21.2 Objective 2: Set Up Host
Security
Once a Linux system is installed and
working, you may need to do nothing more to it. However, if
you have specific security needs or just want to be cautious,
you'll want to implement additional security measures on your
system.
21.2.1 Shadow Passwords
The shadow password system enhances system
security by removing encrypted passwords from the publicly
available /etc/passwd file and moving them to the secured
/etc/shadow file. This prevents users from running
password-cracking programs against all of the encrypted
passwords on your system.
Shadow passwords are covered in Section
7.1 which describes user management. In order to secure a
system, it is a good idea to implement shadow passwords if
they aren't already. You can check this by looking for
/etc/shadow and verifying that the user list matches the one
in /etc/passwd. If shadow passwords are not enabled, you may
enable them by entering the pwconv
command with no arguments. In the unlikely event that you use
group passwords, you should also enable group shadowing with
grpconv.
21.2.2 inetd Minimalism
As mentioned in Section
20.1, inetd and
/etc/inetd.conf (its configuration file) handle access to many
system services. Despite the use of TCP wrappers on these
services, the best security can be achieved by simply not
offering services that aren't explicitly needed. Do this by
removing or commenting out lines in inetd.conf for services
that are unnecessary. For example, to eliminate the talk and finger servers from your system,
comment their configuration lines: #talk dgram udp wait root /usr/sbin/tcpd in.talkd
#ntalk dgram udp wait root /usr/sbin/tcpd in.ntalkd
#finger stream tcp nowait root /usr/sbin/tcpd in.fingerd
After making this
change, you must instruct inetd
to reconfigure itself. For example: # finger root@localhost
[localhost]
Login: root Name: root
Directory: /root Shell: /bin/bash
On since Sat Feb 12 00:11 (EST) on tty1
2 hours 48 minutes idle (messages off)
On since Sat Feb 12 01:11 (EST) on ttyp1 (messages off)
No mail.
No Plan.
# vi /etc/inetd.conf
# killall -HUP inetd
# finger root@localhost
[localhost]
finger: connect: Connection refused
In this example, finger is first demonstrated to work.
Then inetd is edited to disable
fingerd, inetd is reconfigured, and finger stops working.
21.2.3 Logging and Superuser
Mail
The syslog system is a constant companion to the
security-conscious system administrator. Its logs are
necessary to review security breaches and to trace possible
perpetrators. The configuration of syslog is described in Section
7.3.
Some system responses to security problems
can come in the form of email to user root. You may wish to log in as root
regularly to check its mail, but you can make such checking
passive by instructing sendmail to forward root 's mail
to administrators. To do so, add a line like this to
/etc/aliases: root: jdoe, bsmith
Then execute the newaliases command to recompile the
aliases database: # newaliases
Now all email for root goes to both
jdoe and bsmith (but not root), who will
presumably act on important messages.
21.2.4 Watching for Security
Announcements
Another important function of system
administration is to keep on top of any new bugs and exploits
in the software on your system. There are countless sites on
the web you can watch to find announcements about such things,
but two stand out and could be mentioned on Exam 102:
- CERT
-
In 1988, a small Computer Emergency
Response Team formed at the Software Engineering Institute
(SEI), a research and development center operated by
Carnegie Mellon University. The Defense Advanced Research
Projects Agency (DARPA) originally funded its work. It is
now known as the CERT Coordination
Center (CERT/CC), and
"CERT" no longer officially stands for anything. Funding
comes from a mix of federal, civil, and private sources.
CERT/CC is made up of network security
experts who provide 24-hour technical assistance for
responding to computer security incidents. It also analyzes
product vulnerabilities, publishes technical documents, and
presents security-related training courses. CERT/CC may be
found at: http://www.cert.org/.Specifically,
security advisories may be found at: http://www.cert.org/advisories.
A periodic visit to the CERT/CC site can
keep you informed of developments in computer security and
on problems found with various software packages.
- BUGTRAQ
-
In 1993, a mailing list was created to
publicly disclose demonstrated bugs in popular software,
with the intent of forcing responsible parties to fix the
problems quickly. The list has grown into a respected
resource on security topics and has thousands of
subscribers. To subscribe to the BUGTRAQ list, follow the instructions
in the BUGTRAQ section of http://www.securityfocus.com/. Archives of
BUGTRAQ are also available there.
Attention to these and other resources can
help you keep your system up-to-date. You'll be aware of
problems found in software you're using, and since updates are
almost always produced quickly in response to these
notifications, you can upgrade, patch, or replace software as
needed to keep your systems secure.
|