main two are by using a password and SSH keys.
SSH keys are generated in pairs, one public and the other private, and you can use them only in combination with each other. You should store the private key in a safe location on the computer from which you connect, and you should never give it out. You can give out the public key, and it is the key that you place on the server to which you are connecting. The private key on your local computer runs through an algorithm when you make a connection, granting access if the key pair hash matches up with the public key.
Modify sshd_config#
By this point, you have added a new user with sudo
permissions, created an SSH
key pair, and uploaded your public SSH key. You can now change your SSH configuration
file to improve your security. To do this, you can change SSH to listen on a
custom port, restrict root login via SSH, enable public key authentication,
and disable password authentication by using the following steps:
Open the SSH daemon configuration file for editing:
sudo vim /etc/ssh/sshd_config
Change the following lines:
Note: By default, the
Port
andPermitRootLogin
lines are commented out as indicated by the#
symbol. When commented out, these lines are read as default options, even if changes are made to the line. To implement these changes, you need to uncomment the associated lines by removing the#
symbol at the beginning of the associated line. Additionally, before disablingPasswordAuthentication
ensure that you have configured an SSH key or you cannot connect to the server.Change:
#Port 22 #PermitRootLogin yes PasswordAuthentication yes
To:
Port 2222 PermitRootLogin no PasswordAuthentication no
Replace 2222 with the port you want to use. Ensure the new port isn’t already in use by another program by using netstat.
Important: As mentioned previously, you should not make this change to the
sshd_config
file if your server has a Managed Operations service level. These changes could deny Rackspace access to your server.Test the altered SSH configuration for errors by running the following command:
sshd -t
If you receive no errors, SSH is now configured to run on a custom port and accept only non-root users that pass a valid SSH key. For these settings to apply and persist, you must restart the SSH service. However, do not restart the service yet. Restarting SSH now might lock you out of the server, requiring you to use rescue mode or the web console to restore the configuration. You must configure the firewall before restarting the server. We discuss the firewall in the next section.
Amend software firewall and restart SSH#
Note: RackConnect customers: To manage firewall rules, use the RackConnect management instead of iptables
on the server. You shouldn’t change the SSH port if you use RackConnect. For more information about firewalls and RackConnect, see
Managing RackConnect v2.0 network policies.
Each Linux distribution uses a different software firewall solution. In Red Hat Enterprise Linux (RHEL) and CentOS 7, the default firewall is firewalld
. On Debian and Ubuntu-based distributions, the default firewall solution is Uncomplicated Firewall (UFW). For RHEL and CentOS 6, the default solution is iptables
. Refer to the following section for your server’s OS.
RHEL, CentOS 7, and firewalld#
Open the new SSH port by running the following commands:
sudo firewall-cmd --permanent --remove-service=ssh sudo firewall-cmd --permanent --add-port=2222/tcp sudo firewall-cmd --reload
Replace
2222
with the port that you used for the SSH daemon.Restart the
sshd
service by running the following command:sudo systemctl restart sshd
Verify that the your custom SSH port opened on the server:
netstat -plnt | grep ssh
If you followed these steps, you should see something similar to the following output:
tcp 0 0 0.0.0.0:2222 0.0.0.0:* LISTEN 1341/sshd
tcp6 0 0 :::2222 :::* LISTEN 1341/sshd
Ubuntu, Debian, and UFW#
Open the new SSH port by running the following commands:
sudo ufw allow 2222
Replace
2222
with the port that you used for the SSH daemon.Restart the
sshd
service by running the following command:sudo systemctl restart sshd
Verify that your custom SSH port opened on the server by running the following command:
netstat -plnt | grep ssh
If you followed these steps, you should see something similar to the following output:
tcp 0 0 0.0.0.0:2222 0.0.0.0:* LISTEN 1341/sshd
tcp6 0 0 :::2222 :::* LISTEN 1341/sshd
CentOS 6 and iptables#
Note: RHEL and CentOS 6 will be marked End of Life in November 2020. For best security practices, we strongly advise that you consider a newer OS version to host your application or website.
Open the new SSH port by running the following command:
sudo iptables -I INPUT -m state --state NEW -m tcp -p tcp --dport 2222 -j ACCEPT sudo service iptables-save
Replace
2222
with the port that you used for the SSH daemon.Run the following command to restart the SSH daemon so that the daemon applies the new configuration you set up:
sudo service sshd restart
Verify that your custom SSH port opened on the server by running the following command:
netstat -plnt | grep ssh
If you followed these steps, you should see something similar to the following output:
tcp 0 0 0.0.0.0:2222 0.0.0.0:* LISTEN 1341/sshd
tcp6 0 0 :::2222 :::* LISTEN 1341/sshd
After you make the changes for your OS, open another terminal window on your local machine and log in to the server as the user that you created previously. Remember to specify the newly changed port. Keep your original connection active in case you need to troubleshoot the configuration.
To connect to SSH with the new configuration, you might need to specify the port number and key to use. For example:
ssh -p 2222 -i ~/.ssh/id_rsa {username}@{remotePublicIPAddress}
The -p
option specifies the port, and the -i
option specifies the private key to use for the connection.
