Background: 15 years of experience in software and apparently spoiled because it was already set up correctly.

Been practicing doing my own servers, published a test site and 24 hours later, root was compromised.

Rolled back to the backup before I made it public and now I have a security checklist.

  • Tablaste@linux.communityOP
    link
    fedilink
    English
    arrow-up
    0
    ·
    edit-2
    7 months ago

    I published it to the internet and the next day, I couldn’t ssh into the server anymore with my user account and something was off.

    Tried root + password, also failed.

    Immediately facepalmed because the password was the generic 8 characters and there was no fail2ban to stop guessing.

            • steventhedev@lemmy.world
              link
              fedilink
              arrow-up
              0
              ·
              7 months ago

              Many cloud providers (the cheap ones in particular) will put patches on top of the base distro, so sometimes root always gets a password. Even for Ubuntu.

              There are ways around this, like proper cloud-init support, but not exactly beginner friendly.

            • satans_methpipe@lemmy.world
              link
              fedilink
              arrow-up
              0
              ·
              edit-2
              7 months ago

              Yeah I was confused about the comment chain. I was thinking terminal login vs ssh. You’re right in my experience…root ssh requires user intervention for RHEL and friends and arch and debian.

              Side note: did you mean to say “shot themselves in the root”? I love it either way.