Securing your Linux Server: Racing against the attacker. Nigel Edwards Hewlett-Packard <nigel_edwards@hp.com>



Similar documents
Worms, Trojan Horses and Root Kits

HP Education Services

Linux Operating System Security

Information Security Measures and Monitoring System at BARC. - R.S.Mundada Computer Division B.A.R.C., Mumbai-85

CSE331: Introduction to Networks and Security. Lecture 17 Fall 2006

Cloud Security:Threats & Mitgations

Open Source Security: Opportunity or Oxymoron?

CRYPTUS DIPLOMA IN IT SECURITY

Intrusion Detection Systems (IDS)

SCP - Strategic Infrastructure Security

Host Hardening. OS Vulnerability test. CERT Report on systems vulnerabilities. (March 21, 2011)

How To Protect A Network From Attack From A Hacker (Hbss)

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

Chapter 11 Phase 5: Covering Tracks and Hiding

Course Title: Course Description: Course Key Objective: Fee & Duration:

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

nmap, nessus, and snort Vulnerability Analysis & Intrusion Detection

NETWORK SECURITY HACKS *

6WRUP:DWFK. Policies for Dedicated SQL Servers Group

CSE331: Introduction to Networks and Security. Lecture 18 Fall 2006

Security Audit Principles and Practices. Configuring Logging. Overview

Network Security and Firewall 1

Nessus Agents. October 2015

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Hands-On Ethical Hacking and Network Defense Second Edition Chapter 8 Desktop and Server OS Vulnerabilities

Application Intrusion Detection

CSE331: Introduction to Networks and Security. Lecture 32 Fall 2004

Secure to the Core: The Next Generation Secure Operating System from CyberGuard

THE ROLE OF IDS & ADS IN NETWORK SECURITY

6WRUP:DWFK. Policies for Dedicated IIS Web Servers Group. V2.1 policy module to restrict ALL network access

Second-generation (GenII) honeypots

Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12

Scanning Tools. Scan Types. Network sweeping - Basic technique used to determine which of a range of IP addresses map to live hosts.

Computer Networks & Computer Security

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Network Attacks and Defenses

Network Incident Report

Certified Ethical Hacker Exam Version Comparison. Version Comparison

LINUX SECURITY COOKBOOK. DanieIJ. Barren, Richard E Silverman, and Robert G. Byrnes

Introduction Open Source Security Tools for Information Technology Professionals

Hackers: Detection and Prevention

Self Service Penetration Testing

Course Title: Penetration Testing: Security Analysis

Penetration Testing Workshop

VULNERABILITY ASSESSMENT WHITEPAPER INTRODUCTION, IMPLEMENTATION AND TECHNOLOGY DISCUSSION

Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014

System Security Guide for Snare Server v7.0

An Overview of the Bro Intrusion Detection System

Open Source Security Tools

Security Maintenance Practices. IT 4823 Information Security Administration. Patches, Fixes, and Revisions. Hardening Operating Systems

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Security Event Management. February 7, 2007 (Revision 5)

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

VMware vcenter Log Insight Security Guide

Kaspersky Endpoint Security 10 for Windows. Deployment guide

Nessus and Antivirus. January 31, 2014 (Revision 4)

60467 Project 1. Net Vulnerabilities scans and attacks. Chun Li

Nixu SNS Security White Paper May 2007 Version 1.2

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

IDS / IPS. James E. Thiel S.W.A.T.

Getting Started in Red Hat Linux An Overview of Red Hat Linux p. 3 Introducing Red Hat Linux p. 4 What Is Linux? p. 5 Linux's Roots in UNIX p.

How To Fix A Snare Server On A Linux Server On An Ubuntu (Amd64) (Amd86) (For Ubuntu) (Orchestra) (Uniden) (Powerpoint) (Networking

Secure Software Programming and Vulnerability Analysis

New possibilities in latest OfficeScan and OfficeScan plug-in architecture

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

Hands-on Hacking Unlimited

Secure computing: SELinux

Security Audit Report for ACME Corporation

TECHNICAL NOTE 08/04 IINTRODUCTION TO VULNERABILITY ASSESSMENT TOOLS

Unix Security Technologies. Pete Markowsky <peterm[at] ccs.neu.edu>

COURCE TITLE DURATION LPI-202 Advanced Linux Professional Institute 40 H.

Chapter 9 Firewalls and Intrusion Prevention Systems

Hitachi Backup Services Manager Certified Configurations Guide 6.5

P Principles of Network Forensics P Terms & Log-based Tracing P Application Layer Log Analysis P Lower Layer Log Analysis

Open Source Security Tools for Information Technology Professionals

WEB SECURITY. Oriana Kondakciu Software Engineering 4C03 Project

Contents. vii. Preface. P ART I THE HONEYNET 1 Chapter 1 The Beginning 3. Chapter 2 Honeypots 17. xix

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

Snare System Version Release Notes

Unix Network Security

IDS and Penetration Testing Lab ISA 674

CONQUERING COMPLIANCE ISSUES WITH RHN SATELLITE AND TENABLE NESSUS SECURITY

Hosts HARDENING WINDOWS NETWORKS TRAINING

information security and its Describe what drives the need for information security.


Virtualization System Security

Certified Ethical Hacker (CEH)

Security: Attack and Defense

Transcription:

Securing your Linux Server: Racing against the attacker Nigel Edwards Hewlett-Packard <nigel_edwards@hp.com>

Agenda The major source of security vulnerabilities Security strategies Patching Layered utilities (Nessus, Snare, Snort..) Kernel hardening (HP Secure OS Software for Linux or hp-lx (se))

What s the nature of the problem? Bugs are the major source of vulnerabilities Application bugs accountfor about 80% CE RT issued 37 securityadvisories in 2001 http://w w w.cert.org/advisories/ 30 concerned bugs in applications 4 concerned bugs in appliances 2 did not concern bugs Only 1 general purpose kernel bug

An example of a bug exploit in The Ramen worm Expoited (buffer overflow) bugs in: Rpc.statd Wu-ftpd LPRng Root access gained Executables overwritten Web pages defaced Network probed for other vulnerable hosts Linux

Root Kits Hide the attackers presence Allow repeated use of the system by attackers Two variants Updated system binaries Loadable kernel module

Patching Security Alerts Vendor security bulletins Bugtraq, CERT, etc, Managed services e.g. Security Focus Automated services Aduva - http://www.aduva.com/ Red Hat - https://rhn.redhat.com/

Problems with Patching Not all problems are known you may be victim before the patch is available or before you can apply the patch The attackers are reading the same information sources who is going to win..?

Tools and utilities Bastille (http://www.bastille-linux.org/) Local system scanners (e.g. Tiger) (http://savannah.gnu.org/projects/tiger/) Remote system scanners (e.g. Nessus) Intrusion detection (Snort) Audit (Snare) Psionic PortSentry, HostSentry and LogCheck (http://www.psionic.com/) Tripwire

(Remote) System Scanners Nessus http://www.nessus.org/ Internet Security Systems System Scanner http://www.iss.net/ And many more Scan Server Target

Nessus

Scanner effectiveness 100 % = 17 Source: Network Computing January, 2001 http://ww w.networkcom puting.com/ 16 14 12 10 8 6 4 2 0 Nessus NetRecon 3.0 Security Scanner Cybercop Scanner Hacker Shield SARA Saint Retina

Snort intrusion detection system Packet sniffer and logger Potentially can detect various attacks including: Port scans Buffer overflows http://www.snort.org/ See also tcpdump

Snort example output

Tripwire(& friends) Intrusion detection Periodically (e.g. daily) scans files to detect changes Email notification to administrator Update tripwire database or Manually revert file Included in some distributions (e.g. Red Hat 7.1) http://www.tripwire.org/ Chkrootkit http://www.chkrootkit.org/

Limitations of patching and layered security utilities Not all vulnerabilities and bugs are known A patch may not be available You may not apply the patch in time Two types of layered utilities Signature based Not 100% of known vulnerabilities Useless against unknown vulnerabilities State monitoring Detection not prevention Kernel root kits are extremely difficult to detect

Agenda The major source of security vulnerabilities Security strategies Patching Layered utilities (Nessus, Snare, Snort..) Kernel hardening (HP Secure OS Software for Linux or hp-lx (se))

Kernel hardening The philosophy of Containment Bugs are inevitable You cannot not know what a program will do until it runs Misconfiguration and administration errors are inevitable Attempt to contain the damage A sandbox limits access to system and network resources Control access to privilege (e.g. root)

Kernel hardening historical challenges Can require extensive integration work to port an application or service Administration complexity Kernel code changes Recent newer models such as hp-lx (se) have improved the situtation

An Attack Pathology Cause: Exploited known bugs in services: rpc.statd, WU-FTP, LPRng Patches Layered utilities (signature based IDS, vulnerability scanners,..) Effect: Bufferoverflow attacker controls process executing the service Code is downloaded to overwrite so me syste m excutables Root access is gained index.html files overwritten, Rootkitinstalled The netw ork is probed looking for other vulnerable hosts Detection: Audit N on-signature based IDS Prevention: Kernel hardening

Discretionary access control (DAC) -rw-r--r-- -rw-r--r-- -rw-r--r-- -rw-r--r-- -rw-r--r-- -rw-r--r-- -rw-r--r-- -rw-r--r-- 1 1 nje nje users users 3083399 3083399 Nov Nov 18 18 1998 1998 BellLaPadula.pdf BellLaPadula.pdf 1 1 nje nje users users 8082702 8082702 Nov Nov 1 1 2000 2000 ande72.pdf ande72.pdf 1 1 nje nje users users 1580903 1580903 Nov Nov 1 1 2000 2000 ande80.pdf ande80.pdf 1 1 nje nje users users 433265 433265 Nov Nov 1 1 2000 2000 dod85.pdf dod85.pdf CONTAINMENT File owner can grant access to anybody DAC does not give good containment properties Users can change who gets access to different parts of the system Users can be tricked into updating files which they own to introduce Trojan Horses

Mandatory Access Control (MAC) MAC CONTAINMENT Mandatory Access Control Access control beyond the discretion ofthe owner Department of Defense Trusted Co mputer System Evaluation Criteria, DoD 5200.28-STD, December,1985 Importantfor protecting sensitive files Web pages,executables, Importantfor protecting other syste m resources E.G. communication channels Importantfor constraining the user/process to a kno wn partof the syste m - CONTAINMENT

What is hp-lx (se)? A highly secure version of Linux for running applications and services Service provider focus Building on the success of HP Virtualvault Balance ease of use with security A new security model focused on Internet services and applications Minimal kernel changes Binary compatible with Red Hat 7.1 HP will deliver: Example services (e.g. Apache) SDK and (eventually) integration tools

hp-lx (se) breakthrough manageability "We chose HP Secure OS for Linux because of its ease of use and administration and for its superior security features. Konstantin Agouros Manager, Competence Team Security NetAge Solutions http://www.netage.de/

Review of major features Secure remote ad ministration hp-lx (se) application configuratio ns System configuration lockdown File access control Communication control Co mpartments Kernel-level auditing

HP-LX compartment communication rules HOST:* -> COMPARTMENT:WEB METHOD TCP PORT 80 NETDEV eth0 Explicitpaths in hp-lx (se) TOMCAT1 COMPARTMENT:WEB -> COMPARTMENT:TOMCAT1 METHOD TCP PORT 8007 NETDEV lo COMPARTMENT:WEB -> COMPARTMENT:TOMCAT2 METHOD TCP PORT 8008 NETDEV lo WEB eth0 TOMCAT2 eth1 COMPARTMENT:TOMCAT1 -> HOST:SERVER1 METHOD TCP PORT 8080 NETDEV eth1 MAC

HP-LX file system protection File ControlTable specifies compartment access: read, write,append Fine-grain control and coarse grain (perfile, per directory) MAC web /compt/web read web /compt/web/tmp read,write web /compt/web/dev read,write web /compt/web/apache/logs read,write Tripwire Integrityprotection Mandatory Access Control

Why is kernel-level Auditing important? Answer:itis very hard to by-pass

A secure administration model (1/2) other utilities & applications hp-lx (se) administration utilities System calls Kernel+ LK M s hp-lx (se) managementutilities Create, destroy, start,stop compartments Configure communication rules for compartments Manage audit system How do we stop the abuse ofthe system calls used forthis?

A secure administration model (2/2) PAM init SSH login SSHD SSH login Authorized ad ministrator tlx_admin set Shell tlx_admin set Shell tlx_admin cleared Each process has an additionalattribute: The tlx_ad min bit Code inside kernelchecks forthis bitbefore executing administration functions W orks in parallelto Linux capability mechanism (which we also use) A more restricted management modelthan capabilities Authorized user, not authorized ad ministrator

Typical hp-lx (se) compartment configuration Administration compartment External Network Web (apache) Audit (auditd) Syslog (syslogd, klogd) Backup (Amandad) Xinetd (xinetd) Mailtransportagent Internal (send m ail) Network System (cron, getty, crond) To mcat (tomcat) SSHD (sshd)

Conclusion Patching Window of vulnerability leads to race condition Application level utilities Signature based Window of vulnerability leads to race condition Not 100% effective State monitoring Detection not prevention Kernel hardening e.g. hp-lx (se) Containment prevents known and UNKNOWN attacks