Work Security in Linux
Work Security in Linux
TERM PAPER
OF
COMPUTER
NETWORK
ROLL NO. 03
CLASS:-BT MT CSE
SECTION- C
2
REG. NO:-3050060122
Acknowledgements:-
First of all I would like to express my sincere
gratitude to the almighty for encouraging me to
complete this term paper. The following are
some important people in my life who gave me
strength and valuable suggestions to complete
the task.
First, my parents, friends, whose love and
affection give me strength and encouragement
to face challenges of life.
Second, my mam Chavi Ralhan, whose
inspiration, motivation spiritual guidance
always keeps me in the right path and keeps my
faith in God almighty without whose blessings
nothing is possible.
Finally, thanks for the Lovely Professional
University which gave me great opportunity to
make the term paper.
3
Table of contents:-
Application Configuration
Linux System Administration
Networ k Security
8.4. identd
8.11. Firewalls
References.
OS Configuration :
Hardening the operating system involves many things are are not only
operating system-specific, but may often vary from one "flavor" of an
operating system to another. Typical steps include:
• Disabling all default accounts and groups that are not needed. When
an operating system is installed it sets up quite a few user accounts
6
and groups by default. (Try logging into your Debian system using the
username news and see how far you can navigate around your
system's file system and what files you can catto the screen.)
There's a line in the /etc/passwd file for each user. Each line
contains different pieces of info separated by colons (:) with the last
item being the user's default shell (typically the Bash shell). To
disable user accounts, just change the default shell
to /bin/false so they can't log in.
• Don't use common names for groups that are given high levels
access (ex: "admins").
• Don't run a GUI if you don't need one and never leave a GUI running
while the server isn't being used for an interactive console session.
• Log off of server consoles when they're not being used. This is
especially important for Internet-connected systems.
7
ApplicationConfiguration
Some applications are insecure due to the defaults used during their
installations and some are just inherently insecure. Telnet and ftp are two
inherently insecure applications because passwords are transmitted over
the wire as clear text.
• If you have an Apache Web server (or have a Web site that is hosted
on a shared Apache Web server) and the US government's Titan
Rain investigation has you considering blocking visitors from China
(which we are now doing), you can configure Apache to deny access
to your site from Chinese IP addresses .
• Searching Google for the name of the application along with the word
'harden' will usually yield some helpful configuration information.
If all you want to do is set up a simple Web server (running Apache)
then there are quite a few "applications" (OS utilities actually) that run
by default that are not needed. They open ports and since each open
port is a possible entry point into your server by a hacker, you don't
want them open. I disable them by renaming their 'S' (startup)
symlinks in the appropriate run level directory. Since Debian boots
into runlevel 2 by default, we want to go into the run level 2 startup
directory with the command:
Now if you again reboot your system and run the netstat -a command
you'll see only Apache has a port open.
Other daemons and services don't open ports but they're not needed either
and they just use up memory. Two examples in the default installation that
you can also rename are S89atd and, if your system isn't connected
directly to a cable or DSL modem that uses PPPoE, S14ppp.
Because applications interact with the operating system, start processes,
and accept input they can affect operating system security. Likewise,
operating system security can affect an application's ability to function
properly. Achieving maximum OS security while still retaining full
application functionality is a balancing act.
This balancing act is evident when using "jails" or chroot jails. You can put
any program or daemon in it's own jail. A chroot jail is a way of configuring
the operating system so that the directory the application is running from
appears to be the root of the entire file system. As such, the only directories
the application can "see" or has access to are the ones it needs to run.
That way, if an application does have a security flaw, the hacker exploiting
that flaw won't have access to the entire file system.
9
For example, if you want to set up a DNS server be advised that BIND runs
as root. As such, if a hacker exploited a security flaw in BIND they would
have root access to the entire file system. By running BIND in a jail, the
hacker would only have access to the BIND application directory.
Perimeter Security
The most common means of protecting a network is using a firewall (or two
in the case of a DMZ which was illustrated back on the Firewall page). The
biggest problem with firewalls is that people think they're more than they
actually are. A firewall's major strength is protecting against traffic-based
attacks (DoS, etc). If you let people into your network from the outside, the
firewall has no way of differentiating between a legitimate user and a
hacker. A firewall is not a substitute for strong OS and application security.
If you want to have Internet servers or provide remote access using a VPN
server, be sure to use a DMZ configuration with two firewalls. In cases
where critical or confidential business information is at risk, use stateful
firewalls and IDS (Intrusion Detection System) software.
Snort
Again, firewalls, DMZs, and IDS systems are not magic bullets. They can
detect certain traffic patterns and pass or block traffic within certain
parameters. However, they can't tell a legitimate remote user from a
hacker. A firewall compliments good OS and application security practices,
it doesn't replace them nor can it make up for weaknesses in them.
Be Proactive:-
Security is not a "set it and forget it" proposition. Because there are no
absolutes, constant monitoring is essential. New attacks are being
developed every day and if you're simply going to respond once an attack
is discovered it's likely too late. Hackers will use DoS attacks, log
alterations (provided they can gain access), and other means to disguise
other, more intrusive, exploits. In many cases simply waiting for obvious
evidence that you've been hacked means you'll never know you've been
hacked. The hackers will sneak in, grab what they want, and sneak back
out again covering their tracks as they go.
In short, any security plan that is reactive rather than proactive is pretty
lame. In addition to the security measures mentioned above, there are
several things you can do to be more proactive in ensuring security:
• Hack your systems - Obtain, learn, and use some of the same tools
the hackers do. By doing so you'll see what the hackers see, which
could be an eye-opening experience.
A small monthly charge takes the time and hassle out of your
staff worrying about this. The sad fact is that most SysAdmins
simply do not bother to worry about these security patches,
resulting in an insecure system, due to lack of time.
Networ k Security:-
Network security is becoming more and more important as people spend more and
more time connected. Compromising network security is often much easier than
compromising physical or local security, and is much more common.
13
There are a number of good tools to assist with network security, and more and
more of them are shipping with Linux distributions.
One of the most common ways intruders gain access to more systems on your
network is by employing a packet sniffer on a already compromised host. This
"sniffer" just listens on the Ethernet port for things
like passwd and login and su in the packet stream and then logs the traffic
after that. This way, attackers gain passwords for systems they are not even
attempting to break into. Clear-text passwords are very vulnerable to this attack.
Example: Host A has been compromised. Attacker installs a sniffer. Sniffer picks
up admin logging into Host B from Host C. It gets the admins personal password
as they login to B. Then, the admin does a su to fix a problem. They now have the
root password for Host B. Later the admin lets someone telnet from his account
to Host Z on another site. Now the attacker has a password/login on Host Z.
In this day and age, the attacker doesn't even need to compromise a system to do
this: they could also bring a laptop or pc into a building and tap into your net.
Using ssh or other encrypted password methods thwarts this attack. Things like
APOP for POP accounts also prevents this attack. (Normal POP logins are very
vulnerable to this, as is anything that sends clear-text passwords over the network.)
Before you put your Linux system on ANY network the first thing to look at is what
services you need to offer. Services that you do not need to offer should be
disabled so that you have one less thing to worry about and attackers have one less
place to look for a hole.
There are a number of ways to disable services under Linux. You can look at
your /etc/inetd.conf file and see what services are being offered by
your inetd. Disable any that you do not need by commenting them out (# at the
beginning of the line), and then sending your inetd process a SIGHUP.
You can also remove (or comment out) services in your /etc/services file.
This will mean that local clients will also be unable to find the service (i.e., if you
remove ftp, and try and ftp to a remote site from that machine it will fail with an
14
"unknown service" message). It's usually not worth the trouble to remove services
from /etc/services, since it provides no additional security. If a local person
wanted to use ftp even though you had commented it out, they would make their
own client that used the common FTP port and would still work fine.
• ftp
• telnet (or ssh)
• mail, such as pop-3 or imap
• identd
If you know you are not going to use some particular package, you can also delete
it entirely. rpm -e packagename under the Red Hat distribution will erase an
entire package. Under Debian dpkg --remove does the same thing.
Additionally, you really want to disable the rsh/rlogin/rcp utilities, including login
(used by rlogin), shell (used by rcp), and exec (used by rsh) from being
started in /etc/inetd.conf. These protocols are extremely insecure and have
been the cause of exploits in the past.
root# cd /etc/rc6.d
root# mv S45dhcpd s45dhcpd
If you have BSD-style rc files, you will want to check /etc/rc* for programs
you don't need.
