In the case of server housing, the security of the server is basically the responsibility of the customer as the operator of the server. MOORnetworks does not restrict public network connections (e.g. by port filtering) and usually has neither access rights to the server nor any influence on its configuration or maintenance. If the server is operated directly on the internet and has insufficient security measures, a compromise is to be expected sooner or later.

We recommend the following mechanisms for efficient protection

  • Use of an upstream firewall (e.g. through the Managed Firewall Service from MOORnetworks)
  • Use of software-based rules with white/black lists
  • Maintenance and regular updates of the operating system and applications

Recommendations for restricting administrative IP addresses

Server services such as SSH and FTP, which use the TCP wrapper, can be easily protected against brute force attacks by defining in the files /etc/hosts.allow and /etc/hosts.deny which IP address is allowed to connect or not. As the administrator of the server, you store your own IP address there, which you use to dial into the Internet or from where you want to access the server.