LinuxQuestions.org
Visit Jeremy's Blog.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 04-21-2021, 11:37 PM   #1
hifi100
Member
 
Registered: Sep 2016
Location: India
Distribution: Arch Linux
Posts: 357

Rep: Reputation: Disabled
How to achieve maximum possible security under Linux ?


I am paranoid about security. I had some discussions on the web about this topic. Some people told me to use BSD coz they think its more secure. I tested GhostBSD but unfortunately my bluetooth is not supported.

Lots of people kept saying "it depends on the user". I am tired of listening to that sentence.

I tried to install qubes os but unfortunately my hardware is not supported.

To keep my Linux distro secure I do 3 things :

1)I have enabled ufw
2)I run network facing apps like Firefox, Hexchat, Brave inside a firejail sandbox.
3)I install updates as soon as they are offered.

Frankly I don't know what else to do.

What do you think ? Is there any other step I should take ?
 
Old 04-22-2021, 01:16 AM   #2
pan64
LQ Addict
 
Registered: Mar 2012
Location: Hungary
Distribution: debian/ubuntu/suse ...
Posts: 22,022

Rep: Reputation: 7343Reputation: 7343Reputation: 7343Reputation: 7343Reputation: 7343Reputation: 7343Reputation: 7343Reputation: 7343Reputation: 7343Reputation: 7343Reputation: 7343
Quote:
Originally Posted by hifi100 View Post
I am paranoid about security. I had some discussions on the web about this topic. Some people told me to use BSD coz they think its more secure. I tested GhostBSD but unfortunately my bluetooth is not supported.
So bluetooth is more important than your security?

Quote:
Originally Posted by hifi100 View Post
I tried to install qubes os but unfortunately my hardware is not supported.
Installing software is not enough you need to configure and maintain them continuously.

Quote:
Originally Posted by hifi100 View Post
To keep my Linux distro secure I do 3 things :
1)I have enabled ufw
2)I run network facing apps like Firefox, Hexchat, Brave inside a firejail sandbox.
3)I install updates as soon as they are offered.
Why don't you install a scanner (like clamav - if you are paranoid)?

Quote:
Originally Posted by hifi100 View Post
Lots of people kept saying "it depends on the user". I am tired of listening to that sentence.
In that case you are lost. What do you think how can it be accomplished? The admin should maintain the system, apply [vulnerability] patches, configure daemons, services, follow the news .....
If you won't do that your system will not be secure.

Quote:
Originally Posted by hifi100 View Post
Frankly I don't know what else to do.

What do you think ? Is there any other step I should take ?
remove/disable all the services you do not need.
if you are really paranoid just disconnect it from the net.

Last edited by pan64; 04-22-2021 at 01:39 AM.
 
1 members found this post helpful.
Old 04-22-2021, 01:25 AM   #3
//////
Member
 
Registered: Nov 2005
Location: Land of Linux :: Finland
Distribution: Arch Linux && OpenBSD 7.4 && Pop!_OS && Kali && Qubes-Os
Posts: 824

Rep: Reputation: 350Reputation: 350Reputation: 350Reputation: 350
if you are concerned about security, maybe install maldet / antivirus / small footprint distro, like arch / hardened kernel / suricata in IPS mode , thats what comes to my mind.
 
1 members found this post helpful.
Old 04-22-2021, 01:43 AM   #4
ondoho
LQ Addict
 
Registered: Dec 2013
Posts: 19,872
Blog Entries: 12

Rep: Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053
Quote:
Originally Posted by hifi100 View Post
I am paranoid about security. (...) I tested GhostBSD but unfortunately my bluetooth is not supported.
Do your research until you understand how ridiculous that statement is.
 
Old 04-22-2021, 01:55 AM   #5
hifi100
Member
 
Registered: Sep 2016
Location: India
Distribution: Arch Linux
Posts: 357

Original Poster
Rep: Reputation: Disabled
Quote:
Originally Posted by pan64 View Post
So bluetooth is more important than your security?


Installing software is not enough you need to configure and maintain them continuously.


Why don't you install a scanner (like clamav - if you are paranoid)?

In that case you are lost. What do you think how can it be accomplished? The admin should maintain the system, apply [vulnerability] patches, configure daemons, services, follow the news .....
If you won't do that your system will not be secure.



remove/disable all the services you do not need.
No bluetooth is not more important than security but the thing is I watch movies using my desktop & I use a bluetooth headphone for that. I simply can't avoid using bluetooth.

I install updates as soon as they are released.

I read that clamav scans for Windows viruses. I use only Linux. I don't a single Windows PC at home. So I didn't install clamav.

I don't any services enabled. No ssh, nothing. All ports are closed. I have tested with nmap.

Quote:
Originally Posted by ondoho View Post
Do your research until you understand how ridiculous that statement is.
Thanks for that. I didn't know that bluetooth is such a security mess. What if I only use bluetooth when I need to use my headphone & physically remove the usb bluetooth dongle when I don't need bluetooth connectivity ? Is that a sensible idea ?

Edit : I found that I can disable bluetooth (please see attachment) Will this improve security ?
Attached Thumbnails
Click image for larger version

Name:	disabled bluetooth.png
Views:	16
Size:	11.6 KB
ID:	36198  

Last edited by hifi100; 04-22-2021 at 02:07 AM.
 
Old 04-22-2021, 01:06 PM   #6
ondoho
LQ Addict
 
Registered: Dec 2013
Posts: 19,872
Blog Entries: 12

Rep: Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053
^ Thanks for not reacting to my obnoxiousness.
Quote:
Originally Posted by hifi100 View Post
I found that I can disable bluetooth (please see attachment) Will this improve security ?
Yes, to some extent. Frankly, I have not researched if disabled bluetooth devices are still potentially reachable from the outside. But then, I'm not "paranoid about security".

My logic tells me that a disabled bluetooth receiver is a smaller security risk than an enabled one, and that a hard disabled bluetooth receiver is a smaller security risk than a soft disabled one.
 
Old 04-22-2021, 04:29 PM   #7
Bonzoo
Member
 
Registered: Sep 2018
Location: Costa Rica
Distribution: Antix21a2,Parrot rolling,MXfce19.4,Sparky Openbox
Posts: 233

Rep: Reputation: 48
Xanax is decent.....relax bro.
 
Old 04-22-2021, 04:38 PM   #8
leclerc78
Member
 
Registered: Dec 2020
Posts: 169

Rep: Reputation: Disabled
Trust me, but they can turn on anything in my house except the ones that are connected to a power bar
(in the off position).
 
Old 04-22-2021, 04:43 PM   #9
wpeckham
LQ Guru
 
Registered: Apr 2010
Location: Continental USA
Distribution: Debian, Ubuntu, RedHat, DSL, Puppy, CentOS, Knoppix, Mint-DE, Sparky, VSIDO, tinycore, Q4OS, Manjaro
Posts: 5,749

Rep: Reputation: 2757Reputation: 2757Reputation: 2757Reputation: 2757Reputation: 2757Reputation: 2757Reputation: 2757Reputation: 2757Reputation: 2757Reputation: 2757Reputation: 2757
I use the military model. The only machine I need fully secure is in a locked room, on filtered power, with no network, and a guard on the door. Actually I skip one step, if it was really military there would be someone monitoring that guard remotely. I am not that paranoid.


Anything less than that is a compromise. I am not the one who can tell you what you are using your machine for, what data you should or should not have on that machine, or what connections you should allow or accept to that machine to use or protect that data. When I DO that kind of thing, I start with a lot of business, procedure, threat, and operational data before I even make a suggestion, and I get paid. A LOT!


What kind of data do you have that you consider at risk? How do you use your machine that might open that data to unauthorized access? What is the real level of risk and how can you adjust to reduce that risk.

Don't answer those questions for ME, consider them yourself. You need to decide what your level of real risk is and how much inconvenience you are willing to live with to control that risk. And THAT is why you keep getting that advice you so hate. It is the shortest way to say the real best answer.
 
Old 04-22-2021, 05:34 PM   #10
SW64
Member
 
Registered: May 2014
Distribution: Slackware
Posts: 262

Rep: Reputation: 123Reputation: 123
Quote:
Originally Posted by hifi100 View Post
but the thing is I watch movies using my desktop & I use a bluetooth headphone for that. I simply can't avoid using bluetooth.
A wired headphone is not an option here?
 
Old 04-22-2021, 06:20 PM   #11
jefro
Moderator
 
Registered: Mar 2008
Posts: 22,014

Rep: Reputation: 3630Reputation: 3630Reputation: 3630Reputation: 3630Reputation: 3630Reputation: 3630Reputation: 3630Reputation: 3630Reputation: 3630Reputation: 3630Reputation: 3630
I think you have two options. The isolated Crypto room special hardware inside a special room. Have no device enter or leave. No connection except filtered power.

The other option is to learn and use as many best practices as you can.
https://www.cyberciti.biz/tips/linux-security.html

Starting with a base may help. https://en.wikipedia.org/wiki/Securi...erating_system


Hackers get control by physical and external.

You limit the server to the very minimum needed to do tasks. From zero extra installed programs to zero services to the users with the most minimum permissions.
 
1 members found this post helpful.
Old 04-27-2021, 05:44 PM   #12
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 10,679
Blog Entries: 4

Rep: Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947
"Security is a process." Exactly what "threat vectors" are you attempting to guard against in your present situation? Start from there.

Of course ... I presume that "your regular user account" is not "an Administrator" ... that is to say, a member of the wheel group. Of course. Of course it isn't ...? Which means that "rogue software," operating in your name but without your knowledge nor consent, could not permanently damage your system, no matter how hard they tried?

Last edited by sundialsvcs; 04-27-2021 at 05:45 PM.
 
1 members found this post helpful.
Old 04-27-2021, 06:26 PM   #13
wpeckham
LQ Guru
 
Registered: Apr 2010
Location: Continental USA
Distribution: Debian, Ubuntu, RedHat, DSL, Puppy, CentOS, Knoppix, Mint-DE, Sparky, VSIDO, tinycore, Q4OS, Manjaro
Posts: 5,749

Rep: Reputation: 2757Reputation: 2757Reputation: 2757Reputation: 2757Reputation: 2757Reputation: 2757Reputation: 2757Reputation: 2757Reputation: 2757Reputation: 2757Reputation: 2757
There are several distributions that allow (and two that enforce) operation of all software in containers. It is horribly inefficient on space, and slightly less fast, but anyone using an application vector to attack finds themselves locked within a container that only exists until the application (and its container) close.

That only helps slightly if you bypass the protections and fire up a browser at host level and go to an insecure or compromised site. I still think it an option that someone with REASON to be paranoid should explore.
 
Old 04-28-2021, 11:46 PM   #14
ondoho
LQ Addict
 
Registered: Dec 2013
Posts: 19,872
Blog Entries: 12

Rep: Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053
Oh, another member who promised to be gone forever with much drama and fanfare (several times actually) - and now "mysteriously reappeared"...

Last edited by ondoho; 04-28-2021 at 11:48 PM.
 
1 members found this post helpful.
Old 04-29-2021, 08:54 AM   #15
wpeckham
LQ Guru
 
Registered: Apr 2010
Location: Continental USA
Distribution: Debian, Ubuntu, RedHat, DSL, Puppy, CentOS, Knoppix, Mint-DE, Sparky, VSIDO, tinycore, Q4OS, Manjaro
Posts: 5,749

Rep: Reputation: 2757Reputation: 2757Reputation: 2757Reputation: 2757Reputation: 2757Reputation: 2757Reputation: 2757Reputation: 2757Reputation: 2757Reputation: 2757Reputation: 2757
Quote:
Originally Posted by ondoho View Post
Oh, another member who promised to be gone forever with much drama and fanfare (several times actually) - and now "mysteriously reappeared"...
So, who are you talking about and how exactly has that hurt YOU? Just curious.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
[SOLVED] maximum filename lenth and maximum file size snjksh Linux - Newbie 5 07-22-2013 12:34 AM
On Linux - set maximum open files to unlimited. Possible? anishkumarv Linux - Server 7 10-21-2011 10:18 AM
How to achieve best possible sound quality? MasterOfTheWind Linux - Software 4 08-11-2006 08:39 AM
How to compile apps to achieve maximum performance? kornerr Linux - General 14 06-20-2005 02:00 PM
is it possible for me to achieve a 32 bit graphics with this hardware? spyghost Solaris / OpenSolaris 1 03-27-2004 05:21 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 12:07 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration