issue81:securite
Différences
Ci-dessous, les différences entre deux révisions de la page.
Prochaine révision | Révision précédente | ||
issue81:securite [2014/02/23 17:09] – créée andre_domenech | issue81:securite [2014/05/18 15:41] (Version actuelle) – auntiee | ||
---|---|---|---|
Ligne 1: | Ligne 1: | ||
- | + | ** | |
Don't kernel panic! Gord will be back shortly for more of your questions. | Don't kernel panic! Gord will be back shortly for more of your questions. | ||
- | |||
In this new section Michael Boelen (creator of Lynis) will answer your Linux security questions. Do you have a question on Linux/ | In this new section Michael Boelen (creator of Lynis) will answer your Linux security questions. Do you have a question on Linux/ | ||
+ | ** | ||
+ | Ne paniquez pas du noyau ! Gord va revenir très bientôt pour répondre à vos questions. | ||
+ | Dans cette nouvelle section Michael Boelen (créateur de Lynis) va répondre à vos questions de sécurité sous Linux. Si vous avez une question à poser à Michael sur la sécurité Linux ou Ubuntu, merci de l' | ||
+ | ** | ||
From Ben McTee: I’m currently running Xubuntu 13.04 as a music, video, and file server for my home and abroad. I have an SSH server set up with key authentication only (password is disabled). In order to access my server remotely, port forwarding is enabled on my Airport Extreme router, forwarding all port 80 traffic to my server. I have Plex Server installed and set up to allow streaming of videos to my devices while I am away from home. Additionally, | From Ben McTee: I’m currently running Xubuntu 13.04 as a music, video, and file server for my home and abroad. I have an SSH server set up with key authentication only (password is disabled). In order to access my server remotely, port forwarding is enabled on my Airport Extreme router, forwarding all port 80 traffic to my server. I have Plex Server installed and set up to allow streaming of videos to my devices while I am away from home. Additionally, | ||
MB: If a malicious person (or script) would like to enter your network, it’s a matter of finding the weakest link. One way to find this is using a well-known network port (like port 80) combined with a piece of easy identifiable software (e.g. Webmin). There are few things which can be done to strengthen the weakest links: use a non-standard port to thwart most malicious scripts, encrypt data if possible, limit access by using an IP filter or an additional layer of authentication. In your case, you already applied several of these methods. One way to test them is to check what ports are open from “outside”, | MB: If a malicious person (or script) would like to enter your network, it’s a matter of finding the weakest link. One way to find this is using a well-known network port (like port 80) combined with a piece of easy identifiable software (e.g. Webmin). There are few things which can be done to strengthen the weakest links: use a non-standard port to thwart most malicious scripts, encrypt data if possible, limit access by using an IP filter or an additional layer of authentication. In your case, you already applied several of these methods. One way to test them is to check what ports are open from “outside”, | ||
+ | ** | ||
+ | De Ben McTee: J' | ||
+ | |||
+ | MB: Lorsqu' | ||
+ | |||
+ | ** | ||
From Ben McTee: What is the best method of automatically notifying me if an attack is being attempted on my network (port scanning, for example). | From Ben McTee: What is the best method of automatically notifying me if an attack is being attempted on my network (port scanning, for example). | ||
MB: One should first know the definition of an attack. Unfortunately this differs for every individual or company. In the field of security incident response, we consider mainly any events which are outside normal behavior, and with a clear malicious intent. Port scanning would therefore not be an attack or a trigger for security incident response. It’s simply a common thing on the internet, similar to brute forcing accounts via SSH. But performing a distributed denial of service on your system is considered malicious and not a daily event. So my advice is to decide first what you want to protect and what you would do with events occurring. Would you investigate each port scan attempt and would it be worth the time? | MB: One should first know the definition of an attack. Unfortunately this differs for every individual or company. In the field of security incident response, we consider mainly any events which are outside normal behavior, and with a clear malicious intent. Port scanning would therefore not be an attack or a trigger for security incident response. It’s simply a common thing on the internet, similar to brute forcing accounts via SSH. But performing a distributed denial of service on your system is considered malicious and not a daily event. So my advice is to decide first what you want to protect and what you would do with events occurring. Would you investigate each port scan attempt and would it be worth the time? | ||
+ | To test your PCs security, see Michael' | ||
+ | ** | ||
+ | De Ben McTee: Quelle est la meilleure méthode de recevoir des notifications automatiquement si une attaque est tentée sur mon réseau (scan de port, par exemple). | ||
+ | MB: Il faut d' | ||
+ | |||
+ | Pour tester la sécurité de votre PC, voir le tutoriel de Michael plus haut dans ce numéro sur Lynis. | ||
- | To test your PCs security, see Michael' |
issue81/securite.1393171763.txt.gz · Dernière modification : 2014/02/23 17:09 de andre_domenech