What about adding ipfwadm/ipchains rules/chains for the input rules on the
internet interface (ppp0) ?

I mean something like ipchains -A input -i ppp0 -j DENY after accept rules
for thing you DO need (like for ICMP replys and HTTP for webservers ?)



Vriendelijke Groeten / Kind Regards,

Alexander van Luijpen

Philips Semiconductors Nederland
Test and Product Engineering 
MOS4YOU - C075 OTP / Consumer Systems Nijmegen - BL Video

email: [EMAIL PROTECTED] email: [EMAIL PROTECTED]
tel: (+31)-24-353 4639                                             tel:
(+31)-24-378 9475

Let's make things better


> -----Original Message-----
> From: Charles Roten [SMTP:[EMAIL PROTECTED]]
> Sent: Wednesday, May 05, 1999 11:38 AM
> To:   Linux Net Mailing List
> Cc:   D. Andrews; Charles Roten
> Subject:      Re: Security
> 
> [EMAIL PROTECTED] wrote ...
> 
> > I am a kind of new Linux user, pardon me if I am posting to the wrong
> > group...
> > 
> > I have a simple Q.  Recently I set up a Linux machine with Apache and 
> > FTP services to use as my companies web server.  The machine was hacked 
> > into and was being used to telnet and finger into other machines.  My 
> > ISP shutdown our service for a few days and would tell me exactly what 
> > occured, just that over a 2 week period they got many complaints from 
> > companies being hacked from my server address.  They told me it was 
> > serious enough that I should report it to the FBI and submit my hard 
> > drive to the feds to investigate.  In the mean time I am trying to 
> > figure out how to make my server more secure.  It was my understanding 
> > that the Red Hat version I am using was pretty secure straight out of 
> > the box.  I didn't change too many settings.
> >
> > Can anyone suggest any security programs that would help identify holes 
> > in my setup?  I have heard of one such program called COPS, any others 
> > I should use?  I have looked for books on Linux security but havent 
> > found any yet?  any recomendation?
> > 
> > Thanks in advance!  I have learned a lot from just being a passive 
> > member of this group, reading all the Qs and As over the past few 
> > months...
> > 
> > David Andrews
> > PC LAN Admin
> > MPIUA
> > [EMAIL PROTECTED]
> 
> Wow.  Ugly way to get started in Unix security ...  Brrrrr .....
> 
> I'm no security guru, by any means, but I do have a few common-sense 
> observations, and suggestions to offer that might help somewhat.  
> 
> On my last job, I first managed, then built and configured, Solaris-
> based firewall boxes.  Now, a _firewall_ box should be made as hard as 
> possible to crack into ....  It occurred to me, after a bit (given my 
> depressingly slow uptake :) that much of what I had learned could 
> easily be extrapolated to a Linux environment.  
> 
> But it looks like Lance Spitzner beat me to the punch on that one !  
> Thanks, Lance !
> 
> Check out  
> 
>     http://www.enteract.com/~lspitz/armoring.html (Armoring Solaris)
>     http://www.sabernet.net/papers/secureSolaris.html 
>         (Unix Security Handbook, Solaris 2.6 and Solaris 7)
>     http://www.sabernet.net/papers/secureSolaris5.html
>         (Unix Security Handbook, Solaris 2.5.1)
> 
>     http://www.enteract.com/~lspitz/linux.html (Armoring Linux)
> 
> The following discussion summarizes the "Armoring Linux" URL, 
> http://www.enteract.com/~lspitz/linux.html
> 
> The basic message of Lance Spitzner's page seems to be the following:  
> 
> 1)  Install /var in a separate partition.  Lance recommends 200 Mb, 
>     with 400 Mb as a practical maximum.  The intent is to prevent 
>     logs of system problems (and Joe SlimeBall's attempts to compromise 
>     your box !!) from crushing the partition(s) with kernel(s) and 
>     system binaries to load.  
> 
> 2)  Decide which services you do NOT need.  if you aren't going to use 
>     your box as a Usenet News server, then yank out the inn package.  If 
>     you are running RedHat, this will be incredibly easy, since that 
>     functionality resides in, at most, two _packages_, which may be 
>     installed and removed at will with the "rpm" command-line tool.  On 
>     my RedHat 5.2 box, the incantation was 
>         rpm -e inn-1.7.2-14 inn-devel-1.7.2-14
>     Blooie!  Gone.  
> 
> 3)  Keep track of the security problems that are reported on 
>     [EMAIL PROTECTED]  Or just keep tabs on the RedHat OS updates.  
>     RedHat security patches always seem to show up there in a timely 
>     manner.  
> 
> 4)  Take a walk through /etc/inetd.conf.  Insert a "#" at the beginning  
>     of lines which specify services you neither need nor want.  This
> will  
>     be most of them, more than likely.  
> 
> 5)  Go through the /etc/rc.d/rc?.d/ directories (on a RedHat box) and 
>     decide which of the symlinks to "start" scripts (the ones that start 
>     with "S") start up daemons whose functionality you neither want nor 
>     need.  When you find one, say "S20rusersd", do 
>         mv S20rusersd  _S20rusersd
>     That disables the symlink in a reversible way, should you decide at 
>     a later time to restore the service, but _prevents_ the service from 
>     being started upon system boot.  
>     Use Lance Spitzner's discussion as a starting point for which 
>     services are "unnecessary".  
> 
> 6)  Populate /etc/issue with an appropriate warning message.  Could be 
>     useful if the system gets cracked anyway, and the matter ends up in 
>     court.  This will involve changes to /etc/rc.d/rc3.d/S99local on 
>     a Red Hat box.  
> 
> 7)  Convert to shadow passwords if this has not already been set up by 
>     default.  Old-style encrypted passwords resided in /etc/passwd, but 
>     under "shadow password" systems, they reside in /etc/shadow.  Do a 
>     manual page lookup on "pwconv".  
> 
> 8)  Remove unnecessary system accounts from /etc/passwd.  Example: if
> you 
>     aren't running a News server, the "news" account has no function.  
>     So why leave it in /etc/passwd ??  YANK THE "ftp" ACCOUNT (unless
> you 
>     _want_ the grief associated with anonymous ftp administration :) !!
> 
> 9)  Make sure "root" is in /etc/ftpusers.  That way, root cannot ftp
> into 
>     your box !!  
> 
> 10) Make sure root cannot telnet to the system directly !  Check out the 
>     file /etc/securetty.  It should only contain line like 
>         tty4
>     and not lines like 
>        ttyp2
> 
> 11) Tweak TCP Wrappers.  It almost certainly is already installed on
> your 
>     Linux box.  /etc/hosts.allow is what TCP Wrappers uses to determine 
>     which hosts can access the system, and /etc/hosts.deny is TCP
> Wrappers' 
>     "bad actor" file.
> -
> To unsubscribe from this list: send the line "unsubscribe linux-net" in
> the body of a message to [EMAIL PROTECTED]
-
To unsubscribe from this list: send the line "unsubscribe linux-net" in
the body of a message to [EMAIL PROTECTED]

Reply via email to