[WITNESS server - part I] Setup & Tuning Ubuntu

in #hive2 years ago (edited)

In this first part of a series of 3 posts about setting up a Witness server we will see how to install the prerequisites and do some tuning.

Setup & Tuning Ubuntu 18.04

Hardware

  • CPU: Intel Xeon E3-1230v6 4 Cores/8 Threads 3.50 GHz
  • RAM: 32GB DDR4 ECC 2133MHz
  • HDD: 1 To SSD NVMe

How-To: Secure Ubuntu server (18.04)

Increase the security and usability of your Ubuntu server is very important. There are few configuration/install that you should take early on as part of the basic setup.

Root Login

Never use directly the user root and prefer to create a new user. For our case we will use an account named witness with sudo power

As root, run this command to add your new user

[email protected]:~$ adduser witness

The system will ask you for a password, use a secure one! (Upper, Lower, Number, Special)

Adding user `witness' ...
Adding new group `witness' (1000) ...
Adding new user `witness' (1000) with group `witness' ...
Creating home directory `/home/witness' ...
Copying files from `/etc/skel' ...
Enter new UNIX password: 

When done, you just need to fill the Full Name and to write y to validate.

Retype new UNIX password: 
passwd: password updated successfully
Changing the user information for witness
Enter the new value, or press ENTER for the default
    Full Name []: witness
    Room Number []: 
    Work Phone []: 
    Home Phone []: 
    Other []: 
Is the information correct? [Y/n] y

Not forgot to run this command to add your new user to the sudo group

[email protected]:~$ usermod -aG sudo witness

Add Public Key Authentication (SSH)

Set up public key authentication for your new user. Setting this up will increase the security of your server by requiring a private SSH key to log in.

Generate The Key Pair for SSH

If you haven’t an SSH key pair already you can create it by following this process. To generate a new key pair, enter the following command (use the option -b 4096 for higher security) in your terminal.

[email protected]:~$ ssh-keygen -b 4096

Assuming your local user is witness, you will see the following output:

Generating public/private rsa key pair.
Enter file in which to save the key (/home/witness/.ssh/id_rsa):

Hit return to accept and securing your keys with a strong passphrases!

Created directory '/home/witness/.ssh'
Enter passphrase (empty for no passphrase):
Enter same passphrase again:

At the end you will have an output like this

Your identification has been saved in /home/witness/.ssh/id_rsa.
Your public key has been saved in /home/witness/.ssh/id_rsa.pub.
The key fingerprint is:
SHA256:XXXXXXXXXXXXXXXXXXX5GcBMBXXXXXXXXXXM [email protected]
The key's randomart image is:
+---[RSA 4096]----+
|XXXX             |
|XX               |
|X X XX XXX       |
|XXX X XXX        |
|X XXXX X  XX     |
| XX XX           |
|   X             |
| X               |
|                 |
+----[SHA256]-----+

You have now 2 files in the directory /home/witness/.ssh/ a private key id_rsa and a public key id_rsa.pub

Remember that the private key id_rsa should not be given to anyone who should not have the right to access to your server!
Rename the Public Key

if you generate the keys directly on the server rename the public key id_rsa.pub in authorized_keys like this

[email protected]:~/.ssh$ sudo mv id_rsa.pub authorized_keys

And retrieve the private key id_rsa on your computer (not let it on the server!)

Putty case

Putty users, you need to load the private key id_rsa in PuTTYgen then save the private key for have it in .ppk format

Disabling Password Authentication and change the default TCP port

If you were able to login to your account using SSH with the private key then you have successfully configured SSH key-based authentication to your account. We can now remove the authentication with password only in the ssh config file (not hesitate to change also the default port number 22).

Edit the ssh config file

[email protected]:~/.ssh$ sudo vim /etc/ssh/sshd_config

Uncomment the # Port 22 line and change the number to 8022.

Port 8022

Change the value of PermitRootLogin to no

PermitRootLogin no

Change the value of PasswordAuthentication to no

PasswordAuthentication no

Save and close the file when you are finished. To actually implement the changes we just made, you must restart the service.

[email protected]:~/.ssh$ sudo service ssh restart 

Basic firewall rules

The default firewall configuration tool for Ubuntu is ufw. It’s an interface to iptables.

Allow our specific TCP port for ssh

To add our TCP port 8022 for ssh you can use the command below

[email protected]:~$ sudo ufw allow proto tcp from any to any port 8022
Allow other ports needed for a Witness server

a Witness server use per default the TCP port 2001 and optionally need TCP port for running ws, http and rpc plugins. To allow them, you can use the command below as exemple (the port 443 is for https!)

[email protected]:~$ sudo ufw allow proto tcp from any to any port 2001,443 
Activate ufw

To enable ufw, use this command:

[email protected]:~$ sudo ufw enable

Answer y to the question for proceed

Command may disrupt existing ssh connections. Proceed with operation (y|n)?

To list the active rules you can use the command

[email protected]:~$ sudo ufw status

The output will be something like this

Status: active

To                         Action      From
--                         ------      ----
8022/tcp                   ALLOW       Anywhere                  
2001/tcp                   ALLOW       Anywhere 
443/tcp                    ALLOW       Anywhere                 
8022/tcp (v6)              ALLOW       Anywhere (v6)             
2001/tcp (v6)              ALLOW       Anywhere (v6)
443/tcp (v6)               ALLOW       Anywhere (v6)

Fail2ban

Fail2ban scan the log files of the server and bans IPs that show the malicious signs. Like for exemple too many password failures, seeking for exploits, etc.. It work as a service and create rules that automatically alter iptables configuration. All based on a predefined number of unsuccessful login attempts. This will allow the server to respond to illegitimate access attempts without manual intervention.

Install

Fail2ban is in package list of Ubuntu. To install it from a command prompt do like this (update first).

[email protected]:~$ sudo apt-get update
[email protected]:~$ sudo apt-get install fail2ban
Configure

Configuration files are in the /etc/fail2ban directory. Stop the service

[email protected]:~$ sudo service fail2ban stop

Duplicate the config file jail.conf to keep default options inside (this file can be overwriten when update applied). Put all the specific settings in jail.local

[email protected]:~$ sudo cp /etc/fail2ban/jail.conf /etc/fail2ban/jail.local

Now we can modify the jail.local file to adjust to our server case

[email protected]:~$ sudo vim /etc/fail2ban/jail.local
The base

Setup the base consist to add one or more source @ip to ignore, the bann time and the number of retry allowed. To do this we need to modify the variables:

  • ignoreip = @ip to ignore (separated by a space).
  • bantime (in second) = parameter for banned client (default 10 minutes).
  • findtime (in second) = a window of time to find a specific number of tries (see below).
  • maxretry = number of tries before being banned.

By default ban 10 minutes a client after 5 tries in 10 minutes.

Email alerts

Configure email alerts with the variable destemail, sendername, and mta. To use it you need the Ubuntu package sendmail!

SSH

To activate a service juste need a line enabled = true in the appropriate section [ssh] and modify the port (remember we use specific!)

[sshd]
enable  = true
# To use more aggressive sshd modes set filter parameter "mode" in jail.local:
# normal (default), ddos, extra or aggressive (combines all).
# See "tests/files/logs/sshd" or "filter.d/sshd.conf" for usage example and details.
#mode   = normal
port    = ssh,8022
logpath = %(sshd_log)s
backend = %(sshd_backend)s

After editing, start the fail2ban service

sudo service fail2ban start

If you go want deeper in fail2ban I suggest this excellent post from Linode

Fail2ban Client

use the command fail2ban-client with one of these command to action/check information:

  • start: Starts the server and jails.
  • reload: Reloads configuration files.
  • reload JAIL: Replaces JAIL with the name of a Fail2ban jail; this will reload the jail.
  • stop: Stop the server.
  • status: Show the status of the server, and enable jails.
  • status JAIL: Show the status of the jail, including any currently-banned IPs.

Replace JAIL by the service you want to check, exemple with ssh

[email protected]:~$ sudo fail2ban-client status
Status
|- Number of jail:  1
`- Jail list:   sshd

Or

[email protected]:~$ sudo fail2ban-client status sshd
Status for the jail: sshd
|- Filter
|  |- Currently failed: 0
|  |- Total failed: 0
|  `- File list:    /var/log/auth.log
`- Actions
   |- Currently banned: 0
   |- Total banned: 0
   `- Banned IP list:   

UTILITIES and TUNING

NMAP

Install and use the port scanning NMAP to check your open ports

[email protected]:~$ sudo apt-get install nmap

To scan the server use the command

[email protected]:~$ nmap -sV -p 1-65535 localhost

Starting Nmap 7.60 ( https://nmap.org ) at 2020-03-31 05:06 UTC
Nmap scan report for localhost (127.0.0.1)
Host is up (0.000070s latency).
Not shown: 65532 closed ports
PORT      STATE SERVICE VERSION
53/tcp    open  domain
953/tcp   open  rndc?
8022/tcp  open  ssh     OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 12.89 seconds

Where:
-sV = service identification
-p = list of port to scan (range separate by -)

Time Synchronization with NTP

For a better time synchronization, we will use the NTP packet.

