System Management. Leif Nixon. a security perspective 1/37



Similar documents
TestOps: Continuous Integration when infrastructure is the product. Barry Jaspan Senior Architect, Acquia Inc.

Do it Yourself System Administration

RH033 Red Hat Linux Essentials or equivalent experience with Red Hat Linux..

How To Run A Linux Agent On Alandesk (For Free) On A Linux Server (For A Non-Free) On Your Ubuntu Computer (For Cheap) On An Ubuntu 2.5 (For Ubuntu) On Linux

SysPatrol - Server Security Monitor

Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014

Red Hat Linux Administration II Installation, Configuration, Software and Troubleshooting

ESX 4 Patch Management Guide ESX 4.0

Installing an IBM Workplace/Portal Server on Linux

Training on Linux System Administration, LPI Certification Level 1

Red Hat Certifications: Red Hat Certified System Administrator (RHCSA)

Operating System Security Hardening for SAP HANA

Linux Security Ideas and Tips

White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary

Application Intrusion Detection

PARALLELS SERVER 4 BARE METAL README

HP PolyServe Software upgrade guide

Linux Operating System Security

AlienVault Unified Security Management (USM) 4.x-5.x. Deploying HIDS Agents to Linux Hosts

How to Use? SKALICLOUD DEMO

Host/Platform Security. Module 11

ovirt self-hosted engine seamless deployment

IBRIX Fusion 3.1 Release Notes

CloudPassage Halo Technical Overview

Using Virtual Machines

Direct Storage Access Using NetApp SnapDrive. Installation & Administration Guide

Vulnerability analysis

Nixu SNS Security White Paper May 2007 Version 1.2

IS L06 Protect Servers and Defend Against APTs with Symantec Critical System Protection

The current version installed on your server is el6.x86_64 and it's the latest available.

ANDRA ZAHARIA MARCOM MANAGER

Aqua Connect Load Balancer User Manual (Linux)

NOC PS manual. Copyright Maxnet All rights reserved. Page 1/45 NOC-PS Manuel EN version 1.3

PARALLELS SERVER BARE METAL 5.0 README

Hardened Hosting. Quintin Russ. OWASP New Zealand Chapter th December 2011

Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2)

Dell UPS Local Node Manager USER'S GUIDE EXTENSION FOR MICROSOFT VIRTUAL ARCHITECTURES Dellups.com

OBSERVEIT 6.0 WHAT S NEW

Penetration Testing Report Client: Business Solutions June 15 th 2015

Oracle Solaris Security: Mitigate Risk by Isolating Users, Applications, and Data

MarkLogic Server. Installation Guide for All Platforms. MarkLogic 8 February, Copyright 2015 MarkLogic Corporation. All rights reserved.

Plexxi Control Installation Guide Release 2.1.0

Remote Desktop How-To. How to log into your computer remotely using Windows XP, etc.

Prepared for: How to Become Cloud Backup Provider

CloudPassage Halo Technical Overview

Recommended File System Ownership and Privileges

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Work Environment. David Tur HPC Expert. HPC Users Training September, 18th 2015

Installing an OS on a Server

depl Documentation Release depl contributors

10 Ways to Not Get Caught Hacking On Your Mac

How to enable Disk Encryption on a laptop

Continuous Integration in the Cloud with Hudson

CUIT UNIX Standard Operating Environment and Security Best Practices

I N S T A L L A T I O N M A N U A L

Project 2: Penetration Testing (Phase II)

Hadoop Data Warehouse Manual

Administration GUIDE. SharePoint Server idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 201

Linux Server Support by Applied Technology Research Center. Proxy Server Configuration

SUSE LINUX Enterprise Server for SGI Altix Systems

Automated Deployment of Oracle RAC Using Enterprise Manager Provisioning Pack

OnCommand Performance Manager 1.1

VMware Horizon Workspace Security Features WHITE PAPER

Server Configuration and Deployment (part 1) Lotus Foundations Essentials

DriveLock and Windows 7

6WRUP:DWFK. Policies for Dedicated SQL Servers Group

Dynamics CRM 2011 Outlook Configuration Guide With Windows XP

Integration Module for BMC Remedy Helpdesk

Comodo One Software Version 1.8

Extending Remote Desktop for Large Installations. Distributed Package Installs

Hadoop Basics with InfoSphere BigInsights

Why Choose Oz Servers. Dedicated Hosting. Performance Meets Value at Oz Servers

Northwestern University Dell Kace Patch Management

Reboot the ExtraHop System and Test Hardware with the Rescue USB Flash Drive

RHCSA 7RHCE Red Haf Linux Certification Practice

Ubuntu Linux Reza Ghaffaripour May 2008

IT6204 Systems & Network Administration. (Optional)

Security Event Management. February 7, 2007 (Revision 5)

