this post was submitted on 19 Apr 2025
5 points (77.8% liked)

cybersecurity

4045 readers
18 users here now

An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!

Community Rules

Enjoy!

founded 2 years ago
MODERATORS
 

I have been looking at hardening *nix servers for my lab and maybe carry some of that over to work. CIS benchmarks are something I like doing but that's barely scratching the surface. What do you do for your servers?

I have Lynis, systemd-analyze, Kernel self protection in mind but I'd love to hear your thoughts. Bonus points for the most paranoid setups!

you are viewing a single comment's thread
view the rest of the comments
[–] iii@mander.xyz 3 points 5 days ago (2 children)

Port knocking is a cool technique

[–] HorreC@lemmy.world 3 points 5 days ago

I have used this with second port for handshake (with no info in heading and 20 second times) and then the final port opens with key exchanged from handshake.

[–] Cyber@feddit.uk 2 points 5 days ago (1 children)

Would you use that on internal LAN connections or only external internet facing connections? I'm not aware (not checked) if any firewalls support it... not sure why?

[–] iii@mander.xyz 3 points 5 days ago* (last edited 5 days ago) (1 children)

With knockd you can execute arbitrary commands upon a port knocking sequence. So any application that is configurable via terminal is eligible. Here's a tutorial of knockd+iptables (1). Alternativly there's (2) that achieves the same effect in a different way.

You can use it wherever, as part of security in depth. It's essentially a pre-shared secret.

It'll have it's largest effect on publicly facing interfaces. It does not replace having a proper ssh setup (disabling root, disabling password login, etc).

[–] Cyber@feddit.uk 2 points 4 days ago

Thanks for the links, I'll take a look as I've never actually played with port knocking.