Linux Security Guidelines Document ID: GUI-0001
|
|
|
- Andrew Dixon
- 10 years ago
- Views:
Transcription
1 s Document ID: GUI-0001 Information Technology Protective Security Services Pte. Ltd. Block K, Information Technology And State Store Building, Jalan Gadong BE1110, Negara Brunei Darussalam Tel: +(673) Fax: +(673) Website:
2 LEGAL NOTICE & DISCLAIMER Do not attempt to implement any of the settings in this guide without first testing in a nonoperational environment. This document is only a guide containing recommended security settings. It is not meant to replace well-structured policy or sound judgment. Furthermore, this guide does not address sitespecific configuration issues. Care must be taken when implementing this guide while using mission specific and mission critical products. The security changes described in this document only apply to the intended operating system, service or product and should not be applied to any other software. SOFTWARE IS PROVIDED AS IS AND ANY EXPRESS OR IMPLIED, WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE EXPRESSLY DISCLAIMED. IN NO EVENT SHALL THE CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDICRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLDUING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 2
3 Document Version History Version Reason for Issue Date of Issue 1.00 Draft 10 th January First release 26 th January Second release 14 th February 2005 Related Documents Document ID Document Name 3
4 Table of content LEGAL NOTICE & DISCLAIMER...2 DOCUMENT VERSION HISTORY...3 RELATED DOCUMENTS...3 LIST OF TABLES...5 SUMMARY INTRODUCTION PURPOSE AND SCOPE ASSUMPTIONS INTENDED AUDIENCE PHYSICAL SECURITY BIOS PASSWORD PLACE SERVERS IN A CONTROLLED AREA PREVENT SERVERS FROM BEING BOOTED THROUGH OTHER MEDIUM SERVERS ARE TO BE PLACED IN RACKS WITH LOCKING MECHANISMS CONCEAL CABLING AND POWER OUTLETS INSTALLATION AND CONFIGURATION INSTALL FROM A CLEAN FORMATTED DRIVE PARTITIONS CUSTOM INSTALLATION PATCHES INSTALLING PATCHES LINUX OPERATING SYSTEM HARDENING ACCOUNTS ACCOUNTS POLICY REMOVING UNNECESSARY ACCOUNTS ROOT ACCOUNT SERVICES AND PORTS SECURING XINETD SECURING "/ETC/SERVICES" FILE DISALLOW ROOT LOGIN FROM DIFFERENT CONSOLES BLOCKING SU TO ROOT
5 4.10. TCP WRAPPERS IPTABLES DETECTING SUID/SGID PROGRAMS HIDING SYSTEM INFORMATION OTHER UTILITIES TRIPWIRE SENTRY TOOLS BASTILLE CONCLUSION...21 REFERENCES...22 List of tables TABLE 1: RECOMMENDED PARTITION...10 TABLE 2: DISABLE UNWANTED SERVICES
6 Summary Linux has gained its popularity as an open source operating system and has been used for workstations and servers. Due to the growth of its usage in application and production line, its vulnerabilities have increased from time to time. Exploits are written based on these vulnerabilities that enable systems to be controlled over or simply knock out of its purpose. Having Linux as a server or workstation using default configurations are potentially dangerous and should be taken into consideration. Out of the box configurations are usually configured to its generic use. Initial planning on deciding for the system intended purpose is thus crucial. These purposes are service providing system such as a web server, file server, DNS server, mail server and more. This document guides users to enforce basic security measures to be implemented on their system. This ensures the systems are not vulnerable to attacks and to improve its ability responding to such kinds of attacks. 6
7 1. Introduction 1.1. Purpose and Scope This guideline provides information and tips on securing Linux based operating systems. Provided users have knowledge in Linux environment, this paper covers basic guidelines in securing Linux. By practicing security measures in this guideline, users should be able to secure their system as a first step to further hardening the operating system down to its kernel Assumptions This document is aimed at users that have basic knowledge in Linux console environment. Examples throughout this guideline is based and tested on Redhat 9.0. It is also preferred that users are familiar with basic console commands. This is to ensure every step taken doesn t produce unnecessary results Intended Audience This guideline is intended for users who wish to implement a basic security hardening baseline for their Linux systems. This includes the do s and don ts on how to configure their Linux systems. This document is not only limited to systems administrators but also for home users that uses Linux as their daily workstations. 7
8 2. Physical Security Physical security should not be overlooked as an optional factor. Maintaining the physical control of Linux servers/workstations are crucial to data integrity, confidentiality and availability. Unauthorized users are not allowed to power-off servers intentionally or unintentionally that may cause unnecessary downtime, thus disrupting services. Physical control for Linux servers: BIOS password. Place servers in a controlled area. Prevent servers from being booted through other medium. Servers are to be placed in racks with locking mechanisms. Conceal cabling and power outlets BIOS Password Setting up BIOS password protects the system configuration from being reset or altered by intruders. By placing controls to the system BIOS itself, administrators can limit the use of devices such as CD-ROMs from being use as a boot-up sequence; bootable operating system on a CD can be used to access partitions on the system Place servers in a controlled area The first and most important line of defense is to place servers in a controlled environment. This includes a well ventilated room to dissipate heat generated by the servers. Room should be constantly monitored with locking access control to allow only authorized users to the area. Following steps should be followed to improvised security measures: Server rooms should always be locked. Monitoring should be both controlled via cameras and human. Implement access controls such as biometric or other means of logging entries. Servers should be visible from outside the room for operators to notice any potential threats or hazards. Fire suppression system must be available to control fire or electrical hazards Prevent servers from being booted through other medium Servers can be booted to a different operating system through access media thus defeating security controls of that server s operating system. For example, an attacker can boot to an alternate live operating system through the CD/DVD drive and access the server s partitions with write and read capabilities, bypassing the existing permissions. 8
9 Security measures can be taken as follows: Remove floppy or CD/DVD drives from production servers. Disable floppy and CD/DVD drives from BIOS settings. If these media are required, enforce locking mechanisms on each device. Disable the Linux boot loader or set the timeout to Servers are to be placed in racks with locking mechanisms Servers should be locked firmly to its designated racks to prevent attacker to simply lift and carry the server out. By placing it firmly this minimizes the time an attacker to dismantle the racks. Choosing suitable racks are as follows: Racks are to be made of heavy and durable material Individual locks are required for each servers in the rack Implement logging controls on each locks 2.5. Conceal cabling and power outlets Cabling and power outlets are necessary to be taken into account as it is a main source of data flow and operation. Unprotected cablings may result in an attacker, who has physical access to the premises, to locate the servers power supply or network cable and unplugging it causing downtime. Furthermore, concealing these cables minimizes the threat of being tripped over by operators causing injury or unnecessary downtime. 9
10 3. Installation and configuration Linux installation should be planned out initially to achieve the best quality performance. Therefore, the purpose of usage is crucial to determine the necessity of packages or services to be installed. Installation of servers differs completely from a normal daily workstation Install from a clean formatted drive Installation should be run on a clean formatted drive and are tested for errors. Run disk diagnostics/utilities to detect any bad sectors that may have arise. In the case of such problems arising, consider replacing the drive and run diagnostics again Partitions Linux offers partitioning for its directories to protect against data loss due to corrupted partitions. Example, /usr directory on a different partition, hda3, is not affected if a partition fails or corrupts in hda1. It is recommended to make separate partitions as follows: Name Recommended size Usage /boot MB This is where the kernel image is stored; also used to overcome bios limitations on large drives. / 250MB 3+ Gig Root file system, all libraries, programs, and configuration files /usr 500 MB + Most applications are installed in this directory. /var 250 MB 1 Gig System log files are kept /home 250 MB 1+ Gig Users directories, depends on their usage Table 1: Recommended Partition 3.3. Custom installation Installation must be done with custom or minimal packages as possible. This prevents unnecessary services to be running on either workstations or servers. Additional packages can be installed later depending on the purpose of usage. Example, running Linux for a web server only needs packages such as Apache, PHP, OpenSSL, etc, as required. Having other services such as Sendmail (mail server) may jeopardize the web server s security. 10
11 3.4. Patches Installing Linux should be done in an isolated network, meaning no network connection is to be active for the installation. This prevents the Linux computer of being attacked as soon as installation is finished. Updates and patches has to be downloaded from a previously hardened machine on the network which later is to be burn to CD/DVD for transferring patches to the fresh installed Linux. Verifications of patches should be taken to ensure the integrity from the original vendors. Most vendors provide MD5 checksum for their patches. To verify integrity of a patch: # md5sum <filename> Output of the above command can be used to compare with the md5sum provided by the vendor. If the output matches, integrity is preserved, otherwise patch might be corrupted or tampered Installing Patches Patches that are acquired should be tested on a test system before implementing it on production level. This is to ensure patches don t crash the production system resulting unnecessary downtime. Update and patches sites differ from each Linux distributions or packages. Here are list of major packages sites. Redhat Linux Mandrake Linux 11
12 4. Linux Operating System Hardening After installing and configuring, further steps have to be taken to ensure operating system security. Linux by default will execute useful services upon boot up, however most of theses services are not necessary and pose a potential security risk. These steps include in removing any unnecessary services, adding rules, permissions, etc. This process is called operating system hardening Accounts Linux store its user accounts information in /etc/passwd file. Most Linux nowadays have shadow passwords enabled by default. This invokes an encryption scheme on all user passwords. In addition, another file is created to store these encrypted passwords for user accounts which can be located at /etc/shadow. In case shadow is not enabled, the command pwconv will create the shadow file based on /etc/passwd file Accounts policy User accounts needs to be enforced with strict policies to avoid user based errors. Such policies are defined as follows: Limit ability to access areas the system by using groups to categorize users o o Use groupadd <groupname> command to create a group Use useradd g <groupname> <username> to add username to groupname or usermod g <groupname> <username> Enforce password aging that forces users to change their passwords from time to time o Chage command is used to enforce password aging. Default password length allowable in Linux is 5. Change it to enforce users to choose passwords more than 8 characters for better security, takes longer time to crack. o # vi /etc/login.defs o Change the value of PASS_MIN_LEN 5 to PASS_MIN_LEN 8 Enforce complex password policy like Cz!q#n.*8fF. This makes passwords difficult to be cracked that might discourage attackers. 12
13 4.3. Removing unnecessary accounts Default system accounts which are not required should be removed immediately from the system. Example is an ftp account which grants user to ftp anonymously. Unless the purpose is an FTP server, this account should be removed. There are 2 ways can be used to accomplish this: userdel command is used to delete user accounts.i.e userdel r ftp ; this will remove user account ftp, home directory and files residing in it. Other way is by manually removing entries from /etc/passwd and /etc/shadow related to the user account. ftp:x:14:50:ftp User:/var/ftp:/sbin/nologin ftp:*:12329:0:99999:7::: - remove in /etc/passwd - remove in /etc/shadow To protect against brute-force entries, root account should be renamed and replaced by a dummy account named root to mislead the attacker. Example of a /etc/passwd file that is stripped to its minimum depending on circumstances. root:x:0:0:root:/root:/bin/bash bin:x:1:1:bin:/bin: daemon:x:2:2:daemon:/sbin: adm:x:3:4:adm:/var/adm: lp:x:4:7:lp:/var/spool/lpd: mail:x:8:12:mail:/var/spool/mail: uucp:x:10:14:uucp:/var/spool/uucp: nobody:x:99:99:nobody:/: System accounts such as news, ftp, games, etc are not required unless those services are intended Root Account The root account is the most privileged account on a UNIX system. When the administrator forgot to logout from the system root prompt before leaving the system then the system should automatically logout from the shell. A special variable in Linux, TMOUT, must be set in /etc/profile to use the feature. Edit the /etc/profile file: # vi /etc/profile Add the following lines: "HISTFILESIZE=" "TMOUT=3600" 13
14 The value entered for the variable "TMOUT=" is in second and represent 1 hours (60 * 60 = 3600 seconds). By adding the line in /etc/profile, automatic logout after one hour of inactivity will apply for all users on the system. Setting this variable in user's individual ".bashrc " file will automatically logout them after a certain time. After this parameter has been set on the system, re-login is required for the changes to take effect Services and ports Services are background programs that serve as a utility function without being called by a user. This utility may range from maintenance utility or to provide an interface upon request. Most of these services are not useful depending on the Linux usage purposes. On the other hand, ports are designated to provide a gateway to the services. These ports can be numbered from 1 to Commands such as netstat and ps can provide information on running services and ports. Example, netstat taun will provide information on running network services and the ports it listen to. The most informative command, ps, can be issued by ps aux without quotes, will provide information on every running services on the system. After determining which services should be disabled based on the information, the command service can be used to stop those services. Example, to stop sendmail: # service sendmail stop And the command below can be issued to stop the service completely upon startup. # chkconfig sendmail off 14
15 These general services are recommended to be disabled: apmd portmap pcmcia telnet finger samba sendmail httpd mysql vnc nfs xfs Required only in laptops to monitor battery information Only if rpc services is running (which is dangerous) i.e NFS, NIS Required only in laptops Use Secure Shell (SSH) Used to query account information Used to share volumes with Windows clients Mail server, depends on purpose Apache web server, depends on purpose Database server Remote desktop administration Network File Server X Font server Table 2: Disable unwanted services 4.6. Securing xinetd Xinetd is a secure replacement for inetd and it also known as the internet service daemon. It is started on bootup and listens on all service ports for the services listed in its configuration file, /etc/xinetd.conf. When connection request is made, xinetd starts up the corresponding network service. Xinetd is available in newer versions of Linux e.g. Redhat 7.x and later. For older versions of Linux refer to inetd instead of xinetd. Ensure xinetd configuration is own by root [root@asydz etc]# ls l xinetd.conf -rw-r r-- 1 root root 289 Feb 18 02:59 xinetd.conf Change the permissions on "/etc/xinetd.conf" file to 600, so that only root can read or write to it # chmod 600 /etc/xinetd.conf Set "/etc/xinetd.conf" file immutable, using the chattr command so that nobody can modify that file # chattr +i /etc/xinetd.conf 15
16 This will prevent any changes (accidental or otherwise) to the "xinetd.conf" file. The only person that can set or clear this attribute is the super-user root. To modify back the xinetd.conf file, unset the immutable flag. # chattr -i /etc/xinetd.conf 4.7. Securing "/etc/services" file Securing the "/etc/services" file prevents unauthorized deletion or addition of services. This involves in adding an immutable bit to the file. To secure the "/etc/services" file, use the command: # chattr +i /etc/services Securing root programs Ensure /sbin and /etc folders are owned by root. By default, normal users can reboot the system by issuing reboot command or by pressing Ctrl-Alt-Del combo keys. To disable the reboot command to users, ensure /sbin/halt is owned by root: # chmod 700 /sbin/halt To disable Ctrl-Alt-Del, edit /etc/inittab : # vi /etc/inittab Add a comment to the line stating, ca::ctrlaltdel:/sbin/shutdown -t3 -r now, so it reads # ca::ctrlaltdel:/sbin/shutdown -t3 -r now After making changes issue the command to take effect : # /sbin/init q By commenting out the line, restarting using Ctrl-Alt-Del is useless even to root. To shutdown, login as root and use the proper shutdown command : # /sbin/shutdown r now Replace r with h for powering off the system. 16
17 4.8. Disallow root login from different consoles The /etc/securetty file specifies which TTY devices the root user is allowed to log in. Edit the /etc/securetty file to disable any tty that are not needed by commenting them out (# at the beginning of the line) Blocking su to root The su (Substitute User) command allows a user to become other existing users on the system. To prevent users from su to root or restrict su command to certain users then add the following two lines to the top of su configuration in the /etc/pam.d directory. Edit the su file (vi /etc/pam.d/su) and add the following two lines to the top of the file: auth sufficient /lib/security/pam_rootok.so debug auth required /lib/security/pam_wheel.so group=wheel This example provides that only members of the wheel group can su to root, which also includes logging TCP Wrappers TCP wrapper is used to provide additional security against intrusion by controlling connections to defined services. TCP wrappers are controlled from two files. /etc/hosts.allow /etc/hosts.deny The best policy is to deny all hosts by putting "ALL: ALL@ALL, PARANOID" in the "/etc/hosts.deny" file and then explicitly list trusted hosts who are allowed to connect to the machine in the "/etc/hosts.allow" file. Edit the hosts.deny file (vi /etc/hosts.deny) and add the following lines: # Deny access to everyone. ALL: ALL@ALL, PARANOID Which means all services, all locations is blocked, unless they are permitted access by entries in the allow file. Edit the hosts.allow file (vi /etc/hosts.allow) and add for example, the following line: As an example: ftp : blahtest.com 17
18 In the above example, ftp service is only allowed to any domain from blahtest.com. However, advance filtering can be achieved using a built-in utility called iptables IPTables IPTables provide customization of rules depending on the user needs. Here are some recommended IPTables configurations. First general rule is to block everything, and from there rules are added accordingly. An allowed rule, ACCEPT, will bypass a blocking rule, e.g DROP, REJECT. IPTables consists of chains that control the packet flow. These chains are INPUT, OUTPUT and FORWARD. Here are some basic configurations: Rules should be cleared from the beginning. # iptables -F; iptables -t nat -F; iptables -t mangle F To deny everything: # iptables A INPUT j DROP # iptables A OUTPUT j DROP # iptables A FORWARD j DROP These sample rules make a secure connection by enabling inspection against flowing packets. Only packets with established sessions are allowed through. 'eth0 is the interface number of a network card, changes should be applied accordingly. # iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT # iptables -A INPUT -m state --state NEW -i! eth0 -j ACCEPT # iptables -P INPUT DROP # iptables A FORWARD I eth0 o eth0 j REJECT The use of IPTables is beyond the scope of this guideline and further reading on the topic is recommended Detecting SUID/SGID programs A regular user will be able to run a program as root if it is set to SUID root. A system administrator should minimize the use of these SUID/GUID programs and disable the programs which are not needed. To find all SUID file with a s bit; # find / -type f \( -perm o -perm \) \-exec ls -lg {} \; This will produce an output listing all SUID files. Adding > suidtxt to the end of the command will output the results to a file called suidtxt. 18
19 The following command will disable any SUID file: # chmod a-s <filename> Hiding System Information In a default Linux environment, login screen will show important information such as the Linux distribution name, version and kernel information. With this information, potential attacker might have the information he/she need to focus their attack to a specific version or name. By following these following steps will disable the information and will only show login: at the login menu. Edit /etc/rc.d/rc.local and put # to comment out the following lines: # This will overwrite /etc/issue at every boot. So, make any changes you # want to make to /etc/issue here or you will lose them when you reboot. #echo "" > /etc/issue #echo "$R" >> /etc/issue #echo "Kernel $(uname -r) on $a $(uname -m)" >> /etc/issue # #cp -f /etc/issue /etc/issue.net #echo >> /etc/issue The system banner information is only applicable for local logins or remote telnet logins. It is a good practice that the use of telnet is replace by ssh (secure shell) which is more secure and provide encryption Other Utilities Built-in utilities in Linux might not be able to prevent or detect malicious activities fully. There are several tools that add more security enhancement to the system. Such tools provide configuration interface, system files integrity check, intrusion detection system and more. Below are some useful third party programs for Linux Tripwire Tripwire is a policy driven file system integrity checking tool that allows system administrators to verify the integrity of their data. The program monitors key attributes of files that should not change, including binary signature, size, expected change of size, etc. Tripwire is originally known as an intrusion detection tool, but can be used for many other purposes such as integrity assurance, change management, policy compliance and more
20 4.16. Sentry Tools The Sentry tools provide host-level security services for the UNIX platform. PortSentry, Logcheck/LogSentry, and HostSentry protect against portscans, automate log file auditing, and detect suspicious login activity on a continuous basis. Portsentry provides detection against scanning and response to it. It runs as a daemon and blocks scanning addresses from connecting to the system Bastille Bastille is a useful tool that attempts to "harden" or "tighten" UNIX operating systems, by configuring daemons, system settings and firewall. It currently supports the Red Hat, Debian, Mandrake, SuSE and TurboLinux Linux distributions along with HP-UX and Mac OS X. 20
21 5. Conclusion Linux has become a major operating system used worldwide both for workstations and servers. Practicing good security measures prevents undesirable events that may jeopardize the organization. This paper has provided basic instructions and guides to secure the Linux system. Also note that, this guideline is generic and based on Redhat 9.0. Different setups may require different approach in hardening the system. Following these steps provide improved security on default Linux installation. Users are recommended to harden their system further based on their system configuration. Even applying latest security patches or updates, there is no 100% security. The best way is to apply security techniques and methodology to make it as difficult as possible for the system from being compromised. 21
22 References Koutras, Chris. The process of hardening Linux. Sans Institute, January Wirzenius, Lars, Oja, Joanna, Stafford, Stephen, Weeks, Alex. The Linux System Administrator s Guide. Version December Burgiss, Hal. Security Quick-Start HOWTO for Linux. Version July
Host Hardening. OS Vulnerability test. CERT Report on systems vulnerabilities. (March 21, 2011)
Host Hardening (March 21, 2011) Abdou Illia Spring 2011 CERT Report on systems vulnerabilities Source: CERT Report @ http://www.kb.cert.org/vuls/bymetric 2 OS Vulnerability test Source: http://www.omninerd.com/articles/2006_operating_system_vulnerabilit
Linux Security Ideas and Tips
Linux Security Ideas and Tips Hugh Brown Sr. Systems Administrator ITS Enterprise Infrastructure University of Iowa October 8, 2014 Hugh Brown (University of Iowa) Linux Security Ideas and Tips October
Getting Started in Red Hat Linux An Overview of Red Hat Linux p. 3 Introducing Red Hat Linux p. 4 What Is Linux? p. 5 Linux's Roots in UNIX p.
