Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for Hardening OpenBSD Internet Servers

OpenBSD Hardening OpenBSD Internet Servers
Post date: April 11, 2006, 18:04 Category: Security Views: 36
Tutorial quote: This tutorial on how-to harden or improve security on OpenBSD Internet servers includes sections that apply to any UNIX system. Hardening is making a computer more secure by removing unneeded functions, restricting access and tracking changes and processes. It was revised to cover OpenBSD 3.0 on Dec. 15, 2001 and includes an overview of the 2.9 to 3.0 changes. A new page on priorities ranks the value of the techniques presented here. Familiarity with UNIX system administration but not OpenBSD is assumed.
OpenBSD Using OpenBSD
Post date: April 26, 2006, 10:04 Category: Miscellaneous Views: 24
Tutorial quote: Many people responded to the call for OpenBSD and OpenSSH donations by purchasing an OpenBSD CD set. Those CDs are beginning to arrive in the mail, and when they do, how are you going to use them? If you're a software enthusiast who has never used OpenBSD before, you might enjoy installing it by yourself and figuring it out as you go. If, however, you're looking for a more practical approach to using OpenBSD as a desktop or server operating system, here's a guide to get you started.
OpenBSD Failover Firewalls with OpenBSD and CARP
Post date: April 27, 2005, 22:04 Category: Network Views: 231
Tutorial quote: Firewalls are a required component in commercial and residential computer networks. For many installations, the firewall is a single point of failure between client systems and external resources. It can also become a liability when hardware or applications fail, leaving potential customers unable to reach your servers. A properly designed and executed failover configuration for your primary firewall will address many of these concerns. This article introduces a proven method for installing redundant stateful firewalls using native OpenBSD features.
OpenBSD Apache - Serving up the Web
Post date: April 11, 2006, 18:04 Category: Network Views: 19
Tutorial quote: The Apache Web Server is installed as part of the OpenBSD base system. This guide will help you configure the web server: (Apache 1.3.12 is released with OpenBSD 2.7 and 1.3.9 with OpenBSD 2.6)

To see how configurable the Apache/OpenBSD combination is we also look at allowing administrators to remotely review the server's status, we setup the system so we allow users on our system to have their own personal web-space. Of course, for the security counscious you probably want to turn some of these things off after you get things up and running.
OpenBSD Quickly installing OpenBSD 3.3
Post date: May 1, 2005, 13:05 Category: Installing Views: 109
Tutorial quote: This article goes through the steps of an OpenBSD 3.3 installation. The installer is a text-based interface and, in most cases, is quick and easy to complete.
Unix+clones Wikipedia Content on Dict
Post date: December 31, 2005, 14:12 Category: Network Views: 71
Tutorial quote: Dict is a dictionary client program that retrieves information from dictd servers hosted locally or from many free dictd servers on Internet.Though originally designed for online dictionary networks, it can be used to get other information like wildly popular wikipedia servers.
OpenBSD Creating secure wireless access points with OpenBSD and OpenVPN
Post date: December 13, 2005, 13:12 Category: Network Views: 108
Tutorial quote: You know how insecure 802.11x wireless networks are. In this article we'll create an OpenBSD-based secure wireless access point that prevents unauthorized access and encrypts every packet using a VPN tunnel. OpenBSD is one of the most secure operating systems available, is easy to use, and includes almost everything you need for this project in the base installation.
OpenBSD Rebuilding the OpenBSD kernel
Post date: April 24, 2005, 16:04 Category: System Views: 93
Tutorial quote: Users who want their OpenBSD machine to perform specific functions or need additional device drivers might want to customize their kernel. In other OS's, like some types of Linux, it is very popular to rebuild the kernel because the default is so bloated. For most users, the default OpenBSD kernel is sufficient; however, you should still apply kernel patches, which will require rebuilding and installing a fresh kernel.
Linux Building a Linux virtual server
Post date: June 9, 2005, 10:06 Category: Software Views: 118
Tutorial quote: With the explosive growth of the Internet, the workload on servers providing Web, email, and media services has increased greatly. More and more sites are being challenged to keep up with the growing demands and are employing several techniques to avoid overloading their servers. Building a scalable server on a cluster of computers is one of the solutions that is being effectively put to use. With such a cluster, the increasing requests can be easily managed by simply adding one or more new servers to the existing cluster as required. In this article we will look at setting up one such scalable, network load-balancing server cluster using a virtual server via the Linux Virtual Server Project.
Linux Hardening Linux: a 10 step approach to a secure server
Post date: June 22, 2005, 06:06 Category: Security Views: 156
Tutorial quote: The Internet has become a far more dangerous place than it was 20 years ago. Nowadays, Operating System and application security is an integral part of a server configuration and, while firewalls are very important, they are not the panacea.

This list of steps is intended as a guideline with a practical approach. We’ll try to provide a complete picture without getting into unnecesary details. This list won’t replace a good book on secure systems administration, but it will be useful as a quick guide.

Before we get started it’s worth to mention that security is not a status: it’s just a process. The correct initial setup of the server only provides a good start and helps you get half the way through. But you actually need to walk the other half of the road, by providing proper security vigilance, monitoring and updating.