Language Selection

English French German Italian Portuguese Spanish

Build a Secure Web Server with Mandriva 2005 LE

Filed under
MDV
HowTos

In this build, like the last one, we are going to gear our server towards dynamic content. That doesn't mean that static sites can't be run from this server. We'll once again build a LAMP (Linux Apache MySql Php) driven site. Since things like blogging and PHP-Nuke are so popular this server will be just the ticket. Imagine not having to pay hosting fees for your site anymore. It's a great thing!! This build is even more secure then the last one, and it was pretty tight.

We'll start by obtaining the Official Media which is "Mandriva Limited Edition 2005". There are updated versions for the club members that contain updated versions of some softwares but none of those will be used here. The updates pertain to desktop apps. Besides we want to stick with the officially supported software from Mandriva. It will receive all patches and security updates whereas the club versions will not.

Let's insert the first CD and configure the BIOS to boot from the CD-Rom. We are going to cover the Differences from the Workstation build only. So the first difference is the security level. When you get to this screen be sure to pick "Paranoid". This will set us up a "Chain-Rooted" configuration. What does that mean??? Well it will secure certain directories and also include a whole host of security checks to keep our server up to snuff on the security side of things. It also shuts down all ports and installs Shorewall firewall. Of course we'll tighten it down even further!! Here is the Screenshot.

Our next page of concern after Security is the "Partitioning" screen. The only word I have here is that Mandriva puts the Sql data and the Web root in the /var directory so be sure to make the /var directory large enough to handle your sites along with their respective databases. You can experiment with the partitioning tool and configure it just the way you like. I make my /var directory anywhere from 4-15 Gig depending on how many and how complex the websites are that the machine will be serving. To put things into perspective....LinuxLoader is now just over 1 year old and its at about 250Mb including its database. For our example build I made the /var about 10G. Since /home really won't contain much data, make it small. Here is our example server.

Full Article.

More in Tux Machines

Opera Data Breach, Security of Personal Data

  • Opera User? Your Stored Passwords May Have Been Stolen
    Barely a week passes without another well-known web company suffering a data breach or hack of some kind. This week it is Opera’s turn. Opera Software, the company behind the web-browser and recently sold to a Chinese consortium for $600 million, reported a ‘server breach incident’ on its blog this weekend.
  • When it comes to protecting personal data, security gurus make their own rules
    Marcin Kleczynski, CEO of a company devoted to protecting people from hackers, has safeguarded his Twitter account with a 14-character password and by turning on two-factor authentication, an extra precaution in case that password is cracked. But Cooper Quintin, a security researcher and chief technologist at the Electronic Frontier Foundation, doesn’t bother running an anti-virus program on his computer. And Bruce Schneier? The prominent cryptography expert and chief technology officer of IBM-owned security company Resilient Systems, won’t even risk talking about what he does to secure his devices and data.

Android Leftovers

FOSS and Linux Events

  • On speaking at community conferences
    Many people reading this have already suffered me talking to them about Prometheus. In personal conversation, or in the talks I gave at DebConf15 in Heidelberg, the Debian SunCamp in Lloret de Mar, BRMlab in Prague, and even at a talk on a different topic at the RABS in Cluj-Napoca.
  • TPM Microconference Accepted into LPC 2016
    Although trusted platform modules (TPMs) have been the subject of some controversy over the years, it is quite likely that they have important roles to play in preventing firmware-based attacks, protecting user keys, and so on. However, some work is required to enable TPMs to successfully play these roles, including getting TPM support into bootloaders, securely distributing known-good hashes, and providing robust and repeatable handling of upgrades. In short, given the ever-more-hostile environments that our systems must operate in, it seems quite likely that much help will be needed, including from TPMs. For more details, see the TPM Microconference wiki page.
  • More translations added to the SFD countdown
    Software Freedom Day is celebrated all around the world and as usual our community helps us to provide marketing materials in their specific languages. While the wiki is rather simple to translate, the Countdown remains a bit more complicated and time consuming to localize. One needs to edit the SVG file and generate roughly a 100 pictures, then upload them to the wiki. Still this doesn’t scare the SFD teams around the world and we are happy to announce three more languages are ready to be used: French, Chinese and German!

Second FreeBSD 11.0 Release Candidate Restores Support for 'nat global' in IPFW

Glen Barber from the FreeBSD project announced the availability of the second RC (Release Candidate) development build of the upcoming FreeBSD 11.0 operating system. Read more