this post was submitted on 10 Feb 2025
814 points (99.4% liked)

linuxmemes

22440 readers
1452 users here now

Hint: :q!


Sister communities:


Community rules (click to expand)

1. Follow the site-wide rules

2. Be civil
  • Understand the difference between a joke and an insult.
  • Do not harrass or attack users for any reason. This includes using blanket terms, like "every user of thing".
  • Don't get baited into back-and-forth insults. We are not animals.
  • Leave remarks of "peasantry" to the PCMR community. If you dislike an OS/service/application, attack the thing you dislike, not the individuals who use it. Some people may not have a choice.
  • Bigotry will not be tolerated.
  • These rules are somewhat loosened when the subject is a public figure. Still, do not attack their person or incite harrassment.
  • 3. Post Linux-related content
  • Including Unix and BSD.
  • Non-Linux content is acceptable as long as it makes a reference to Linux. For example, the poorly made mockery of sudo in Windows.
  • No porn. Even if you watch it on a Linux machine.
  • 4. No recent reposts
  • Everybody uses Arch btw, can't quit Vim, <loves/tolerates/hates> systemd, and wants to interject for a moment. You can stop now.
  • 5. ๐Ÿ‡ฌ๐Ÿ‡ง Language/ัะทั‹ะบ/Sprache
  • This is primarily an English-speaking community. ๐Ÿ‡ฌ๐Ÿ‡ง๐Ÿ‡ฆ๐Ÿ‡บ๐Ÿ‡บ๐Ÿ‡ธ
  • Comments written in other languages are allowed.
  • The substance of a post should be comprehensible for people who only speak English.
  • Titles and post bodies written in other languages will be allowed, but only as long as the above rule is observed.
  • ย 

    Please report posts and comments that break these rules!


    Important: never execute code or follow advice that you don't understand or can't verify, especially here. The word of the day is credibility. This is a meme community -- even the most helpful comments might just be shitposts that can damage your system. Be aware, be smart, don't remove France.

    founded 2 years ago
    MODERATORS
     

    Background: 15 years of experience in software and apparently spoiled because it was already set up correctly.

    Been practicing doing my own servers, published a test site and 24 hours later, root was compromised.

    Rolled back to the backup before I made it public and now I have a security checklist.

    (page 3) 50 comments
    sorted by: hot top controversial new old
    [โ€“] [email protected] 8 points 2 days ago (3 children)

    I like to spin up a public facing server and run tcpdump

    load more comments (3 replies)
    [โ€“] [email protected] 7 points 2 days ago

    Use gnome powder to shrink, go behind the counter, kick his ass and get your money back.

    [โ€“] [email protected] 42 points 2 days ago (4 children)

    Do not allow username/password login for ssh. Force certificate authentication only!

    load more comments (4 replies)
    [โ€“] [email protected] 6 points 2 days ago (3 children)

    I do worry about putting up public servers that other people might rely on because there's something I might not realize making it vulnerable.

    So far I have pubkey root login only on the VPSs I'm messing around with, but my ol' reliable private key from 6 years ago might be beginning to fall behind on encryption standards.

    load more comments (3 replies)
    [โ€“] [email protected] 40 points 2 days ago (5 children)

    How are people's servers getting compromised? I'm no security expert (I've never worked in tech at all) and have a public VPS, never been compromised. Mainly just use SSH keys not passwords, I don't do anything too crazy. Like if you have open SSH on port 22 with root login enabled and your root password is password123 then maybe but I'm surprised I've never been pwned if it's so easy to get got...

    [โ€“] [email protected] 16 points 2 days ago (1 children)

    glad my root pass is toor and not something as obvious as password123

    load more comments (1 replies)
    [โ€“] [email protected] 7 points 2 days ago

    The one db I saw compromised at a previous employer was an AWS RDS with public Internet access open and default admin username/password. Luckily it was just full of test data, so when we noticed its contents had been replaced with a ransom message we just deleted the instance.

    [โ€“] [email protected] 28 points 2 days ago (1 children)

    By allowing password login and using weak passwords or by reusing passwords that have been involved in a data breach somewhere.

    [โ€“] [email protected] 7 points 2 days ago

    That makes sense. It feels a bit mad that the difference between getting pwned super easy vs not is something simple like that. But also reassuring to know, cause I was wondering how I heard about so many hobbyist home labs etc getting compromised when it'd be pretty hard to obtain a reasonably secured private key (ie not uploaded onto the cloud or anything, not stored on an unencrypted drive that other people can easily access, etc). But if it's just password logins that makes more sense.

    load more comments (2 replies)
    [โ€“] [email protected] 11 points 2 days ago (1 children)

    Iโ€™ve always felt that if youโ€™re exposing an SSH or any kind of management port to the internet, you can avoid a lot of issues with a VPN. Iโ€™ve always setup a VPN. It prevents having to open up very much at all and then you can open configured web portal ports and the occasional front end protocol where needed.

    load more comments (1 replies)
    [โ€“] [email protected] 5 points 2 days ago

    Good on you learning new skills.

    This is why other sysadmins and cybetsecurity exist. Be nice to them.

    [โ€“] [email protected] 47 points 2 days ago (1 children)

    Lol you can actually demo a github compromise in real time to an audience.

    Make a repo with an API key, publish it, and literally just watch as it takes only a few minutes before a script logs in.

    [โ€“] [email protected] 31 points 2 days ago (2 children)

    I search commits for "removed env file" to hopefully catch people who don't know how git works.

    [โ€“] [email protected] 11 points 2 days ago

    You gremlin lmao

    [โ€“] [email protected] 14 points 2 days ago* (last edited 2 days ago) (3 children)

    --verbose please?

    edit: never mind, found it. So there's dumbasses storing sensitive data (keys!) inside their git folder and unable to configure .gitignore...

    [โ€“] [email protected] 13 points 2 days ago

    yeah, I just tried it there, people actually did it.

    load more comments (2 replies)
    [โ€“] [email protected] 6 points 3 days ago (4 children)

    This is like browsing /c/selfhosted as everyone portforwards every experimental piece of garbage across their router...

    [โ€“] [email protected] 6 points 2 days ago

    hey, thats me!

    [โ€“] [email protected] 10 points 2 days ago (1 children)

    Meh. Each service in its isolated VM and subnet. Plus just generally a good firewall setup. Currently hosting ~10 services plubicly, never had any issue.

    [โ€“] [email protected] 4 points 2 days ago

    Well, if you actually do that, bully for you, that's how that should be done if you have to expose services.

    Everyone else there is probably DMZing their desktop from what I can tell.

    [โ€“] [email protected] 3 points 2 days ago

    Yeah the only thing forwarded past my router is my VPN. Assuming I did my job decently, without a valid private key it should be pretty difficult to compromise.

    load more comments (1 replies)
    [โ€“] [email protected] 76 points 3 days ago (1 children)

    One time, I didnโ€™t realize I had allowed all users to log in via ssh, and I had a user โ€œsteamโ€ whose password was just โ€œsteamโ€.

    โ€œHey, why is this Valheim server running like shit?โ€

    โ€œWtf is xrx?โ€

    โ€œOh, it looks like itโ€™s mining crypto. Cool. Welp, gotta nuke this whole box now.โ€

    So anyway, now I use NixOS.

    [โ€“] [email protected] 17 points 2 days ago

    Good point about a default deny approach to users and ssh, so random services don't add insecure logins.

    load more comments
    view more: โ€น prev next โ€บ