Installing Linux
Post-Install
The system is installed: now what?
We’re not done yet
We need to:
Users and Groups
Why is this important?
Users and Groups from a Security Standpoint
Almost all hardware/kernel protections are negated if the root user is compromised
Making Users
Managing Users
Making and Managing Groups
Managing privileges for your user
You don’t want to run everything as the root user, because this is insecure, but you also want to be able to run some things as root. How can we manage this without having to log in as root every time you want to run something?
/etc/sudoers
sudoers file - only edit through commands like `visudo`, because broken syntax will brick your system
Add your user/group to sudoers to give them the ability to escalate privileges through the “sudo” (superuser do) command
User/Group Takeaways
DON’T JUST PREPEND “SUDO” IF SOMETHING FAILS
(Advanced) - Extended Filesystem Stuff
Managing Secure Access
You’ve set up users and groups, now you need to manage remote access for those users. i.e. Secure Shell
Lots of ways to authenticate to SSH: password, SSH keys, GSSAPI (Kerberos) etc. By default, sshd will allow login for any user on the machine, including root
This could be dangerous - if a user has a weak password on an internet-facing system, especially if the root user is insecure, than the entire system can be compromised
Authentication and /etc/ssh/sshd_config
We edit /etc/ssh/sshd_config to fix some of these issues
Live Demo - make your SSH keys
Host <user>.decal.xcf.sh� User <user>� IdentityFile ~/.ssh/id_rsa
Reducing SSH Attack surface
Firewall Config
Filesystem hierarchy
Filesystem hierarchy, continued
Filesystem hierarchy, continued, continued
Basic Utilities
You might want to install some useful programs:
decal.ocf.io/signin
Magic word is Dijkstra