Console Login
Home / Blog / Server Security / Locking Down Your Linux Box: The 2009 Survival Guide for Norwegian VPS
Server Security 0 views

Locking Down Your Linux Box: The 2009 Survival Guide for Norwegian VPS

@

Linux Server Hardening: Survival Guide for 2009

I just checked the /var/log/secure file on a fresh server I provisioned three hours ago. It already has 400 failed login attempts. Welcome to the modern web. If you are running a server in 2009 without locking it down, you aren't an admin; you're a victim waiting to happen.

Whether you are hosting a high-traffic forum for a Norwegian gaming clan or a corporate portal for an oil services firm in Stavanger, the threat is the same. Automated bots don't care about your uptime—they want your bandwidth for spam relays.

Here is how we secure our infrastructure at CoolVDS, and how you should secure yours. No fluff, just the commands that keep you online.

1. SSH: The Front Door

The default SSH configuration on most Linux distributions (yes, even CentOS 5.3) is too permissive. We need to cut access to the root user immediately. If you lose your root password and allow login, it’s game over.

Open your config:

vi /etc/ssh/sshd_config

Find and change these lines:

PermitRootLogin no Protocol 2 MaxAuthTries 3

Critical: Create a standard user and give them sudo (Debian/Ubuntu) or add them to the wheel group (CentOS) before you restart SSH, or you will lock yourself out. I've seen senior sysadmins make that drive of shame to the datacenter console.

CoolVDS Pro Tip: Change your SSH port from 22 to something random, like 5522. It’s security by obscurity, which isn't perfect, but it stops 99% of the automated scripts hitting our IP ranges in Oslo.

2. iptables: The Bouncer

We don't have fancy next-gen graphical firewalls on bare Linux. We have iptables. It is robust, stateless, and efficient. If you aren't filtering packets, you are wrong.

Here is a standard "deny all, allow specific" policy. This assumes you are allowing Web (80), SSL (443), and your custom SSH port (5522).

# Flush existing rules iptables -F # Allow loopback iptables -A INPUT -i lo -j ACCEPT # Keep current connections alive iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT # Allow SSH, HTTP, HTTPS iptables -A INPUT -p tcp --dport 5522 -j ACCEPT iptables -A INPUT -p tcp --dport 80 -j ACCEPT iptables -A INPUT -p tcp --dport 443 -j ACCEPT # Drop everything else iptables -P INPUT DROP iptables -P FORWARD DROP

On CentOS, don't forget to save:

/sbin/service iptables save

3. Fail2Ban: The Automator

Even with a custom port, dedicated attackers will find you. You can't watch logs 24/7. Use Fail2Ban. It parses logs (SSH, Apache, FTP) and dynamically adds iptables rules to ban IPs that show malicious behavior.

Install it via EPEL (for CentOS) or apt (Debian). Configure the jail to ban an IP for an hour after 3 failed attempts. It saves CPU cycles because your server stops processing the handshake request entirely.

4. The Norwegian Context: Latency and Law

Security isn't just about hackers; it's about compliance. With the strict enforcement of the Personal Data Act (Personopplysningsloven) here in Norway, Datatilsynet is not forgiving about data leakage.

If you host customer data on cheap US servers, you are navigating a legal minefield regarding the Safe Harbor framework. Hosting locally in Norway simplifies compliance. Plus, the physics doesn't lie: ping times from Oslo to a server in Amsterdam might be 25ms, but to a CoolVDS server in our Oslo datacenter, it's sub-3ms via NIX (Norwegian Internet Exchange).

Why Architecture Matters

Many budget hosts use OpenVZ and oversell resources. This is a security risk—a "noisy neighbor" can destabilize your kernel. At CoolVDS, we prioritize Xen HVM virtualization. It provides true isolation. If another user creates a kernel panic, your instance keeps humming.

Feature Budget OpenVZ Host CoolVDS (Xen/KVM)
Kernel Isolation Shared (Risky) Dedicated (Secure)
Storage Slow SATA Enterprise 15k SAS / SSD RAID-10
Swap Often Unavailable Full Control

We use high-performance SAS 15k RPM drives and emerging Enterprise SSD technology in RAID-10 arrays. While standard SATA drives bottle-neck during log rotation or backups, our I/O throughput keeps your database queries instant.

5. Disable Unused Services

A default installation often includes services you don't need. Sendmail? X11? Cups (printing)? Kill them.

chkconfig sendmail off chkconfig cups off chkconfig yum-updatesd off

The fewer ports listening, the smaller your attack surface.

Final Thoughts

Security is a process, not a product. Keep your kernel updated (yum update is your friend), monitor your logs, and choose a host that respects the hardware. Don't let a compromised server destroy your reputation.

Ready to deploy on hardware that takes security seriously? Launch your hardened CoolVDS instance in Oslo today.

/// TAGS

/// RELATED POSTS

FTP is Dead: Why Smart Sysadmins in Norway are Locking Down with SFTP

Sending files via standard FTP is like shouting your password across a crowded room. Here is why you...

Read More →

Battle-Ready Linux: 7 Hardening Steps to Stop Script Kiddies Cold

It is 2009, and the internet is the Wild West. If you leave your SSH port default on a public IP, yo...

Read More →

Stop Using FTP: Securing File Transfers with Native SFTP Chroots on OpenSSH

Sending passwords over cleartext FTP is professional suicide in 2009. Learn how to implement native ...

Read More →

Linux Server Hardening: The 2009 Survival Guide for Norwegian Systems

It is not a matter of if, but when a botnet scans your IP. From configuring iptables to securing SSH...

Read More →

FTP is Dead: Why Smart Sysadmins in Norway Are Moving to SFTP (And How to Do It)

Still using plain FTP? You are broadcasting passwords in cleartext. Here is how to lock down your se...

Read More →

Hardening Linux in 2009: Stop Script Kiddies Before They Root Your Box

Default CentOS installs are a security nightmare. Learn the essential iptables rules, SSH hardening ...

Read More →
← Back to All Posts