Hardening your Pinebook Pro - Printable Version +- PINE64 (https://forum.pine64.org) +-- Forum: Pinebook Pro (https://forum.pine64.org/forumdisplay.php?fid=111) +--- Forum: Linux on Pinebook Pro (https://forum.pine64.org/forumdisplay.php?fid=114) +--- Thread: Hardening your Pinebook Pro (/showthread.php?tid=8302) Pages:
1
2
|
RE: Hardening your Pinebook Pro - e-minguez - 11-25-2019 I think one of the best improvements with regards security would be to deliver images with disk encryption enabled. The password can be a default one then force users to change it... RE: Hardening your Pinebook Pro - Arwen - 11-25-2019 @e-minguez, Lets make it clear to others, full disk encryption is "at rest". Meaning if an attacker / cracker gets in via network while the Pinebook Pro is booted, the full disk encryption does nothing to stop them from copying / damaging any file they can. (What I mean by any file they can, is if they got in as a normal user, they can only copy / damage files a normal user has access to.) While I intend to use root OS encryption as well as swap encryption, normal hardening attempts to prevent remote access. Far more common loss of data compared to physical theft today. Last, full disk encryption does not stop someone with physical access to the computer, (even if powered off), if they have the password. Or can guess it. (And in the case of hostile govenment agents, beat it out of the owner.) RE: Hardening your Pinebook Pro - Arwen - 12-07-2019 One other thing that probably should be done, is re-create the host SSH keys. SSH host keys should be unique per host. From what I can tell, the default Debian comes with host SSH keys already created from July 11, 2019; Code: # ls -l ssh_host_* Here is how to do it. As user "root", simply run the following commands. If you like, you can put the hostname in the comment, like "MyHost rsa hostkey". Code: cd /etc/ssh RE: Hardening your Pinebook Pro - ElektromAn - 12-09-2019 Maybe there is a "bug" in the default debian image. Normally host keys are generated at first boot with a clean image aka without *any* hostkeys. Also please disable PAM in sshd.config, (I don't trust PAM modules) after you have copied your pubkeys on your computer. |