At 06:13 PM 12/11/99 -0500, Doug McGarrett wrote:
>
>I will shortly have an adsl connection, and I 
>may decide to run the machine 24/7.  Is there 
>a book on Linux security (accessible to the 
>average newbie) or some other concise source
>that I could use to customise the system for
>security?  (I don't even know what to put into
>"hosts.allow" or "hosts.deny")

Put the IP address of the hosts you want to make telnet, ftp, etc.
connections in hosts.allow and put the single line "ALL:ALL" in hosts.deny.
 This specifies that no one can get in except the IP addresses in
hosts.allow.  Do 'man hosts.allow' to be enlightened.

I've been tempted to try these SuSE RPM's, especially the "harden" one.
Don't know how well they will work with RH6.1.

-Alan

                        SuSE Security Announcement

                Announcement of new security tools from SuSE

______________________________________________________________________________

Please note, that that we provide this information on an "as-is" basis only.
There is no warranty whatsoever and no liability for any direct, indirect or
incidental damage arising from this information or the installation of
the update package.
_____________________________________________________________________________

Tools developed by SuSE (all open source) and included in SuSE 6.3 :

SuSE FTP Proxy - The first program of the SuSE Proxy Suite.
                 A secure FTP proxy with support for SSL, LDAP, command
                 restriction, active and passive FTP support, and much more.
                 RPM: fwproxy.rpm, fwproxys.rpm (SSL - not in the US version)

SuSE Firewall  - The new firewall script from SuSE, rewritten from scratch.
                 Autodetection of interface information, masquerading,
                 autoprotection of services, protection from internal
                 networks, fail-close design and easy to configure.
                 RPM: firewals.rpm

Harden SuSE    - A special script for hardening a SuSE Linux 5.3 - 6.3.
                 By answering 9 questions, the system is reconfigured very
                 tightly. e.g. disabling insecure network services, removing
                 suid/sgid/world-writable permissions which are not critical.
                 RPM: hardsuse.rpm

SuSE Secumod   - This loadable kernel module enhances the security of the 
                 system by adding a symlink/hardlink/pipe protection,
                 procfs protection, trusted path execution and capabilities.
                 RPM: secumod.rpm

SuSE Secchk    - These are cron scripts which run daily, weekly and monthly
                 to check the security of the system and compare them to the
                 last run.
                 RPM: seccheck.rpm

Yast-1         - New administration menu for setting password aging,
                 authentication fail delay and logging of logins + failures.
                 RPM: yast.rpm

SuSE auditdisk - Please note that this tool is in beta phase!
                 This tool generates a bootdisk with checksum data and all
                 binaries etc. needed to automaticaly verify file checksums
                 upon booting. This way it can't be subverted by lkm's like a
                 standard e.g. tripwire installation.
                 WWW: http://www.suse.de/~marc - not included on SuSE 6.3 yet

Watch out for updates of these tools on our WWW or FTP update sites.
Although these are tools developed by SuSE, they (should) work on any Linux
distributions with little problems.


New tools included in the SuSE Linux distribution (not created by SuSE):

FreeS/WAN      - IPSEC implementation to build secure VPN tunnels via public
                 networks.
                 RPM: freeswan.rpm (not in the US version)

GNU Privacy Guard - A free pgp-like tool for secure (not limited to email)
                 communication. Frontends are also included.
                 RPM: gpg (not in the US version)

Nessus         - A very good network security scanner!
                 RPM: nessus

plus tmpwatch, arpwatch, plug, sslwrap, the newest nmap and more.
"Old" packages include: john, saint, cipe, pgp, scanlogd, ssh, tripwire, etc.


---
Alan D. Mead  /  Research Scientist  /  [EMAIL PROTECTED]
Institute for Personality and Ability Testing
1801 Woodfield Dr  /  Savoy IL 61874 USA
217-352-4739 (v)  /  217-352-9674 (f)


-- 
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.

Reply via email to