Overview
- A short, informal summary.
-
We first consider
basic security policy:
learning about problems as they are found by the community;
finding and installing security-related OS patches;
uninstalling unnecessary services (such as FTP
and Sendmail);
and chrooting services.
-
Authentication: password systems, encryption and the Pluggable Authentication
Module system.
-
Some distributions specialise in security issues. If you are particularly
concerned about security, these distributions are
worth considering --- perhaps
simply as an educational tool.
-
A change of view point can be particularly useful. How does a potential
intruder see your system?
In this section we look at tools which help with
this: Satan and Saint, and the Portscanners nmap and nessus.
-
Many system (and kernel) events cause entries to be made in log files.
These can be used to audit a system and track cracking attempts. In
this section we discuss syslogd
and klogd, the logging daemons;
iblm an X-based log-file viewer ("tail -f");
and remote logging --- logging of events on one host to another host, making
it more difficult for hacker to "clean up" log files after a successful
break-in.
-
Running services --- daemons listening on privileged ports --- is a
hazardous business; there is no such thing as an unhackable server. But
one can "wrap" services in
access-control software to reduce the risks.
We look at inetd, TCP Wrappers, Portmapper
and xinetd.
-
No system is totally secure; to minimise damage we need to
detect intrusions. To this end we introduce
the AIDE, FCheck, Tripwire and chkrootkit.
And, you'll find CVS very useful too!
-
Packet-filters:
ipchains, iptables and ipfilter are all
utilities which look at the source and destination addresses for each
individual IP packet, and checks these against a list of rules in order
to decide for or against passing, rejecting or dumping the packet.
-
Ideally hosts performing portscans or other rogue actions against your system
should be blocked immediately --- a delay whilst the administrator gets
around to looking at log files (or reads emails sent by utilities such
as LogSentry --- formerly LogCheck) could be "fatal". Utilities
exist which monitor
portscans and other signs of foul-play real-time and automatically block
access to/from these hosts. We look at Portsentry and IPTrap.
We also mention psad, a utility which automatically blocks hosts
according to information logged by ipchains or iptables.
Tools which watch log files on your behalf and report significant events.
-
We consider the ultimate security add-ons to Linux:
kernel-patches which extend the standard
Unix security model. In particular, Medusa DS9 extends the Unix
security architecture for Linux by offering fine-grained file protection,
virtual spaces in which services/daemons (for example) can operate and
system call monitoring.
-
Sending data, in particular passwords, over the network unencrypted is a
bad idea. Secure shell (ssh)
and associated utilities (scp and sftp) ensure all data
passing between hosts is encrypted.
-
OpenBSD is a free, open source, Unix variant in
which emphasis is placed on security-related issues. Certainly worth
a look if you require a secure server.
-
Finally we offer some pointers to finding out
more about security-related issues and Unix (Solaris/Linux).
About this document:
Produced from the SGML: /home/isd/public_html/_unix_security/_reml_grp/unix_security_survey.reml
On: 10/11/2004 at 9:49:32
Options: reml2 -i noindex -l long -o html -p multiple