LinuxQuestions.org
Review your favorite Linux distribution.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 02-22-2004, 11:19 AM   #1
mooreted
Member
 
Registered: May 2003
Posts: 598

Rep: Reputation: 30
Do I really need to worry about security?


The more I search for the answers for this question, the more confused I get. I am just a guy with a Linux OS. I surf the web and check email. I have no other users, no servers, no remote access and a cable connection.

Here's the confusion: Some claim that hackers are around every corner trying to hack into your system and need to constant monitoring and security hardening. I tend to take that with a grain of salt. I am not running a server and there's really not much on my hard drive anyone would want to steal. Others (including my cable company) say that hackers are looking for big companies to attack. They say that security on their server is more than adequate for the home user.

So who's right? Do I really need to spend hours and hours securing a simple desktop, stand-alone PC?

Ted.
 
Old 02-22-2004, 11:32 AM   #2
SirSlappy
Member
 
Registered: Jun 2003
Location: Glendale AZ
Distribution: Slackware 10
Posts: 153

Rep: Reputation: 30
security

Well, first off I wouldn't say you'd have to spend hours and hours securing a linux box. It's not that hard.

However, just because you don't have anything on your HD worth looking at, doesn't mean hackers can't use your computer. Most of the time hackers break in a home computer to use your computer to hack other computers and sometimes to upload files to be distributed over the internet such as porn or a virus.

It is fairly important that you secure your computer. It isn't hard. All you need to do is spend 30 minutes looking at a firewall. I'm sure if you are new to linux you are running RH and I think there's a GUI for a firewall. So it won't be bad.

So what if hackers hack from your box?? You will have to deal with your ISP and explain why you were trying to break into whitehouse.gov, etc.
 
Old 02-22-2004, 12:02 PM   #3
mooreted
Member
 
Registered: May 2003
Posts: 598

Original Poster
Rep: Reputation: 30
Oh, I didn't think of that. I know how to setup Shorewall to drop packets, I'll go set it up.

Most of the information on the 'net for securing Linux pertains to securing servers, not the desktop. I don't think I need such radical measure for a desktop. If there is a good place to read more information tailored for desktop users I would like to know about them. I will continue searching for information.

Thank you so much for your help,
Ted.
 
Old 02-22-2004, 12:39 PM   #4
chort
Senior Member
 
Registered: Jul 2003
Location: Silicon Valley, USA
Distribution: OpenBSD 4.6, OS X 10.6.2, CentOS 4 & 5
Posts: 3,660

Rep: Reputation: 76
SirSlappy makes excellent points.

I'll just add that, even though you didn't conciously setup any server software, most Linux distributions install some automatically (often at least Sendmail and Apache). You might not even be aware that they're running. Also, in addition to using a compromised machine to cover their tracks when they try to hack into bigger sites, crackers often will try to compromise massive amounts of machines and use them as "zombies" to launch Distributed Denial of Service attacks, such as the recent worm that caused infected computers to attack www.sco.com. One of the other really common things cracked boxes are used for is to send spam. I would say probably as much as 25% of all spam these days is being sent through compromised boxes.

If you want to learn more about how Linux boxes are compromised to send spam, read this article.
 
Old 02-22-2004, 01:15 PM   #5
mooreted
Member
 
Registered: May 2003
Posts: 598

Original Poster
Rep: Reputation: 30
Thank you very much for the info and the excellent link. I now have Shorewall setup to drop packets. All but one port is stealthed. Port 137 used for authentication is closed. I may experiment with stealthing that port too.

Have a good one,
Ted.
 
Old 02-22-2004, 09:12 PM   #6
SirSlappy
Member
 
Registered: Jun 2003
Location: Glendale AZ
Distribution: Slackware 10
Posts: 153

Rep: Reputation: 30
stealthed?

Um. by stealth you mean???

If it's not closed, then it's not safe. There are tons of scanners out there, nmap to name one, that can see straight through any "half-way" blocking of ports.

Find out what's running by doing:
nmap -vv localhost

This is most likely the easiest way for you to find out exactly what ports are open. Once you find out what's open, decide if you need that service. Most likely you wo'nt need sendmail or apache. Samba might be running and there are tons of exploits for that out. If you're not gonna network with windows, kill it. In other words, find out what you need and either kill the process of the rest or filter incoming traffic on those ports.
 
Old 02-22-2004, 10:45 PM   #7
chort
Senior Member
 
Registered: Jul 2003
Location: Silicon Valley, USA
Distribution: OpenBSD 4.6, OS X 10.6.2, CentOS 4 & 5
Posts: 3,660

Rep: Reputation: 76
I think you mean 113 (auth). Port 137 is used for NetBIOS Name Service.

Like SirSlappy says, if you don't need the services, you should disable them. Don't rely on a firewall to protect you if you're running unnecessary services. Yes, firewalls are good, but they're only secondary defense. The best defense is not having vulnerable services running in the first place.
 
Old 02-22-2004, 11:07 PM   #8
mooreted
Member
 
Registered: May 2003
Posts: 598

Original Poster
Rep: Reputation: 30
Yes, I know. I recently had to reinstall and am just now getting around to that. I now have all unneeded services stopped.

By stealth I mean that the port is not only blocked (closed) but incoming packets are dropped, ICMP echo requests never get back to the originating host so the port-scanner doesn't even know there is a computer out there.

So far I have set up the firewall, disabled services and installed all the latest patches. I should be fairly secure. I will run nmap just to be sure.

Thanks for all the help,
Ted.
 
Old 02-22-2004, 11:17 PM   #9
mooreted
Member
 
Registered: May 2003
Posts: 598

Original Poster
Rep: Reputation: 30
Here is the output from nmap:

Starting nmap 3.30 ( http://www.insecure.org/nmap/ ) at 2004-02-22 21:17 EST
Host localhost (127.0.0.1) appears to be up ... good.
Initiating SYN Stealth Scan against localhost (127.0.0.1) at 21:17
Adding open port 111/tcp
Adding open port 6000/tcp
Adding open port 631/tcp
The SYN Stealth Scan took 2 seconds to scan 1644 ports.
Interesting ports on localhost (127.0.0.1):
(The 1641 ports scanned but not shown below are in state: closed)
Port State Service
111/tcp open sunrpc
631/tcp open ipp
6000/tcp open X11

Looks pretty good?

Ted.
 
Old 02-23-2004, 01:04 AM   #10
chort
Senior Member
 
Registered: Jul 2003
Location: Silicon Valley, USA
Distribution: OpenBSD 4.6, OS X 10.6.2, CentOS 4 & 5
Posts: 3,660

Rep: Reputation: 76
Disable portmapper (there should be a /etc/rc.d/init.d script for it)
Add -nolisten tcp to your xserver arguments
Make sure that only localhost is allowed to make connections to CUPSd

Other than that, you're set (assuming you're all up to date on security patches).
 
Old 02-23-2004, 09:09 AM   #11
mooreted
Member
 
Registered: May 2003
Posts: 598

Original Poster
Rep: Reputation: 30
Oh, thanks. I appreciate it. I disabled the portmapper service and I will now do as you suggested. I don't want to be one of those Linux users who think Linux is totally secure by default. Security is only as good as you make it no matter what OS you are using.

Have a great day,
Ted.
 
Old 02-23-2004, 09:47 AM   #12
SirSlappy
Member
 
Registered: Jun 2003
Location: Glendale AZ
Distribution: Slackware 10
Posts: 153

Rep: Reputation: 30
Ted,

I with the rest of the people on here had as good of an attitude as you do. I'm glad I could help you. If ya need anything else, ooSirSlappyoo on AIM. Feel free to ask. NIce job in securing your box.
 
Old 02-23-2004, 05:37 PM   #13
mooreted
Member
 
Registered: May 2003
Posts: 598

Original Poster
Rep: Reputation: 30
Thanks for the help. I am a realist. The more poplular Linux becomes, the more dilligent we will have to be.

Have a great day,
Ted.
 
Old 02-24-2004, 01:41 AM   #14
chrisfirestar
Member
 
Registered: Sep 2003
Location: Adelaide, Australia
Distribution: Fedora/RH
Posts: 231

Rep: Reputation: 30
if you want to test your newly secured box goto www.grc.com and run the sheildsup program also lots of interesting reading reharding DoS Attacks.

By Stealth did you mean that the packets were DROPPED not REJECTED?
 
Old 02-24-2004, 02:18 AM   #15
chort
Senior Member
 
Registered: Jul 2003
Location: Silicon Valley, USA
Distribution: OpenBSD 4.6, OS X 10.6.2, CentOS 4 & 5
Posts: 3,660

Rep: Reputation: 76
Why would he do ShieldsUp? He already ran nmap on his loopback adaptor. That will even find listening ports that ShieldsUp can't... I appreciate the effort to help, but know what you're talking about when you give advice.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Security Worry little_penguin Linux - Security 6 08-23-2005 10:06 PM
Viruses... Should we worry about them xmdms Linux - Enterprise 10 01-21-2005 04:48 PM
Should i worry? Hovi Linux - Security 7 01-12-2004 03:16 PM
Beyond BLFS +My worry alex_smith Linux From Scratch 2 06-26-2003 01:34 AM
TAR errors - to worry or not to worry?? dudeha Linux - General 2 12-31-2002 03:09 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 01:43 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration