官术网_书友最值得收藏!

Locking the root user account

The cloud is big business nowadays, and it's now quite common to rent a virtual private server from companies such as Rackspace, DigitalOcean, or Microsoft Azure. These can serve a variety of purposes, as follows:

  • You can run your own website, where you install your own server software instead of letting a hosting service do it
  • You can set up a web-based app for other people to access
  • Recently, I saw a YouTube demo on a crypto-mining channel that showed how to set up a Proof of Stake master node on a rented virtual private server

One thing that these cloud services have in common is that when you first set up your account and the provider sets up a virtual machine for you, they'll have you log in to the root user account. (It even happens with Ubuntu, even though the root account is disabled on a local installation of Ubuntu.)

I know that there are some folk who just keep logging in to the root account of these cloud-based servers and think nothing of it, but that's really a horrible idea. There are botnets, such as the Hail Mary botnet, that continuously scan the internet for servers that have their Secure Shell port exposed to the internet. When the botnets find one, they'll do a brute-force password attack against the root user account of that server. And yes, the botnets sometimes are successful in breaking in, especially if the root account is set with a weak password.

So, the first thing that you want to do when you set up a cloud-based server is to create a normal user account for yourself and set it up with full sudo privileges. Then, log out of the root user account, log into your new account, and do the following:

sudo passwd -l root

I mean, really, why take the chance of getting your root account compromised?

主站蜘蛛池模板: 郧西县| 宜良县| 尤溪县| 涟源市| 胶南市| 白朗县| 高邮市| 碌曲县| 德清县| 泽库县| 克东县| 丹凤县| 晋中市| 昆山市| 苍山县| 依安县| 石河子市| 芒康县| 昌黎县| 长子县| 平舆县| 明星| 宁海县| 鄂尔多斯市| 当阳市| 枞阳县| 教育| 南投市| 梁河县| 望江县| 赫章县| 合江县| 绥滨县| 东莞市| 淮北市| 延川县| 沅陵县| 陵水| 大足县| 镶黄旗| 巴南区|