The passfile is located in the same directory (ie. /usr/local/svn/test) and contains my users in the format:
[users]
harry = harryssecret
sally = sallyssecret
I then run my checkouts like so:
svn checkout svn://mysite.com:7126/test
Now my question is how secure is this. I was tempted to use svn+ssh but I couldn't seem to figure out how to get it configured. Is the protection I have adequate? How easily can this be compromised? What steps should I take to lock it down further. Can I limit the connection to SVNSERVE to only come from certain specific IP's... similar to how apache does:
Order deny,allow
deny from all
allow from 192.153.123.12
when I get a dedi server for shared hosting. I secure it as much as i can and then just incase I miss stuff etc I hire 2 other companys to check over everything. Since I bought a vps from fsckvps are there any guides to secure and optimize a vps other then the one located in the vps section? thanks. I Dont feel like spending 50+ dollars on securing a vps that costs less then 15 a month.
How secure is my VPS? Anyone who has some free time and is reading this thread could please try to do some penetration-testing or something related (I really do not know much about network security) in order to know if my server configuration could be the problem?
Do you find any way to download the full database without login on the system (cPanel or phpMyAdmin)?
I have an application that requires a Secure FTP connection to a server to work. I am having trouble connecting to one server, a windows based server, while the CentOS Linux server is working fine.
Does anyone know where I can find test Secure FTP locations so I can determine if the issue is with misconfiguration or with an incompatibility of the program with windows Secure FTP sites?
I am able to connect to both sites using WinSCP and choosing Secure FTP.
Check out this blog and suggest what thing more can be added to secure the vps and i think this information database can be helpful for newbies and intermediate users which like to secure the VPS.. which sometimes exploited due to bad scripts.
Ive been using Dreamhost for years and there great however, One of my clients needs has drastically changed and they are now required to comply with the Data Protection Act.
In particular this bit make Dreamhost a bit of a no go due to them being in California:
"Personal information may not be transmitted outside the EEA unless the individual whom it is about has consented or adequate protection is in place, for example by the use of a prescribed form of contract to govern the transmission of the data."
Unless my client goes and asks all 1000+ customers they are kinda in a bit of a quandary. So here's what im looking for:
Secure UK Datacenter, eg Easynet, Blue Square etc 128mb RAM, 256mb Burstable, 20GB storage, 500GB transfer LAMP Environment Support within Business Hours Control Panel
What would be the most secure free CMS at the moment? I ask this because im looking to setup a website, and i dont have enough money to invest in a custom coded website, so to start out with ill use a free CMS, but i dont want to be hacked.
Now i know that because the CMS's are open source, they can still be hacked, what im looking for is something that is the most secure, preferably with sql injection protection.s?
I am looking for antivirus under linux like f-secure scanning php shell files scripts but free i am facing many problems here from these shell files ....
recently I got a VPS from cheapvps.co.uk and so far so good. Im getting used to the VPS enviroment. I tried to follow several guides about how to secure with noexec and nosuid the /tmp and /var/tmp and it did not work.
in http : / / www . webhostingtalk .com/showthread.php?t=474681&highlight=tmp points it must be done from the hosting. Same is said in http : // kb . swsoft . com/article_130_648_en.html.
I asked the hosting to do it and they told me as I got an Unmanaged VPS they cant do it for me.
Do anyone know how can be done ? I dont want to use tmpfs as it uses main memory.
In terms of the secure domain, if I had a secure site and wished to access some information on a web page that was from a NON-SECURE domain or at least duplicate the non secure information on to the secure page, does the user need to click acknowledge buttons to go in and out of the secure areas? Can I copy or transfer information [eg goggle search results] onto the secure page without this necessity?
My requirements are 500MB, 5GB bandwidth, rails and postgres, $5-6 per month. It looks like there are many providers out there that are offer that.
However the only uploading method shared hosters seem to offer - or at least the only method they advertise - is FTP. Coming from a university and sysadmin background, I thought that anything that sends passwords over the wire unencrypted had died long ago (except HTML forms and legacy systems).
Are there any shared hosting services that allow a more secure upload method (e.g. scp, rsync-over-ssh, even webdav-over-ssl)?
am getting this repeated error line in in log/secure
Quote:
Jun 7 18:19:38 host sshd[15751]: warning: /etc/hosts.allow, line 7: can't verify hostname: getaddrinfo(ev1s-209-85-4-32.ev1servers.net, AF_INET) failed Jun 7 18:19:38 host sshd[15752]: Connection closed by 209.85.4.32
here is my host.allow:
Quote:
# # hosts.allow This file describes the names of the hosts which are # allowed to use the local INET services, as decided # by the '/usr/sbin/tcpd' server. #
all we know that perl language its using in alot of scripts and alot of system admins stop it why this why u dont try stopp the problems from it and make ur client have perl to used it in scripts lets try this if some one need to see passwd he will do cat /etc/passwd what about make this chmod 700 /bin/cat and he will used wget to get files what about this chmod 700 /usr/bin/wget and lynx what about chmod 700 /usr/bin/lynx in this case we make root only can using this commands any system admin sure know now the idea and he can use it as he want ,, this secured method not only in perl its in another programing language put i give this as a clear exampel.
my server hacked for tow time in less than one month (both times they were similar to each other), and my previous securing company work on my server in previous hack but the server hack again!
anybody can work on my server? this is very URGENT because my server and all of our sites are down!
