this post was submitted on 02 Sep 2024
444 points (98.1% liked)

Linux

47290 readers
890 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by AlpΓ‘r-Etele MΓ©der, licensed under CC BY 3.0

founded 5 years ago
MODERATORS
 

Apparently I installed that thing in 2006 and I last updated it in 2016, then I quit updating it for some reason that I totally forgot. Probably laziness...

It's been running for quite some time and we kind of forgot about it in the closet, until the SSH tunnel we use to get our mail outside our home stopped working because modern openssh clients refuse to use the antiquated key cipher I setup client machines with way back when any longer.

I just generated new keys with a more modern cipher that it understands (ecdsa-sha2-nistp256) and left it running. Because why not πŸ™‚

top 50 comments
sorted by: hot top controversial new old
[–] [email protected] 139 points 2 weeks ago (10 children)

Because why not πŸ™‚

Because security.

[–] [email protected] 34 points 2 weeks ago* (last edited 2 weeks ago) (8 children)

It's behind a firewall. The only thing exposed to the outside is port 22 - and only pubkey login too.

And gee dude... It's been running for 18 years without being pwned πŸ™‚

[–] [email protected] 99 points 2 weeks ago (1 children)

It hasnt been pwned so far

[–] [email protected] 12 points 1 week ago

For that matter, it hasn't been ransomwared. There are so many ways to hide a compromise.

[–] [email protected] 77 points 2 weeks ago (1 children)

without being pwned

How do you know?

[–] [email protected] 33 points 1 week ago (1 children)

There's a file called /pwnedornot and it contains "no, you're safe bro"

load more comments (1 replies)
[–] [email protected] 65 points 2 weeks ago

And it's not like it contains any sensitive information. I'm sure all your emails are just friendly correspondence with your pen pal.

[–] [email protected] 33 points 2 weeks ago (1 children)

I'd still maybe build a modern OpenSSH package.

There's been an awful lot of RCEs in the past two decades and uh, if that's rawdogging the internet, I'm honestly shocked you haven't been hit with any by now.

load more comments (1 replies)
[–] [email protected] 24 points 2 weeks ago

How do you know? Do you constantly monitor running processes, performance and network connections?

[–] [email protected] 18 points 1 week ago (1 children)

sorry, but what kind of email server listens only on SSH?

load more comments (1 replies)
[–] [email protected] 8 points 2 weeks ago (8 children)

Did you really only use it when you were home? If you used it outside the firewall then port 25 must have been open also.

I used to run my own server and this was in the early 90s. Then one day, perusing the logs I realized I was not smart enough on the security front to even attempt such a thing. It was quickly shut down and the MX record moved to an outsourced mail provider.

load more comments (8 replies)
[–] [email protected] 8 points 1 week ago

How do you know? OpenSSH is pretty good but it isn't impenetrable. Especially for almost 10 years.

load more comments (9 replies)
[–] [email protected] 107 points 1 week ago (1 children)

Good thing there hasn't been any remotely exploitable security bugs in any of the mail system components in the 6 years since Debian 7 went EoL

[–] [email protected] 18 points 1 week ago (1 children)

https://security-tracker.debian.org/tracker/

Depending on how it was configured it may or not be have been compromised. Probably better to go the nuclear option.

load more comments (1 replies)
[–] [email protected] 65 points 2 weeks ago (1 children)

That was a good test run. I think it's time to put it into production.

[–] [email protected] 18 points 1 week ago

Everyone has a test environment. Some people also have production environments

[–] [email protected] 44 points 1 week ago (1 children)

I'm fairly certain that SSH and whatever else you're exposing has had vulnerabilities fixed since then, especially if modern distros refuse to use the ssh key you were using, this screams of "we found something so critical here we don't want to touch it". If your server exposes anything in a standard port, e.g. SSH on 22, you probably should do a fresh install (although I would definitely not know how to rebuild a system I built almost 20 years ago).

That being said, it's amazing that an almost 20 year old system can work for almost 10 years without touching anything.

[–] [email protected] 11 points 1 week ago (3 children)

The amount of dos systems I have seen powering critical infrastructure in banks and hospitals is quite frankly nightmare fuel.

[–] [email protected] 13 points 1 week ago

A basic DOS system has zero networking or open ports

[–] [email protected] 7 points 1 week ago

They normally are isolated systems with controlled access. Same with shipping and any other critical industry.

Not to say that there aren't exceptions but these days there is a required level of compliance

load more comments (1 replies)
[–] [email protected] 42 points 1 week ago (1 children)

You send mail to Gmail and Hotmail and it's actually accepted? How?

[–] [email protected] 40 points 1 week ago (1 children)

Patience. It really helps to have all the latest set up: SPF, DKIM, DMARC. Then after that it's a matter of IP reputation, you can email the various blocklists and you wait for the rest of them to clear on their own.

I've had that IP for 10 years and it has never sent spam, and I've sent enough emails that people open that it actually does get through fine. I haven't had to think about it for a long time, it just keeps on working. Barely had to even adjust my Postfix config through the upgrades.