Before installing ntpd, we should turn off timesyncd (the default manager for time synchronization):

[email protected]:~$ sudo timedatectl set-ntp no

Verify that timesyncd is off:

[email protected]:~$ timedatectl
                      Local time: Tue 2020-03-31 05:32:52 UTC
                  Universal time: Tue 2020-03-31 05:32:52 UTC
                        RTC time: Tue 2020-03-31 05:32:52
                       Time zone: Etc/UTC (UTC, +0000)
       System clock synchronized: yes
systemd-timesyncd.service active: no
                 RTC in local TZ: no

We can see that systemd-timesyncd.service active is set to no

To install the NTP packet run the command

[email protected]:~$ sudo apt install ntp

ntpd will be started automatically after install. You can check the version with the command

[email protected]:~$ sntp --version
sntp [email protected] (1)

We need to edit the ntp.conf file to replace the default ubuntu.pool with something closer. To do this, you first need to check here https://www.ntppool.org/zone/@ which are the closest pool servers.

Edit the ntp.conf file

[email protected]:~$ sudo vim /etc/ntp.conf

Replace

# Use servers from the NTP Pool Project. Approved by Ubuntu Technical Board
# on 2011-02-08 (LP: #104525). See http://www.pool.ntp.org/join.html for
# more information.
pool 0.ubuntu.pool.ntp.org iburst
pool 1.ubuntu.pool.ntp.org iburst
pool 2.ubuntu.pool.ntp.org iburst
pool 3.ubuntu.pool.ntp.org iburst

By your nearest NTP pool servers (fr in my case)

# Use servers from the NTP Pool Project. Approved by Ubuntu Technical Board
# on 2011-02-08 (LP: #104525). See http://www.pool.ntp.org/join.html for
# more information.
pool 0.fr.pool.ntp.org iburst
pool 1.fr.pool.ntp.org iburst
pool 2.fr.pool.ntp.org iburst
pool 3.fr.pool.ntp.org iburst

Restart the service

[email protected]:~$ sudo service ntp restart

Check if everything OK

[email protected]:~$ ntpq -p
     remote           refid      st t when poll reach   delay   offset  jitter
==============================================================================
 0.fr.pool.ntp.o .POOL.          16 p    -   64    0    0.000    0.000   0.000
 1.fr.pool.ntp.o .POOL.          16 p    -   64    0    0.000    0.000   0.000
 2.fr.pool.ntp.o .POOL.          16 p    -   64    0    0.000    0.000   0.000
 3.fr.pool.ntp.o .POOL.          16 p    -   64    0    0.000    0.000   0.000

Increase the max open files limit

To avoid the problem of Too many open files we need to make a few changes to the ulimit

Edit the limits.conf file

[email protected]:~$ sudo vim /etc/security/limits.conf

Add the following lines

root            soft     nproc          999999
root            hard     nproc          999999
root            soft     nofile         999999
root            hard     nofile         999999
witness         soft     nproc          999999
witness         hard     nproc          999999
witness         soft     nofile         999999
witness         hard     nofile         999999

Edit the common-session file

[email protected]:~$ sudo vim /etc/pam.d/common-session

Add the following line

session required        pam_limits.so

Reboot the server for the change to take effect.

Check the open files limit (need to be connected with the right user!)

[email protected]:~$ ulimit -n
999999

Install SCREEN and LNAV

Install the package screen (a terminal multiplexer) which will continue to run either if the window is not visible or if you get disconnected if not already installed.

[email protected]:~$ sudo apt install screen

Install the package lnav a log file navigator, streamer, regex searchable

[email protected]:~$ sudo apt install lnav

We are now ready for the second part and the installation of Hive
[WITNESS server - part II] HIVE - The manual way

Mintrawa app logo


If you liked Upvote, Follow, Reblog or Cross post are welcome - @mintrawa

Sort:  

Congratulations @mintrawa! You received a personal award!

Happy Hive Birthday! You are on the Hive blockchain for 1 year!

You can view your badges on your board and compare to others on the Ranking

Vote for @Steemitboard as a witness to get one more award and increased upvotes!