Preface p. ix Getting Started in Red Hat Linux An Overview of Red Hat Linux p. 3 Introducing Red Hat Linux p. 4 What Is Linux? p. 5 Linux's Roots in UNIX p. 6 Common Linux Features p. 8 Primary Advantages
Linux Operating System Security
Linux Operating System Security Kenneth Ingham and Anil Somayaji September 29, 2009 1 Course overview This class is for students who want to learn how to configure systems to be secure, test the security
Introduction to Linux (Authentication Systems, User Accounts, LDAP and NIS) Süha TUNA Res. Assist.
Introduction to Linux (Authentication Systems, User Accounts, LDAP and NIS) Süha TUNA Res. Assist. Outline 1. What is authentication? a. General Informations 2. Authentication Systems in Linux a. Local
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
The Tor VM Project. Installing the Build Environment & Building Tor VM. Copyright 2008 - The Tor Project, Inc. Authors: Martin Peck and Kyle Williams
The Tor VM Project Installing the Build Environment & Building Tor VM Authors: Martin Peck and Kyle Williams Table of Contents 1. Introduction and disclaimer 2. Creating the virtualization build environment
Security Audit Report for ACME Corporation
Security Audit Report for ACME Corporation Acme Security Audit 1 Table of Contents Acme Security Audit...3 Executive Summary...3 Security Architecture and Design...5 Network Security...7 Host Security...10
HP Education Services
HP Education Services HP-UX Security (H3541S) Concerned about system security? HP s updated and enhanced HP-UX Security course can help you secure your systems and mitigate risks. Designed for experienced
Linux FTP Server Setup
17Harrison_ch15.qxd 2/25/05 10:06 AM Page 237 C H A P T E R 15 Linux FTP Server Setup IN THIS CHAPTER FTP Overview Problems with FTP and Firewalls How to Download and Install VSFTPD How to Get VSFTPD Started
1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained
home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:
Introduction to Operating Systems
Introduction to Operating Systems It is important that you familiarize yourself with Windows and Linux in preparation for this course. The exercises in this book assume a basic knowledge of both of these
What is included in the ATRC server support
Linux Server Support Services What is included in the ATRC server support Installation Installation of any ATRC Supported distribution Compatibility with client hardware. Hardware Configuration Recommendations
Security Best Practice
Security Best Practice Presented by Muhibbul Muktadir Tanim [email protected] 1 Hardening Practice for Server Unix / Linux Windows Storage Cyber Awareness & take away Management Checklist 2 Hardening Server
modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:
SERVER SECURITY STANDARD Security Standards are mandatory security rules applicable to the defined scope with respect to the subject. Overview Scope Purpose Instructions Improperly configured systems,
System Area Manager. Remote Management
System Area Manager Remote Management Remote Management System Area Manager provides remote management functions for its managed systems, including Wake on LAN, Shutdown, Restart, Remote Console and for
Using Network Attached Storage with Linux. by Andy Pepperdine
Using Network Attached Storage with Linux by Andy Pepperdine I acquired a WD My Cloud device to act as a demonstration, and decide whether to use it myself later. This paper is my experience of how to
HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline CIS 110 - INTRODUCTION TO UNIX
HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline CIS 110 - INTRODUCTION TO UNIX Course Description: This is an introductory course designed for users of UNIX. It is taught
How To Set Up A Network Map In Linux On A Ubuntu 2.5 (Amd64) On A Raspberry Mobi) On An Ubuntu 3.5.2 (Amd66) On Ubuntu 4.5 On A Windows Box
CSC-NETLAB Packet filtering with Iptables Group Nr Name1 Name2 Name3 Date Instructor s Signature Table of Contents 1 Goals...2 2 Introduction...3 3 Getting started...3 4 Connecting to the virtual hosts...3
Construction of a Web Server with a Database Facility Using Open Source Software
Construction of a Web Server with a Database Facility Using Open Source Software Munkhjargal Purevdorj* and Tadashi OKADA** This report is about using an open source operating system for constructing a
Security Advice for Instances in the HP Cloud
Security Advice for Instances in the HP Cloud Introduction: HPCS protects the infrastructure and management services offered to customers including instance provisioning. An instance refers to a virtual
