
Self-managed Virtual Private Servers (VPS) have made new systems cheap for technically knowledgeable people to deploy, whether for hosting a personal (“vanity”) domain, to create a remote distributed node from which to collect data, for use in working with DNSDB API or the Security Information Exchange data, or for other purposes. However, while you can get a Un*x virtual private server cheaply and easily today, there are still MANY details associated with bringing up a functional and secure system. Our new report is meant to help users bring up a secure-yet-still-usable system. We’re sharing the content in the new report because one of our company’s explicit objectives is to “help make the Internet a safer place.”
That said, let us be clear: even if a reader diligently follows ALL of the advice in the new report, no one can guarantee that the resulting system will always be “perfectly safe and secure.” There may be things we’ve inadvertently overlooked (or intentionally excluded), latent undiscovered vulnerabilities, novel new attacks, typos on our part (or yours), untrustworthy staff at the hosting provider, or many other issues that may keep a relatively-well-configured systems from being “fully secure.” After all, as notable cybersecurity expert Gene Spafford (https://en.wikipedia.org/wiki/Gene_Spafford) once said, “The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards — and even then, I have my doubts.”
We can’t get that “Spafford-like” level of security. We need systems that authorized users can use to get their work done. Nonetheless, the steps outlined in the new report may help you be at least somewhat more secure.
To be comfortable leveraging the new report, you’ll need to be technically savvy. If you’re NOT a technical person who likes to run his or her own system, this is not the right document for you. We’re explicitly assuming that you do NOT need a “control panel” environment, for example. Similarly, if you’re not interested in a Un*x-based approach (using Debian Linux), perhaps preferring a MS Windows-based system instead, this is also NOT the right document for you.
You may also wonder why we chose “Bullseye” rather than the latest Debian release, “Bookworm,” for the VPS operating system. The answer has two parts: security and resources. Some VPS may have quite modest resources available, including perhaps as little as 512MB of RAM. “Bullseye” recommends 512MB as a minimum (see https://www.debian.org/releases/bullseye/amd64/ch03s04.en.html), and thus would fit in that configuration, while Bookworm’s absolute minimum for a standalone system is 1024MB (see https://wiki.debian.org/DebianEdu/Documentation/Bookworm/Requirements). Additionally, Bullseye has been available since 2021 and has undergone continual reviews, bug fixes, and security updates, ensuring that it is now widely tested and “battle worn.” It will continue to be fully supported and updated by Debian until June, 2026.
Despite our quite-limited VPS hardware, we’ll demonstrate…
No security document can guarantee a “bulletproof” system, but we hope this document will at least provide a solid and usable outline and “launching off point” for those setting up a basic VPS.