Online Backup Client User Manual Mac OS

Online Backup Client User Manual Mac OS

Idera SQL Diagnostic Manager Management Pack Guide for System Center Operations Manager. Install Guide. Idera Inc., Published: April 2013

With Great Power comes Great Responsibility: Managing Privileged Users

How to Install Windows 7 software

Virtualization System Security

Installing and Configuring Websense Content Gateway

Web Application Security

The Defense RESTs: Automation and APIs for Improving Security

/ Preparing to Manage a VMware Environment Page 1

The safer, easier way to help you pass any IT exams. Exam : 9L OS X Server Essentials 10.8 Exam. Title : Version : Demo 1 / 6

Cloud Security:Threats & Mitgations

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

JOOMLA SECURITY. ireland website design. by Oliver Hummel. ADDRESS Unit 12D, Six Cross Roads Business Park, Waterford City

Security Best Practice

Install guide for Websphere 7.0

The Paraná Digital Project

Deploying Windows Streaming Media Servers NLB Cluster and metasan

SERVER HARDENING. Presented by: Daniel Waymel and Corrin Thompson at TexSAW 2014 at the University of Texas at Dallas

Windows 8 Backup, Restore & Recovery By John Allen

Transcription:

1/37 System Management a security perspective Leif Nixon

2/37 System updates Should we ever update the system? Some common update strategies: 1. If it works, don t touch it! 2. We pick and choose the most important updates. 3. We apply all updates.

3/37 System updates Discovering the need to update Watch vendor announcement lists Watch general security lists Be part of a community that can afford to watch more specific resources

/37 System updates Triage Do we care? Useful scale: 1. Update later (scheduled or together with more important stuff) 2. Update as soon as we get an update in our preferred format 3. Take care of it right now in one way or another!

5/37 System updates Triage Do we care? Caution: Important for the vendor may still mean Critical for you! Most security advisories are not tuned for our environment, with many general shell users. A local root exploit is critical to us!

6/37 System updates Updating the triage Generally, things get more broken with time.

6/37 System updates Updating the triage Generally, things get more broken with time. Sometimes: lucky breaks in the other direction; Ah, it turns out the bug is only triggered if you use feature X We found this simple workaround

7/37 System updates Problems getting updates Waiting for repackagers Example: CentOS Waiting for vendor solutions Example: proprietary filesystem drivers Figuring out stuff built from source at site Example: a lot of big scientific packages

8/37 System updates Solutions for getting updates If it hurts, don t do it Limit dependency on turn-key solutions, third-party dependencies as far as possible. Make vendors understand our pain. Again and again. Until they understand. Prepare for building own packages Example: For RHEL/CentOS set up mock environment, do test builds of likely/hard components (kernel, glibc,...)

9/37 System updates Solutions for getting updates Document source builds so they can be redone by others Automatic build scripts/systems may help...... but not if too complicated! Make sure you have the credentials, licenses etc needed to download vendor updates when you need them.

0/37 Workarounds Trust, but verify Can we test that it works? Do we trust it? Always remember that even if one particular exploit fails, you may still be vulnerable...

11/37 Workarounds Systemtap to the rescue Systemtap is often useful for working around kernel vulnerabilities. Example: to block the CVE-2013-2094 vulnerability in the perfmonitor subsystem: probe kernel.function("sys_perf_event_open") printf("sys_perf_event_open DENIED!\n"); $attr_uptr = 0 }

12/37 How to deploy updates Updating login nodes and system servers Reboot not needed Updates can often be applied right away. Make sure enough stuff is restarted! Do you know about /usr/bin/needs-restarting? Reboot needed Multiple login servers help. Multiple redundant system servers help too. Otherwise, make sure a quick reboot does not cause user problems (lost jobs, failed file operations,... )

13/37 How to deploy updates Updating worker nodes Reboot not needed Updates may be applied right away, but...... do you care about OS jitter? Can we do work in the job epilog?... are you sure the update persists? (more on this later)

14/37 How to deploy updates Updating worker nodes Reboot needed Automate rolling updates (rebooting as soon as current job is done)! Keep users out of nodes they do not run jobs on. Can we accept the risk that users can login to nodes that are not yet updated? If not, shut down user login access to nodes.

15/37 No workaround, no update? Decide beforehand when it will be appropriate to shut down access. Get management acceptance for this.

15/37 No workaround, no update? Decide beforehand when it will be appropriate to shut down access. Get management acceptance for this. Levels: 1. No new logins accepted, but do not kick out those who are logged in. 2. No logins accepted, logged in users kicked out, jobs keep running. 3. Jobs killed, too.

16/37 No workaround, no update? Keep users and management informed! We have temporarily blocked logins while we are investigating how to secure the system against a serious security vulnerability that was released today easily becomes I dunno, I heard they shut down the system because it was hacked or something.

17/37 Configuration management A consistent system configuration over nodes and servers is important for security, but also for functionality and performance.