Most Linux distributions ship with tcp_wrappers "wrapping" all your TCP
services. A tcp_wrapper (tcpd) is invoked from inetd instead of the real
server. tcpd then checks the host that is requesting the service, and either
15
executes the real server, or denies access from that host. tcpd allows you to
restrict access to your TCP services. You should make
a /etc/hosts.allow and add in only those hosts that need to have access to
your machine's services.
If you are a home dial up user, we suggest you deny ALL. tcpd also logs failed
attempts to access services, so this can alert you if you are under attack. If you add
new services, you should be sure to configure them to use tcp_wrappers if they are
TCP-based. For example, a normal dial-up user can prevent outsiders from
connecting to his machine, yet still have the ability to retrieve mail, and make
network connections to the Internet. To do this, you might add the following to
your /etc/hosts.allow:
ALL: 127.
ALL: ALL
which will prevent external connections to your machine, yet still allow you from
the inside to connect to servers on the Internet.
Keep in mind that tcp_wrappers only protects services executed from inetd, and
a select few others. There very well may be other services running on your
machine. You can use netstat -ta to find a list of all the services your
machine is offering.
Keeping up-to-date DNS information about all hosts on your network can help to
increase security. If an unauthorized host becomes connected to your network, you
can recognize it by its lack of a DNS entry. Many services can be configured to not
accept connections from hosts that do not have valid DNS entries.
8.4. identd
16
identd is a small program that typically runs out of your inetd server. It keeps
track of what user is running what TCP service, and then reports this to whoever
requests it.
Why would you want to run it then? Because it helps you out, and is another data-
point in tracking. If your identd is un compromised, then you know it's telling
remote sites the user-name or uid of people using TCP services. If the admin at a
remote site comes back to you and tells you user so-and-so was trying to hack into
their site, you can easily take action against that user. If you are not
running identd, you will have to look at lots and lots of logs, figure out who was
on at the time, and in general take a lot more time to track down the user.
The identd that ships with most distributions is more configurable than many
people think. You can disable it for specific users (they can make
a .noident file), you can log all identd requests (We recommend it), you can
even have identd return a uid instead of a user name or even NO-USER.
The Postfix mail server was written by Wietse Venema, author of Postfix and
several other staple Internet security products, as an "attempt to provide an
alternative to the widely-used Sendmail program. Postfix attempts to be fast, easy
to administer, and hopefully secure, while at the same time being sendmail
compatible enough to not upset your users."
There are a number of different software packages out there that do port and
service-based scanning of machines or networks. SATAN, ISS, SAINT, and
Nessus are some of the more well-known ones. This software connects to the target
machine (or all the target machines on a network) on all the ports they can, and try
17
to determine what service is running there. Based on this information, you can tell
if the machine is vulnerable to a specific exploit on that server.
SAINT is a updated version of SATAN. It is web-based and has many more up-to-
date tests than SATAN. You can find out more about it
at: http://www.wwdsi.com/~saint
There are some tools designed to alert you to probes by SATAN and ISS and other
scanning software. However, if you liberally use tcp_wrappers, and look over your
log files regularly, you should be able to notice such probes. Even on the lowest
setting, SATAN still leaves traces in the logs on a stock Red Hat system.
There are also "stealth" port scanners. A packet with the TCP ACK bit set (as is
done with established connections) will likely get through a packet-filtering
firewall. The returned RST packet from a port that _had no established
session_ can be taken as proof of life on that port. I don't think TCP wrappers will
detect this.
You might also look at SNORT, which is a free IDS (Intrusion Detection System),
which can detect other network intrusions. http://www.snort.org
18
One of the most important services you can provide is a mail server. Unfortunately,
it is also one of the most vulnerable to attack, simply due to the number of tasks it
must perform and the privileges it typically needs.
