I've just installed ubuntu server on my microserver and was wondering if there is any remote console software that I can use? Sort of like teamviewer is for windows
Well I wouldn't ... but there are various things you can do to help mitigate like not running it on port 22 (or running on port 22 but doing things with port forwarding on your router so it doesn't appear externally on that port), using key based authentication rather than passwords or depending on what else you have then VPN in and then SSH through like normal ...
Most important things (IMO) are 1. double check that it's not possible to log in as root (see PermitRootLogin), and 2. disable password authentication in favour of key-based.
If you are the only person using the server you can make yourself a 2048 bit key (or more) and practically guarantee that it's impossible for anyone else to get in. The only remaining risk being exploits in SSH etc., but they're out of your control.
If you want the desktop environment you can easily tunnel VNC over SSH.
This is always a matter of contention - if you're extremely paranoid then setting custom ports might be worthwhile, but disabling root login and password auth are *far* more valuable things to do from a security standpoint.
I've had a few port 22 SSH instances open to the world for years and given those precautions had no issues.
For me, remembering the damn port and typing -p 12345 on the end of every ssh or scp command is far more bother than it's worth.
Or, run an OpenVPN instance and expose that on port 443 - which is useful for getting through the more restrictive firewalls in some places and nobody seems to bother trying much against exposed tcp/443 for various reasons...
1 - Custom SSH Port
2 - Disable root login and use another somewhat random username (not necessarily characters, just not something like "admin").
3 - Firewall including bruteforce protection i.e: ConfigServer Security & Firewall
I subscribe to the "security through obscurity is no security at all" camp. Just keep it on port 22 with only key-based authentication and the chances of intrusion are practically zero.
1 - Custom SSH Port
2 - Disable root login and use another somewhat random username (not necessarily characters, just not something like "admin").
3 - Firewall including bruteforce protection i.e: ConfigServer Security & Firewall
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.