QuickBooks Enterprise Solutions. Linux Database Server Manager Installation and Configuration Guide
QuickBooks Enterprise Solutions Linux Database Server Manager Installation and Configuration Guide Copyright Copyright 2007 Intuit Inc. All rights reserved. STATEMENTS IN THIS DOCUMENT REGARDING THIRD-PARTY
Firewalling and Network Security I -Linux. Jeff Muday Academic Computing Specialist Wake Forest University
Firewalling and Network Security I -Linux Jeff Muday Academic Computing Specialist Wake Forest University Objectives: Firewalling and Network Security After completing this module you should be able to
Chapter 11 Phase 5: Covering Tracks and Hiding
Chapter 11 Phase 5: Covering Tracks and Hiding Attrition Web Site Contains an archive of Web vandalism attacks http://www.attrition.org/mirror/attrition Most attackers, however, wish to keep low profile
Linux Boot Camp. Our Lady of the Lake University Computer Information Systems & Security Department Kevin Barton Artair Burnett
Linux Boot Camp Our Lady of the Lake University Computer Information Systems & Security Department Kevin Barton Artair Burnett Schedule for the Week Schedule for the Week Mon Welcome from Enrollment Management
Running a Default Vulnerability Scan
Running a Default Vulnerability Scan A Step-by-Step Guide www.saintcorporation.com Examine. Expose. Exploit. Welcome to SAINT! Congratulations on a smart choice by selecting SAINT s integrated vulnerability
Information Technology Security Procedures
Information Technology Security Procedures Prepared By: Paul Athaide Date Prepared: Dec 1, 2010 Revised By: Paul Athaide Date Revised: September 20, 2012 Version 1.2 Contents 1. Policy Procedures... 3
Command Line Interface User Guide for Intel Server Management Software
Command Line Interface User Guide for Intel Server Management Software Legal Information Information in this document is provided in connection with Intel products. No license, express or implied, by estoppel
SSL Tunnels. Introduction
SSL Tunnels Introduction As you probably know, SSL protects data communications by encrypting all data exchanged between a client and a server using cryptographic algorithms. This makes it very difficult,
PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:
A SYSTEMS UNDERSTANDING A 1.0 Organization Objective: To ensure that the audit team has a clear understanding of the delineation of responsibilities for system administration and maintenance. A 1.1 Determine
Security Maintenance Practices. IT 4823 Information Security Administration. Patches, Fixes, and Revisions. Hardening Operating Systems
IT 4823 Information Security Administration Securing Operating Systems June 18 Security Maintenance Practices Basic proactive security can prevent many problems Maintenance involves creating a strategy
RED HAT SECURE WEB SERVER 3.0 DEVELOPER EDITION FOR COBALT NETWORKS SERVERS
RED HAT SECURE WEB SERVER 3.0 DEVELOPER EDITION FOR COBALT NETWORKS SERVERS Cobalt Secure Web Server (SSL) Cobalt Networks, Inc Features: 128 bit Encryption* Based on Redhat's Secure Server Apache 1.3.6
Nixu SNS Security White Paper May 2007 Version 1.2
1 Nixu SNS Security White Paper May 2007 Version 1.2 Nixu Software Limited Nixu Group 2 Contents 1 Security Design Principles... 3 1.1 Defense in Depth... 4 1.2 Principle of Least Privilege... 4 1.3 Principle
Linux Security on HP Servers: Security Enhanced Linux. Abstract. Intended Audience. Technical introduction
Linux Security on HP Servers: Security Enhanced Linux Technical introduction This white paper -- one in a series of Linux security white papers -- discusses Security Enhanced Linux (SELinux), a mandatory
RecoveryVault Express Client User Manual
For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by
A REVIEW OF METHODS FOR SECURING LINUX OPERATING SYSTEM
A REVIEW OF METHODS FOR SECURING LINUX OPERATING SYSTEM 1 V.A.Injamuri Govt. College of Engineering,Aurangabad, India 1 [email protected] Abstract This paper is focused on practical securing Linux
My FreeScan Vulnerabilities Report
Page 1 of 6 My FreeScan Vulnerabilities Report Print Help For 66.40.6.179 on Feb 07, 008 Thank you for trying FreeScan. Below you'll find the complete results of your scan, including whether or not the
IS TEST 3 - TIPS FOUR (4) levels of detective controls offered by intrusion detection system (IDS) methodologies. First layer is typically responsible for monitoring the network and network devices. NIDS
BF2CC Daemon Linux Installation Guide
BF2CC Daemon Linux Installation Guide Battlefield 2 + BF2CC Installation Guide (Linux) 1 Table of contents 1. Introduction... 3 2. Opening ports in your firewall... 4 3. Creating a new user account...
1. Product Information
ORIXCLOUD BACKUP CLIENT USER MANUAL LINUX 1. Product Information Product: Orixcloud Backup Client for Linux Version: 4.1.7 1.1 System Requirements Linux (RedHat, SuSE, Debian and Debian based systems such
Bastille Linux: Security Through Transparency
Bastille Linux: Security Through Transparency Jon Lasser University of Maryland, Baltimore County (UMBC) [email protected] 2000 March 24 Overview A Brief History of Bastille Linux Philosophy Step-By-Step Overview
Secure Installation and Operation of Your Xerox Multi-Function Device. Version 1.0 August 6, 2012
Secure Installation and Operation of Your Xerox Multi-Function Device Version 1.0 August 6, 2012 Secure Installation and Operation of Your Xerox Multi-Function Device Purpose and Audience This document
Online Backup Client User Manual Linux
Online Backup Client User Manual Linux 1. Product Information Product: Online Backup Client for Linux Version: 4.1.7 1.1 System Requirements Operating System Linux (RedHat, SuSE, Debian and Debian based
Small Systems Solutions is the. Premier Red Hat and Professional. VMware Certified Partner and Reseller. in Saudi Arabia, as well a competent
T R A I N I N G C O U R S E S T H E # 1 L I N U X A N D O P E N S O U R C E P R O V I D E R I N S A U D I A R A B I A Introd uction to Linux Administra tion Adva nce Linux Ad ministrati on Linux Identity
Online Backup Linux Client User Manual
Online Backup Linux Client User Manual Software version 4.0.x For Linux distributions August 2011 Version 1.0 Disclaimer This document is compiled with the greatest possible care. However, errors might
Running a Default Vulnerability Scan SAINTcorporation.com
SAINT Running a Default Vulnerability Scan A Step-by-Step Guide www.saintcorporation.com Examine. Expose. Exploit. Install SAINT Welcome to SAINT! Congratulations on a smart choice by selecting SAINT s
System Security Policy Management: Advanced Audit Tasks
System Security Policy Management: Advanced Audit Tasks White Paper October 6, 2005 2005 Altiris Inc. All rights reserved. ABOUT ALTIRIS Altiris, Inc. is a pioneer of IT lifecycle management software that
Unix Network Security
/ UnixNetworkSecuirty-05-2004-CIT-ACDS Unix Network Security Mehmet Balman / Introduction A machine connected to phone lines or local network has the potential for intruders. Therefore security aspect
Online Backup Client User Manual
For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
USFSP Network Security Guidelines
USFSP Network Security Guidelines Table of Contents I. Access to Data II. Workstations and Personal Computers A. Computer Viruses B. Software C. Hardware D. Storage Media III. Local Area Networks (LANs)
Locking down a Hitachi ID Suite server
Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime
Intuit QuickBooks Enterprise Solutions. Linux Database Server Manager Installation and Configuration Guide
Intuit QuickBooks Enterprise Solutions Linux Database Server Manager Installation and Configuration Guide Copyright Copyright 2013 Intuit Inc. All rights reserved. STATEMENTS IN THIS DOCUMENT REGARDING
Network Security Policy
Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus
Secure Shell Demon setup under Windows XP / Windows Server 2003
Secure Shell Demon setup under Windows XP / Windows Server 2003 Configuration inside of Cygwin $ chgrp Administrators /var/{run,log,empty} $ chown Administrators /var/{run,log,empty} $ chmod 775 /var/{run,log}
How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)
Security principles Firewalls and NAT These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Host vs Network
GLS250 "Enterprise Linux Systems Administration"
GLS250 "Enterprise Linux Systems Administration" Intended for students already comfortable with working in the Unix environment, this in-depth course helps students acquire the variety of skills needed
Features. The Samhain HIDS. Overview of available features. Rainer Wichmann
Overview of available features November 1, 2011 POSIX (e.g. Linux, *BSD, Solaris 2.x, AIX 5.x, HP-UX 11, and Mac OS X. Windows 2000 / WindowsXP with POSIX emulation (e.g. Cygwin). Please note that this
Secure Software Programming and Vulnerability Analysis
Secure Software Programming and Vulnerability Analysis Christopher Kruegel [email protected] http://www.auto.tuwien.ac.at/~chris Operations and Denial of Service Secure Software Programming 2 Overview
Security Configuration Guide P/N 300-010-493 Rev A05
EMC VPLEX Security Configuration Guide P/N 300-010-493 Rev A05 June 7, 2011 This guide provides an overview of VPLEX security configuration settings, including secure deployment and usage settings needed
Acronis Backup & Recovery 11.5 Quick Start Guide
Acronis Backup & Recovery 11.5 Quick Start Guide Applies to the following editions: Advanced Server for Windows Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server
User Manual. Copyright Rogev LTD
User Manual Copyright Rogev LTD Introduction Thank you for choosing FIXER1. This User's Guide is provided to you to familiar yourself with the program. You can find a complete list of all the program's
COURCE TITLE DURATION LPI-202 Advanced Linux Professional Institute 40 H.
COURCE TITLE DURATION LPI-202 Advanced Linux Professional Institute 40 H. IMPLEMENTING A WEB SERVER Apache Architecture Installing PHP Apache Configuration Files httpd.conf Server Settings httpd.conf Main
SCP - Strategic Infrastructure Security
SCP - Strategic Infrastructure Security Lesson 1 - Cryptogaphy and Data Security Cryptogaphy and Data Security History of Cryptography The number lock analogy Cryptography Terminology Caesar and Character
Windows Operating Systems. Basic Security
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
Guide to Securing Microsoft Windows 2000 DHCP
Guide to Securing Microsoft Windows 2000 DHCP Systems and Network Attack Center (SNAC) Updated: 19 July 2002 Version 1.3 National Security Agency 9800 Savage Rd. Suite 6704 Ft. Meade, MD 20755-6704 410-854-6015
AST2150 IPMI Configuration Guide
AST2150 IPMI Configuration Guide Version 1.1 Copyright Copyright 2011 MiTAC International Corporation. All rights reserved. No part of this manual may be reproduced or translated without prior written
LAMP Quickstart for Red Hat Enterprise Linux 4
LAMP Quickstart for Red Hat Enterprise Linux 4 Dave Jaffe Dell Enterprise Marketing December 2005 Introduction A very common way to build web applications with a database backend is called a LAMP Stack,
Guardian Digital WebTool Firewall HOWTO. by Pete O Hara
Guardian Digital WebTool Firewall HOWTO by Pete O Hara Guardian Digital WebTool Firewall HOWTO by by Pete O Hara Revision History Revision $Revision: 1.1 $ $Date: 2006/01/03 17:25:17 $ Revised by: pjo
Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours
Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours Introduction The following lab allows the trainee to obtain a more in depth knowledge of network security and
Integrated Citrix Servers
Installation Guide Supplement for use with Integrated Citrix Servers Websense Web Security Websense Web Filter v7.5 1996-2010, Websense, Inc. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA All rights
SmartFiler Backup Appliance User Guide 2.0
SmartFiler Backup Appliance User Guide 2.0 SmartFiler Backup Appliance User Guide 1 Table of Contents Overview... 5 Solution Overview... 5 SmartFiler Backup Appliance Overview... 5 Getting Started... 7
Cyber Essentials Questionnaire
Cyber Essentials Questionnaire Introduction The Cyber Essentials scheme is recommended for organisations looking for a base level Cyber security test where IT is a business enabler rather than a core deliverable.
Track 2 Workshop PacNOG 7 American Samoa. Firewalling and NAT
Track 2 Workshop PacNOG 7 American Samoa Firewalling and NAT Core Concepts Host security vs Network security What is a firewall? What does it do? Where does one use it? At what level does it function?
Hacking Database for Owning your Data
Hacking Database for Owning your Data 1 Introduction By Abdulaziz Alrasheed & Xiuwei Yi Stealing data is becoming a major threat. In 2012 alone, 500 fortune companies were compromised causing lots of money
EXPLORING LINUX KERNEL: THE EASY WAY!
EXPLORING LINUX KERNEL: THE EASY WAY! By: Ahmed Bilal Numan 1 PROBLEM Explore linux kernel TCP/IP stack Solution Try to understand relative kernel code Available text Run kernel in virtualized environment
Worms, Trojan Horses and Root Kits
Worms, Trojan Horses and Root Kits Worms A worm is a type of Virus that is capable of spreading and replicating itself autonomously over the internet. Famous Worms Morris Internet worm (1988) Currently:
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.
Red Hat Linux Networking
The information presented should act as a guide to Red Hat Linux networking. It is intended to be accompanied with training and self study. To access most of these items you will need to have root access,
Network Infrastructure Security Recommendations
Hardening Red Hat Enterprise Linux Ensure that file systems with user-writeable directories (ie /home, /tmp, /var/tem) are mounted on separate partitions. Ensure updates are applied as soon as they become
VMware ESX Server 3 Configuration Guide
Date: 03/03/08 VMware ESX Server 3 Configuration Guide Enterprise Applications Division of the Systems and Network Analysis Center (SNAC) Information Assurance Directorate National Security Agency 9800
Dell Statistica 13.0. Statistica Enterprise Installation Instructions
Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or
Determine if the expectations/goals/strategies of the firewall have been identified and are sound.
Firewall Documentation Develop background information about the firewall(s) in place: Segment diagrams Software Hardware Routers Version levels Host names IP addresses Connections Specific policies for
Guide to Securing Microsoft Windows 2000 Encrypting File System
Report Number: C4-006R-01 Guide to Securing Microsoft Windows 2000 Encrypting File System Systems and Network Attack Center (SNAC) Authors: Graham Bucholz Harley Parkes Updated: January 2001 Version 1.0
Online Backup Client User Manual
Online Backup Client User Manual Software version 3.21 For Linux distributions January 2011 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have
Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee
Windows Server Security Best Practices Initial Document Created By: 2009 Windows Server Security Best Practices Committee Document Creation Date: August 21, 2009 Revision Revised By: 2014 Windows Server
CUIT UNIX Standard Operating Environment and Security Best Practices
Objective and Scope Effective Date: August 2008 This CUIT UNIX Standard Operating Environment (SOE) document defines the agreed system hardening requirements as well as security best practices for CUIT
Installation Notes for Outpost Network Security (ONS) version 3.2
Outpost Network Security Installation Notes version 3.2 Page 1 Installation Notes for Outpost Network Security (ONS) version 3.2 Contents Installation Notes for Outpost Network Security (ONS) version 3.2...
SonicWALL PCI 1.1 Implementation Guide
Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard
RemotelyAnywhere. Security Considerations
RemotelyAnywhere Security Considerations Table of Contents Introduction... 3 Microsoft Windows... 3 Default Configuration... 3 Unused Services... 3 Incoming Connections... 4 Default Port Numbers... 4 IP
Linux Server Configuration Guidelines
Linux Server Configuration Guidelines This document is meant to be a living document and intended to accompany more detailed, step- by- step resources. Suggestions in this document are taken from administrators
13. Configuring FTP Services in Knoppix
13. Configuring FTP Services in Knoppix Estimated Time: 45 minutes Objective In this lab, the student will configure Knoppix as an FTP server. Equipment The following equipment is required for this exercise:
SECURITY ARCHITECTURE
Chapter 9........................................ Shih planned to make a great wall by extending and enlarging preexisting walls made by previous rulers. This great wall would serve as a barricade to keep
