LinuxQuestions.org
Visit Jeremy's Blog.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 01-12-2011, 07:58 AM   #1
lseowhua
LQ Newbie
 
Registered: Jan 2011
Posts: 2

Rep: Reputation: 0
Linux server issue


Hi all,
Can someone please help to provide solutions for below security-related Linux server issue?

Level : 2 UDP Constant IP Identification Field Fingerprinting Vulnerability
Level : 2 TCP Sequence Number Approximation Based Denial of Service
Level : 2 Operating System Detected
Level : 2 Host Uptime Based on TCP TimeStamp Option

Currently we have two name servers and both also having the above same issue.
Thanks in advance for your help
 
Old 01-12-2011, 08:05 AM   #2
acid_kewpie
Moderator
 
Registered: Jun 2001
Location: UK
Distribution: Gentoo, RHEL, Fedora, Centos
Posts: 43,417

Rep: Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985
Take each vulnerability, and search for it on Google, and read about them. Where does this "information" come from? Does it, an audit report??, come with other supporting information? It's bizarre to merely present four sentences without any context and expect a reply... you *must* have backup information to have this in the first place.
 
1 members found this post helpful.
Old 01-12-2011, 08:56 AM   #3
unixfool
Member
 
Registered: May 2005
Location: Northern VA
Distribution: Slackware, Ubuntu, FreeBSD, OpenBSD, OS X
Posts: 782
Blog Entries: 8

Rep: Reputation: 158Reputation: 158
One of those was actually previously discussed on the LQ forums (I just checked one of them). They offered far more supporting information that this OP did, also.
 
Old 01-12-2011, 10:03 AM   #4
choogendyk
Senior Member
 
Registered: Aug 2007
Location: Massachusetts, USA
Distribution: Solaris 9 & 10, Mac OS X, Ubuntu Server
Posts: 1,197

Rep: Reputation: 105Reputation: 105
Looks to me like one of those audit situations where the higher ups call in some security auditor who runs scans of all the servers and submits a report. The higher ups pay good money, don't understand any of it, and then just say, "fix it." Sometimes it actually matters, sometimes it doesn't. The auditors typically dump a lot of information with little context or explanation.

I've taken care of this stuff on Solaris systems using the NSA security guides. The Solaris guide was a collaboration between Sun and the NSA. There are also Windows and Linux guides and application software guides. See http://www.nsa.gov/ia/guidance/secur...es/index.shtml. Select Operating Systems from the left. It shows Red Hat Linux, but much of that should be applicable to other distributions.

When I work through the Solaris guide, I don't necessarily do everything they suggest. Some of it I see as inappropriate to my environment. You're the sysadmin, you choose (unless your boss overrides your choice).
 
Old 01-12-2011, 10:38 AM   #5
unixfool
Member
 
Registered: May 2005
Location: Northern VA
Distribution: Slackware, Ubuntu, FreeBSD, OpenBSD, OS X
Posts: 782
Blog Entries: 8

Rep: Reputation: 158Reputation: 158
I believe they're actually the results of a QualysGuard PCI scan. Some scans are done in-house while some are done by 3rd parties. Qualys (and most other tools, including such tools as Nessus) actually adds quite a bit research/remediation/mitigation data into their scan results. The OP may be leaving out those details or the auditors may've not given him those details...I don't know. Not all managers are clueless regarding these audits and the steps involved in remediation of scan findings. Sure, they won't know the intimate details, as most may not have worked in a technical field for years, but still, I've seen more than one manager call out either a dumb auditor or a dumb sysadmin.

In my experience, the system owner may not necessarily have a choice in whether or not he/she addresses the findings. I've worked at places that have management backing the scanning process (this is actually essential), but also have seen the system owners play a key part in mitigation or at least justifying why they can't/won't patch a particular system.

Last edited by unixfool; 01-13-2011 at 10:21 AM.
 
Old 01-12-2011, 03:04 PM   #6
acid_kewpie
Moderator
 
Registered: Jun 2001
Location: UK
Distribution: Gentoo, RHEL, Fedora, Centos
Posts: 43,417

Rep: Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985
Quote:
Originally Posted by unixfool View Post
I believe they're actually the results of a QualysGuard PCI scan. Some are done in-house while some are done by 3rd parties. Qualys (and most other tools, including such tools as Nessus) actually adds quite a bit research/remediation/mitigation data into their scan results. The OP may be leaving out those details or the auditors may've not given him those details...I don't know. Not all managers are clueless regarding these audits and the steps involved in remediation of scan findings. Sure, they won't know the intimate details, as most may not have worked in a technical field for years, but still, I've seen more than one manager call out either a dumb auditor or a dumb sysadmin.

In my experience, the system owner may not necessarily have a choice in whether or not he/she addresses the findings. I've worked at places that have management back the scanning process (this is actually essential), but also have seen the system owners play a key part in mitigation or at least justifying why they can't/won't patch a particular system.
Seems so. I googled one and found an amusing blog post of some sysadmin slagging off the test results. Fun.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 04:47 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration