Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 13 May 2010 13:27:43 +0300
From:      Pekka Niiranen <pekka.niiranen@pp5.inet.fi>
To:        freebsd-questions@freebsd.org
Cc:        questions@freebsd.org, Artur Sentsov <sen4ik@gmail.com>
Subject:   Re: From Arthur Sentsov - Questions from beginner
Message-ID:  <4BEBD41F.1080703@pp5.inet.fi>
In-Reply-To: <4BEB9534.2020403@infracaninophile.co.uk>
References:  <AANLkTinsunQZuTsxKkS-u0rsVlAlV0WrsGQ-8Zf51TLK@mail.gmail.com> <4BEB9534.2020403@infracaninophile.co.uk>

next in thread | previous in thread | raw e-mail | index | archive | help
Matthew Seaman wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> On 13/05/2010 05:41:47, Artur Sentsov wrote:
> 
>> 1. I have freebsd server running apache and mysql. In logs i see around 100
>> attempts to hack the server. Is that normal? what i have to do that after
>> three wrong attempts to enter password server will block ip address?!
> 
Use pf -filter to collect attempts to a list. That list will then be 
used to block attempts in future (aka bruteforce option).

> Do you mean attacks against the web server?
> 
> Automated web probes attempting to exploit various security flaws are,
> I'm afraid, completely normal nowadays.  The good news is that most of
> the probe attempts are aimed at other operating systems, and could never
> work on FreeBSD.  Even so, you should take care to apply any available
> security patches promptly.  Unfortunately there aren't many good ways to
> automatically block bruteforce attacks against web applications -- too
> many different ways of implementing passwords in different web apps.
> Use good passwords basically.
> 
>> 2. I use SSH to sonnect to server and work on it! Is that secure?
> 
> On the other hand, do you mean attempts to bruteforce attacks against
> ssh?  Again, this is unfortunately normal on the web nowadays.
> 
> Yes, ssh is generally secure.  It's certainly better than alternative
> means of remote access.
> 
> If you have good passwords on your accounts, the chances of any attacker
> being able to guess what they are is actually very remote.  So no need
> to run about in a complete panic.  Take your time to read up on the
> possible solutions and implement what works best for you.
> 
> One very simple means you can use to make it completely impossible for
> any attacker to bruteforce an ssh password on you machine is to use key
> based authentication instead: no passwords means no possibility of them
> being guessed.  This will not stop bruteforce /attempts/ -- they are
> usually done entirely automatically -- and the traces will still clog up
> your log files, but you can safely ignore them.
> 
> This is a perennial topic on this list -- search the archives for many,
> many reiterations of people giving realms of good advice about what to
> do to defend yourself.
> 
>> 3. How to setup SAMBA on server?! I want my users to be able to upload files
>> and download files from their folder. Users use windows.
> 
> Well, install the one of the samba ports -- net/samba34 is probably your
> best bet -- and read the very good documentation that comes with it.
> 
> 	Cheers,
> 
> 	Matthew
> 
> - -- 
> Dr Matthew J Seaman MA, D.Phil.                   7 Priory Courtyard
>                                                   Flat 3
> PGP: http://www.infracaninophile.co.uk/pgpkey     Ramsgate
>                                                   Kent, CT11 9PW
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG/MacGPG2 v2.0.14 (Darwin)
> Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
> 
> iEYEARECAAYFAkvrlTQACgkQ8Mjk52CukIzQWwCePA1dH42HG4DH+yI9wkrUOXrq
> M2IAn1B19pICPnD6F47CPYDXQptq4Aad
> =dCkW
> -----END PGP SIGNATURE-----
> _______________________________________________
> freebsd-questions@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-questions
> To unsubscribe, send any mail to "freebsd-questions-unsubscribe@freebsd.org"
> 




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4BEBD41F.1080703>