If you’re connecting from a Windows desktop, when you create the connection in PuTTY, you can specify the port number and a private key.
Simple intrusion prevention#
Most would-be intruders run multiple attacks against the same port to try to find something that they can exploit in the software running on that port. Fortunately, you can set up an intrusion prevention tool like fail2ban on your server to block repeated attacks on a port.
Note: Managed Operations servers have fail2Ban
installed and configured
by default to watch over SSH login attempts. Contact your Support team if you
have any questions or concerns.
fail2ban
monitors logs and automatically blocks connections if it sees too many
from the same host in a short period of time. To set up and configure fail2ban
on your server, use the following steps:
To install
fail2ban
on your server, run one of the following commands.RHEL and CentOS:
sudo yum install fail2ban
Debian and Ubuntu:
sudo apt-get install fail2ban
Use the following command to copy your default
fail2ban
config. The newly created file overrides the default config and allows you to modify the file safely.sudo cp -pf /etc/fail2ban/jail.conf /etc/fail2ban/jail.local
Modify your file to customize your security level in
fail2ban
.vim /etc/fail2ban/jail.local
In this file, you can set the following options:
ignoreip
: This parameter allows you to specify any IP address that should not be banned.bantime
: This parameter allows you to specify the number of seconds to ban an IP address.findtime
: This parameter checks for indications ofmaxretry
triggers in the specified time.maxretry
: This parameter sets the number of retries allows before the IP address is banned.
Create a jail file for SSH login attempts.
vim /etc/fail2ban/jail.d/sshd.local
In the file created, copy and paste the following text:
[sshd] enabled = true port = ssh #action = firewallcmd-ipset logpath = %(sshd_log)s maxretry = 3 bantime = 86400
These options ban an IP address after three failed attempts to connect via SSH for 24 hours. If you know your local IP address, we strongly recommended that you add this IP address in the preceding section as an
ignoreip
parameter.Start and enable
fail2ban
on your server by using the following commands:RHEL and CentOS 7 or Debian and Ubuntu:
sudo systemctl start fail2ban sudo systemctl enable fail2ban
RHEL and CentOS 6:
sudo service fail2ban start sudo chkconfig fail2ban on
Intrusion detection#
An intrusion detection system (IDS) can help an administrator monitor systems
for suspicious activity and possible exploits. An IDS is more robust than a
prevention tool like fail2ban
but can be more complicated to set up and
maintain.
A popular open-source IDS is OSSEC. OSSEC maintains agents on multiple systems that report back to the main server, allowing investigation of logs and alerts from a potentially compromised server even if that server is shut down.
If you suspect that a system is already compromised, you can investigate with procedures such as checking for backdoors and intruders and rescue mode investigation.
Keep your OS up to date (patching)#
Keeping your kernel, packages, and dependencies up-to-date is very important, especially for security-related modules and packages. Some updates, such as kernel updates, require you to reboot your server. You should schedule maintenances to take place during times that are least disruptive to users because these maintenances cause a short period of downtime.
Important: While keeping your system up to date is of vital importance, ensure that the updates you’re applying do not negatively impact your production environment.
To check for and install updates on Ubuntu operating systems and Debian, run the following commands:
sudo apt-get update
sudo apt-get upgrade
To check for and install updates on CentOS, Red Hat, and Fedora systems, run the following command:
sudo yum update
Operating system end-of-life#
Find out when the Linux distribution release that you are running on your servers reaches its end-of-life (EOL). When a release reaches its EOL, the distribution’s maintainers no longer support it or supply package updates through their official repositories. You should plan your migration to a newer release well before your current release reaches its EOL.
Use the following links to find out when your Linux distribution release is set to reach its EOL:
Ubuntu operating systems: https://wiki.ubuntu.com/Releases
Red Hat Enterprise Linux (RHEL): https://access.redhat.com/support/policy/updates/errata/
CentOS: Same as Red Hat
Account-level security#
Although securing your servers is an essential part of operations on the Internet, securing your account is also necessary. Your account name, password, and API keys are essential parts of how you interact with the Rackspace Cloud offerings. Just like any other password or access credentials, you want to keep them secure. However, you also need to allow your team to take action and perform necessary tasks.
By using Role Based Access Control (RBAC), you can create users and grant permissions to individuals or applications that are responsible for using various Rackspace services. By leveraging RBAC, you can give your team and contractors access to only the utilities that they need and revoke the access if necessary.
Following are some usage scenarios:
Give contractors access to set up the environment that you have hired them to create, but limit their ability to view or change any credit card information or delete your account.
Allow your accountant to see the bill but not to delete your servers.
Hire a Database administrator (DBA) and give the DBA access to your DBaaS instances.
Allow a client to upload files directly to your Cloud Files account.
Configure your servers to register and use specific users for your monitoring and backup agents that are separate from your admin account.
For more information about RBAC, see the Role-Based Access Control (RBAC) FAQ.