I'd ordered a VPS with Ubuntu 16.04/64-bit LTS server edition with some ports opened, which are essential to my application.
recently the VPS was delivered to me, so I accessed the VPS using ssh and changed the ssh password.
now my question is:
how can I make sure that the Ubuntu 16.04 installation that was delivered to me, is a clean installation and does not have any extra functionality (malicious or not) and/or extra files with respect to the original OS that Ubuntu provides publicly?
now I have to say that I trust my VPS provider, but I have this question in general.
unfortunately I wasn't able to find any similar question. so I would be happy, if you refer me to one.
following are more details that might be helpful.
thanks.
cat /etc/os-release output:
NAME="Ubuntu"
VERSION="16.04.6 LTS (Xenial Xerus)"
ID=ubuntu
ID_LIKE=debian
PRETTY_NAME="Ubuntu 16.04.6 LTS"
VERSION_ID="16.04"
HOME_URL="http://www.ubuntu.com/"
SUPPORT_URL="http://help.ubuntu.com/"
BUG_REPORT_URL="http://bugs.launchpad.net/ubuntu/"
VERSION_CODENAME=xenial
UBUNTU_CODENAME=xenial
hostnamectl output:
Static hostname: ubuntu
Icon name: computer-vm
Chassis: vm
Machine ID: *** (not shown deliberately)
Boot ID: *** (not shown deliberately)
Virtualization: vmware
Operating System: Ubuntu 16.04.6 LTS
Kernel: Linux 4.4.0-157-generic
Architecture: x86-64
uname -r output:
4.4.0-157-generic