[–] [email protected] 6 points 1 week ago

This is true. If you have DMARC and your RUA set up (with a working email (or one that doesn't bounce at least)) along with SPF and DKIM, Google and MS will accept your mail. The only time it won't at that point is if your IP is in the same /24 as a known spammer but so long as the spam stops, you'll fall off the list. Some of the common spamlists allow you to request your IP be removed by request and I can only recall one list that almost nobody uses that makes you pay for the removal though there may be more I don't recall.

[–] [email protected] 37 points 1 week ago (3 children)

Genuinely surprised when I see people running mail servers without issue. I suppose getting in relatively early means you're not immediately sent to junk mail lists by the big players.

[–] [email protected] 37 points 1 week ago (2 children)

Unfortunately that's not true. I've been running mail servers under my domain since around 2000, almost as long as Microsoft has been running Hotmail, and I was certainly following good standards like SPF and DKIM well before they considered such a thing... and yet Microsoft is the bane of my mail server's existence. Despite no compromises resulting in spam blasts, MS still regularly shuts me out with no reason given and no hits showing on their monitors. If I can find their email address to ask what the problem is, I get a generic "your domain has been cleared" sort of reply but never any reason why they blocked me in the first place.

[–] [email protected] 6 points 1 week ago (1 children)

Do you have a "spammy" TLD?

[–] [email protected] 6 points 1 week ago

My primary domain is something that people have blacklisted because four letters happen to partially match a word that could be spammy (how ridiculous is that?), however the mail servers (the ones they keep blocking) are attached to my computer business name which I registered in 2006, so there's really no reason why they should block it for that reason.

[–] [email protected] 4 points 1 week ago

To be far you didn't update for almost a decade. The large email provides fear you

[–] [email protected] 7 points 1 week ago

I've started up new domains and never had an issue getting mail accepted.

There's a right way to do it, and most people that complain that hosting email is impossible don't know how to configure it correctly.

[–] [email protected] 4 points 1 week ago

You need SPF, DKIM, DMARC with a RUA set up to an email that doesn't bounce. That's pretty much it. I've been running email servers a long time and actually set up email from a new domain/IP a couple of years ago as well.

[–] [email protected] 33 points 1 week ago (2 children)

Family email server? Your family have an email server to themselves? You managed to deal with block lists over 2 decades and more?

My utmost respect to your dedication

[–] [email protected] 8 points 1 week ago

It takes a special kind to run and maintain a mail server. More so for doing it for such a long time.

load more comments (1 replies)
[–] [email protected] 20 points 1 week ago

It's had a good run. Let the little guy have a rest. Whatever you replace it with will consume less electricity.

[–] [email protected] 18 points 2 weeks ago (1 children)

I gave up running an email server long ago - I thought it was basically impossible because too many spammers were doing it for nefarious purposes.

[–] [email protected] 4 points 2 weeks ago (1 children)

Nah you can use ghetto smtp to relay incoming mail to a different port on your server if your ISP blocks incoming 25 and sendinblue (it's changed names but my sendinblue config is still working) to send outgoing mail if they block outgoing 25. It's less than ideal but doable for low volume private email servers.

[–] [email protected] 42 points 2 weeks ago

This suggestion always amuses me.

"You can easily run a mail server! All you have to do is route all the mail through someone else's mail server and bam, you're running a mail server!"

I mean it's not wrong, but it causes a case of the giggles.

[–] [email protected] 18 points 2 weeks ago (1 children)

you name your servers with nuclear subs names?

[–] [email protected] 19 points 2 weeks ago

I'm a kid of the cold war.

[–] [email protected] 14 points 1 week ago (1 children)

Not to be that guy but why not use Curve25519?

I still remember all the conspiracies surrounding NIST and now 25519 is the default standard.

In 2013, interest began to increase considerably when it was discovered that the NSA had potentially implemented a backdoor into the P-256 curve based Dual_EC_DRBG algorithm.[11] While not directly related,[12] suspicious aspects of the NIST's P curve constants[13] led to concerns[14] that the NSA had chosen values that gave them an advantage in breaking the encryption.[15][16]

[–] [email protected] 6 points 1 week ago (1 children)

If you are worried that the NSA might be reading your email maybe it’ll be better for society if you don’t update … just saying.

load more comments (1 replies)
[–] [email protected] 14 points 1 week ago

Believe it or not I've come into contact with Microsoft Exchange 2010 running on Server 2008 for 2000 days once. The company had ransomware.

[–] [email protected] 14 points 1 week ago (1 children)

Please tell you to at least have Freexian patches installed...

[–] [email protected] 14 points 1 week ago

This is how massive botnets form

[–] [email protected] 11 points 1 week ago (6 children)

That's the power of Linux. It can work for decades without issues.

load more comments (6 replies)
[–] [email protected] 11 points 1 week ago

I hope you get your data off and then burn it and everything around it. It could be easily compromised you knowing. It could easily be used for spamming

load more comments
view more: next β€Ί