18/37 Configuration management Node installation Special consideration for compute nodes: When and how do we (re-)install them? 1. Manually installed node image, use that when booting 2. Scripted install (kickstart etc) for making node image, use that when booting 3. Scripted install when needed, reboot from disk otherwise 4. Scripted install on every boot

9/37 Configuration management Node installation Node reinstallation on every reboot: Good: Nodes are always clean. Bad: Nodes already zapped when you want to do forensics.

20/37 Configuration management Deployment at scale Letting thousands of servers wget/rsync from a few system servers might not work. Solutions: Bittorrent? Multicast?

21/37 Configuration management Keeping things consistent How do we make sure we do not forget vital configuration? 1. Checklists 2. Scripts 3. Configuration management tools Ansible, Cfengine, Chef, Puppet, Quattor,...

21/37 Configuration management Keeping things consistent How do we make sure we do not forget vital configuration? 1. Checklists 2. Scripts 3. Configuration management tools Ansible, Cfengine, Chef, Puppet, Quattor,... Warning: Abstracting too much may make system administration harder. Strive for the right balance!

22/37 Configuration management Keeping things consistent Then add version control on top of this. Now, you also know how it was four months ago! Log your actions. Still useful, even with configuration management tools (but may partly be the commit log). May be as simple as a date-ordered text file on the system server.

23/37 Configuration management Keeping things consistent Package your own tools, scripts etc. Example: Instead of some slightly different scripts in /root/bin on four clusters, we might aim for versioned RPM package on internal repo server, with source in git.

23/37 Configuration management Keeping things consistent Package your own tools, scripts etc. Example: Instead of some slightly different scripts in /root/bin on four clusters, we might aim for versioned RPM package on internal repo server, with source in git. But again, don t overdo this...

24/37 Configuration management Node health checking Running health checking scripts in prolog/epilog might not be all that security related, but it saves a lot of other trouble... We can add test for security problem X fixed if we want.

25/37 Compartmentalization The waterfall model of trust Be aware of the direction of the trust flow. For example: OK: desktop system server compute node OK: desktop system server login node

5/37 Compartmentalization The waterfall model of trust Be aware of the direction of the trust flow. For example: OK: desktop system server compute node OK: desktop system server login node Bad: desktop login node system server Bad: login node console infrastructure server

6/37 Compartmentalization The waterfall model of trust Explain reasoning to all system staff. Yes, it may be inconvenient at times. Yes, it may save your cluster one day. Enforce using account filters, firewalls, etc.

27/37 Compartmentalization Separate servers Users should only have access to the login nodes and, possibly, their allocated worker nodes. Keep system servers separate from login nodes. On large systems, separate system servers more if possible. Example: File servers may require kernel versions with known local root exploits for weeks or forever. Restrict access to them!

28/37 Compartmentalization Separate credentials Do not use the same password or similar for different levels in the waterfall. Do not use the same root password on different clusters. Goal: Nothing you can steal at a lower level should gain you access at a higher level. But it s hard to fully reach this.

29/37 Compartmentalization Separate credentials Example: Only staff can login to system servers. Good. But staff homedirs are mounted on login nodes and compute nodes. If you get root on them, you can become a staff member, change.profile, get to run code on system server (or boobytrap ssh, su,... )

30/37 Compartmentalization Separate credentials Be careful with single sign-on! Example: Library password LiU password Personal certificate Supercomputer access!

31/37 Hardening There are a lot of things we can do. Some may conflict with ease-of-use, some not.

32/37 Hardening suid stripping Example: NSC antisuid runs from cron Whitelist of known binaries that are allowed to be setuid root ping, sudo... Blacklist of known binaries that should have their suid bit stripped mount... Any other suid binaries found? Sound the alarm!

33/37 Hardening File system flags Whenever possible, mount file systems: read-only nosuid, nodev root squash norelatime performance vs. forensic abilities

34/37 Hardening Module loading Many kernel exploits depend on being able to load some obscure module. Questions to consider: Can we turn off module loading completely? Can we at least turn off autoloading of modules?

35/37 Hardening Security frameworks SELinux, grsecurity... NSC doesn t do this. Any success stories? Introducing third-party dependencies may make updating harder.

36/37 Hardening Help the users proactively Examples of things you can do periodically: Check for really bad filesystem permissions Check for bad SSH usage Unencrypted private keys Known bad keys in authorized_keys (remember the Debian Debacle?)

7/37 And much, much more... We still haven t covered things like log management, log analysis, intrusion detection...

7/37 And much, much more... We still haven t covered things like log management, log analysis, intrusion detection...... so here comes another 40 slides!

7/37 And much, much more... We still haven t covered things like log management, log analysis, intrusion detection...... just kidding!

7/37 And much, much more... We still haven t covered things like log management, log analysis, intrusion detection...... just kidding! Questions? Opinions? Protests?