I'm building an ASP.NET 2.0 web app on a shared hosting plan. It looks like I have two good places to store my database. One is the App_Data folder that my .NET training tells me is the place to store databases. However, like many shared hosting plans I have a directory above the publicly accessible webroot folder with serves as my application root. Right next to my webroot folder is a databases folder which my web host apparently sets up as a default location for databases. So which is more secure? My App_Data folder? Or a "sibling" folder to my webroot?
If it matters, I have an Access .mdb, which I may upgrade to a SQL server .mdf.
so while we all obsess over hardening our servers against sophisticated hacking attempts, how many of us consider the security of our own host's control panel?
Just today i'd forgotten my login for my host's helpdesk. I couldn't find their password recovery form, so i opened their public support chat and asked support for a link to their password recovery form. Apparently they didn't have a password recovery form. Here is the chat transcript:
Support: Hello Tom: Hi, where is your password recovery form for the helpdesk? Support: How may i help you? Tom: Did you see my message? Support: Yes Support: Let me know your email address Tom: [REMOVED] Support: Okay Let me check Support: Your new password is [REMOVED]
So, the only think really stopping someone from logging into my helpdesk and posting a server cancellation ticket is a little bit of research to find my email address and a traceroute to find my host.
May 16 16:00:32 server Cp-Wrap[6322]: Pushing "32121 GETDOMAINIP user.com " to '/usr/local/cpanel/bin/apacheadmin' for UID: 32121 May 16 16:00:32 server Cp-Wrap[6322]: CP-Wrapper terminated without error May 16 16:00:32 server Cp-Wrap[6325]: Pushing "32121 LISTSUBDOMAINS 0 " to '/usr/local/cpanel/bin/apacheadmin' for UID: 32121 May 16 16:00:32 server Cp-Wrap[6325]: CP-Wrapper terminated without error May 16 16:00:32 server Cp-Wrap[6328]: Pushing "32121 LISTMULTIPARKED 0 " to '/usr/local/cpanel/bin/apacheadmin' for UID: 32121 May 16 16:00:32 server Cp-Wrap[6328]: CP-Wrapper terminated without error May 16 16:00:32 server Cp-Wrap[6330]: Pushing "32121 COUNTDBS" to '/usr/local/cpanel/bin/mysqladmin' for UID: 32121 May 16 16:00:33 server Cp-Wrap[6330]: CP-Wrapper terminated without error May 16 16:00:33 server Cp-Wrap[6333]: Pushing "32121 LISTDBS" to '/usr/local/cpanel/bin/postgresadmin' for UID: 32121 May 16 16:00:33 server Cp-Wrap[6333]: CP-Wrapper terminated without error May 16 16:00:33 server Cp-Wrap[6338]: Pushing "32121 GETDISK" to '/usr/local/cpanel/bin/mysqladmin' for UID: 32121 May 16 16:00:33 server Cp-Wrap[6338]: CP-Wrapper terminated without error May 16 16:00:33 server Cp-Wrap[6342]: Pushing "32121 LIST 0 0 " to '/usr/local/cpanel/bin/ftpadmin' for UID: 32121 May 16 16:00:33 server Cp-Wrap[6342]: CP-Wrapper terminated without error
I see that one of the most important things nowadays is the security of our servers.
I would like to know from people here that are running big and small servers what they have done to secure their servers. What tips, what softwares they have used, which applications using and are more secure than others.. generally everything that could make good in the protection and security of our servers.
Even if you asked helped from a company doing that work, what changes they have done to your servers? which options they changed?
I am making this thread so as to collect all info we know in one place.. One knows about that tip.. the other one knows another tip.. having all of them somewhere could make a tremendous difference..
Moderators please dont move that thread in any software discussion or other forum as this is one of the most active ones and also has instant relation with the dedicated servers we buy.
I have a friend that works in the IT. He is about to start his own business, something in the line of network connection or something like that. I was telling him that I'm planning on getting my own dedicated server but that I have no idea how to secure the server. He told me that most linux desitributions come with their own build in firewall and that I don't need to worry about security. He told me to just ask my dedicated server provider to make sure the firewall is enabled and that's it. When he told me that I thought to myself, either this guy has no idea what he's talking about, or those guys at Webhostingtalk have no idea what they are talking about!