Keep in mind that send mail does not have to be running in order for you to send
mail. If you are a home user, you can disable send mail entirely, and simply use
your mail client to send mail. You might also choose to remove the "-bd" flag from
the send mail startup file, thereby disabling incoming requests for mail. In other
words, you can execute send mail from your startup script using the following
instead:
# /usr/lib/sendmail -q15m
This will cause send mail to flush the mail queue every fifteen minutes for any
messages that could not be successfully delivered on the first attempt.
Many administrators choose not to use send mail, and instead choose one of the
other mail transport agents. You might consider switching over
to qmail. qmail was designed with security in mind from the ground up. It's
fast, stable, and secure. Qmail can be found at http://www.qmail.org
A "Denial of Service" (DoS) attack is one where the attacker tries to make some
resource too busy to answer legitimate requests, or to deny legitimate users access
to your machine.
Denial of service attacks have increased greatly in recent years. Some of the more
popular and recent ones are listed below. Note that new ones show up all the time,
19
so this is just a few examples. Read the Linux security lists and the bugtraq list and
archives for more current information.
Many sites use NFS to serve home directories to users, so that no matter what
machine in the cluster they login to, they will have all their home files.
There is some small amount of security allowed in exporting file systems. You can
make your nfsd map the remote root user (uid=0) to the nobody user, denying
them total access to the files exported. However, since individual users have access
to their own (or at least the same uid) files, the remote root user can login or su to
their account and have total access to their files. This is only a small hindrance to
an attacker that has access to mount your remote file systems.
If you must use NFS, make sure you export to only those machines that you really
need to. Never export your entire root directory; export only directories you need
to export.
NIS is not at all secure. It was never meant to be. It was meant to be handy and
useful. Anyone that can guess the name of your NIS domain (anywhere on the net)
can get a copy of your passwd file, and use "crack" and "John the Ripper" against
your users' passwords. Also, it is possible to spoof NIS and do all sorts of nasty
tricks. If you must use NIS, make sure you are aware of the dangers.
21
8.11. Firewalls
Firewalls are a means of controlling what information is allowed into and out of
your local network. Typically the firewall host is connected to the Internet and
your local LAN, and the only access from your LAN to the Internet is through the
firewall. This way the firewall can control what passes back and forth from the
Internet and your LAN.
There are a number of types of firewalls and methods of setting them up. Linux
machines make pretty good firewalls. Firewall code can be built right into 2.0 and
higher kernels. The user-space toolsipfwadm for 2.0 kernels and ipchains for
2.2 kernels, allows you to change, on the fly, the types of network traffic you
allow. You can also log particular types of network traffic.
Firewalls are a very useful and important technique in securing your network.
However, never think that because you have a firewall, you don't need to secure
the machines behind it. This is a fatal mistake. Check out the very
good Firewall-HOWTO at your latest metalab archive for more information on
firewalls and Linux.
If you have no experience with firewalls, and plan to set up one for more than just
a simple security policy, the Firewalls book by O'Reilly and Associates or other
online firewall document is mandatory reading.
Linux IP Firewalling Chains is an update to the 2.0 Linux firewalling code for the
2.2 kernel. It has many more features than previous implementations, including:
If you are currently using ipfwadm on your 2.0 kernel, there are scripts available
to convert the ipfwadm command format to the format ipchains uses.
22
In yet another set of advancements to the kernel IP packet filtering code, netfilter
allows users to set up, maintain, and inspect the packet filtering rules in the new
2.4 kernel.
Iptables
is the command-line interface used to manipulate the firewall tables within the
kernel.
Net filter provides a raw framework for manipulating packets as they traverse
through various parts of the kernel. Part of this framework includes support for
masquerading, standard packet filtering, and now more complete network address
translation. It even includes improved support for load balancing requests for a
particular service among a group of servers behind the firewall.
If you are running a Linux masquerading firewall and need to pass MS PPTP
(Microsoft's VPN point-to-point product) packets, there is a Linux kernel patch out
to do just that. See: ip-masq-vpn.
See also the section on IPSEC for pointers and more information.
24
Reference:-
http://www.google.com
http://www.aboutdebian.com/security.htm
http://www.linuxsecurity.com/
http://www.verysecurelinux.com/
http://www.swflug.org/lessons/security/index.htm
http://www.amazon.com/Linux-Network-Security-Administrators-
Advantage/dp/1584503963
http://www.wikipedia.com
http://www.guruji.com