TL;DR - What are you running as a means of “antivirus” on Linux servers?

I have a few small Debian 12 servers running my services and would like to enhance my security posture. Some services are exposed to the internet and I’ve done quite a few things to protect the services and the hosts. When it comes to “antivirus”, I was looking at ClamAV as it seemed to be the most recommended. However, when I read the documentation, it stated that the recommended RAM was at least 2-4 gigs. Some of my servers have more power than other but some do not meet this requirement. The lower powered hosts are rpi3s and some Lenovo tinys.

When I searched for alternatives, I came across rkhunter and chrootkit, but they seem to no longer be maintained as their latest release was several years ago.

If possible, I’d like to run the same software across all my servers for simplicity and uniformity.

If you have a similar setup, what are you running? Any other recommendations?

P.S. if you are of the mindset that Linux doesn’t need this kind of protection then fine, that’s your belief, not mine. So please just skip this post.

5 points

Chkrootkit isn’t an antivirus.

permalink
report
reply
-9 points

Yea. Thanks.

permalink
report
parent
reply
-1 points

Maybe you’d be interested in https://wazuh.com/

permalink
report
reply
0 points

Not sure this is what I’m looking for as it appears to be an XDR SIEM vendor.

permalink
report
parent
reply
2 points

That’s what modern endpoint security is, really. Traditional AV is dead. There are far too many people making malware for file signatures or heuristics to keep up. Instead, you want to look for behavior on the system and on the network. For example, if a program starts reading every file it can find on the network, and changing then from their current formats to unreadable blobs, that’s probably ransomware and should be stopped. Plain old AV probably won’t catch it on the client because of how frequently it gets modified (plus all the various evasion techniques), nor on the server because nothing unusual is running on the server.

permalink
report
parent
reply
35 points
Removed by mod
permalink
report
reply
15 points

The last paragraph he calls out that he doesnt want to hear this.

permalink
report
parent
reply
10 points
Removed by mod
permalink
report
parent
reply
7 points

You’re not wrong.

permalink
report
parent
reply
20 points

I mean then go ahead waste your resources lol

permalink
report
parent
reply
7 points

Did you know that there’s another jackoneil on lemmy? Except he spells his name with just one ‘l’, and he has no sense of humor at all.

permalink
report
parent
reply
-11 points

Okay sure same thing as Windows. If you aren’t reckless with the things you install and run then you are likely fine BUT there’s always a chance. All it takes is one slip up. Same logic as having a lock in the door knob and a deadbolt. By your logic (and many others), the lock on the door knob is sufficient and that may be okay with you BUT I’m gonna put a deadbolt on too just in case.

We can argue about this all day long. You will have valid points and so will I.

permalink
report
parent
reply
17 points
Removed by mod
permalink
report
parent
reply
-14 points

Okay cool. Thanks.

permalink
report
parent
reply
7 points

But would you put a deadbolt on your garage door? Or on your fridge door? IMO, arguing by analogy here just obfuscates the points – your servers aren’t physical doorways with locks, and comparing them just confuses the issue.

Can you explain what added security an antivirus package would offer for a Linux server? I haven’t done much with Linux administration, mostly just using Docker images for stuff at work.

I’m not a super Linux expert or anything, but I do grok tech, and I’m curious about this topic.

permalink
report
parent
reply
2 points

How does it obfuscate the point? A layered approach to security.

permalink
report
parent
reply
-1 points

To be honest, antivirus software is just not really a security tool. If you’re at the point where malicious software is running on your server you’ve already lost and it’s hard to know what extent the damage will be. Having proper isolation is much more important (something which, tbh, Linux isn’t quite as great at as we’d like to think, at least not with additional effort… mobile operating systems seem to take the isolation of applications a lot more seriously). You could maybe argue that the anti virus software is useful for monitoring, but I’d rather have some stronger guarantees that my application isn’t going to take my lunch money and private keys than a notice a day later that something sketchy is on my machine… I won’t flat out say a virus scanner is completely useless, because of course you can contrive of scenarios where one could be helpful, but they’re kind of dubious.

Also yeah, ClamAV afaik isn’t really used like a typical windows antivirus. It’s mostly used on mail servers to scan email attachments. It’s not necessarily even looking for “Linux viruses”.

permalink
report
parent
reply
-4 points

Honestly, the best antivirus for Linux is Arch.

permalink
report
reply
0 points

Hahahahaha this actually made me chuckle. Thanks for that!

permalink
report
parent
reply
-1 points

Its a rolling release, so will always have the most up to date and patched packages the fastest. That concept is the antivirus.

Can’t infect your machine if the vulnerabilities are already fixed.

permalink
report
parent
reply
5 points

Unfortunately you can’t easily patch the fleshy thing operating the system

permalink
report
parent
reply
3 points

Now where do new vulnerabilities come from? 🤔 Oh that’s right - from new code. And how often does new code show up on Arch? Oh…

permalink
report
parent
reply
6 points
*
Removed by mod
permalink
report
parent
reply
2 points
*

AFAIK this is not what happens on NixOS. Every package gets installed into a directory that’s a hash of its dependencies in the nix store, but there’s no special isolation or anything on NixOS (well, when the packages are built there’s some isolation, but that’s mostly to keep the builds honest). That said, NixOS is a little better than most distros about creating separate daemon users for services with different permissions, but I don’t think it’s done universally. I love NixOS and it has many benefits, but I don’t think this is one.

permalink
report
parent
reply
-9 points

I was going to mention mcafee. Its a built in option for synology nas. However it appears that software has gone end of life.

https://www.mcafee.com/support/?locale=no-NO&articleId=TS103384&page=shell&shell=article-view

permalink
report
reply
10 points

I avoid McAfee like the plague!

permalink
report
parent
reply
1 point

Have you considered doing an RFP?

permalink
report
parent
reply
3 points

A request for proposal? If that’s what you mean then no. I’m asking for my home setup not for a business/enterprise. If I missed the mark then please elaborate.

permalink
report
parent
reply

Selfhosted

!selfhosted@lemmy.world

Create post

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.

Rules:

  1. Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it’s not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

Community stats

  • 3.5K

    Monthly active users

  • 3.3K

    Posts

  • 71K

    Comments