LinuxQuestions.org
Share your knowledge at the LQ Wiki.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 09-08-2009, 07:13 AM   #1
SoX|OK
LQ Newbie
 
Registered: Sep 2009
Posts: 20

Rep: Reputation: 0

Due to http://www.linuxquestions.org/questi...d.php?t=753237 I request your most complete guide to securing and hardening my remote server. These services will be run on the server after reinstall:

HLDS - port 27015
HLDS - port 27020
OpenVPNServer
ZNC-Bouncer
Eggdrop
Apache

Last edited by unSpawn; 09-08-2009 at 05:50 PM.
 
Old 09-09-2009, 12:31 AM   #2
kbp
Senior Member
 
Registered: Aug 2009
Posts: 3,790

Rep: Reputation: 653Reputation: 653Reputation: 653Reputation: 653Reputation: 653Reputation: 653
Have you read the 'Security references' sticky at the top of the security forum ?

http://www.linuxquestions.org/questi...erences-45261/
 
Old 09-09-2009, 12:45 AM   #3
SoX|OK
LQ Newbie
 
Registered: Sep 2009
Posts: 20

Original Poster
Rep: Reputation: 0
Good morning,

I just recognized, that unSpawn added my post here.
Thanks for the link, I will have a look and read later today, hopefully this afternoon.
 
Old 09-09-2009, 04:47 AM   #4
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
I think reading the whole Linux Security references sticky is a bit much for today. Given the main problems in http://www.linuxquestions.org/questi...d.php?t=753237 were due to missing access restrictions, auditing and alerting would somebody here be willing to come up with a more specific shortlist of items to look at suitable for this situation?
 
Old 09-09-2009, 01:11 PM   #5
SoX|OK
LQ Newbie
 
Registered: Sep 2009
Posts: 20

Original Poster
Rep: Reputation: 0
Hi together ...

the setup is done now and the first I have done as well was "aptitude update and upgrade".

Also done is the following:
- moved ssh port to a non standard port and removed root-login possiblity
- installed firewall (see attached) [added into /etc/network/if-pre-up.d]
- changed ssh to auth with private-key

Anything else I should keep an eye on in this early stage?
Attached Files
File Type: txt firewall.txt (314 Bytes, 28 views)

Last edited by SoX|OK; 09-09-2009 at 01:32 PM. Reason: added information
 
Old 09-09-2009, 01:55 PM   #6
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
- kill all networked services except SSH (and your OpenVPN I think you use), # safety in case of say firewall rule errors
- remove packages you are not using now, # minimise footprint wrt maintenance and risks
- install and configure Samhain or Aide, # independent filesystem integrity checking
- install and configure Logwatch, # crucial reporting
- install and configure Chkrootkit and Rootkit Hunter, # more reporting
- configure /etc/hosts.{deny,allow} for services that use tcp wrappers, # safety in case of say firewall rule or service configuration errors
- propose ruleset for: 0) services that must not use the external network, 1) services that must be accessable from your management IP only, 2) other services, [1]
- review syslog logging configuration, # make certain what needs to be logged
- install and configure GNU Tiger, run it and post the report. # helps assess post-installation issues.
These should get you past your installation phase. There's more, here's a short piece to meditate on in the meanwhile http://www.aboutdebian.com/security.htm and for [1] see http://www.aboutdebian.com/firewall.htm, but where it reads "Where to learn more" skip the rest and move to http://www.debian.org/doc/manuals/se...-debian-howto/. I'll check back later and add some (or hope somebody else will chip in).

Last edited by unSpawn; 09-09-2009 at 01:56 PM.
 
Old 09-10-2009, 04:44 AM   #7
SoX|OK
LQ Newbie
 
Registered: Sep 2009
Posts: 20

Original Poster
Rep: Reputation: 0
Quote:
- kill all networked services except SSH (and your OpenVPN I think you use), # safety in case of say firewall rule errors
As far as I know, no further network service is up and running, except ssh.

Quote:
- remove packages you are not using now, # minimise footprint wrt maintenance and risks
will be done.

Quote:
- install and configure Samhain or Aide, # independent filesystem integrity checking
- install and configure Logwatch, # crucial reporting
Installed Samhain, logwatch, chkrootkit & rkhunter.

Quote:
- configure /etc/hosts.{deny,allow} for services that use tcp wrappers, # safety in case of say firewall rule or service configuration errors
I will read the man for hosts asap.

Quote:
- propose ruleset for: 0) services that must not use the external network, 1) services that must be accessable from your management IP only, 2) other services, [1]
- review syslog logging configuration, # make certain what needs to be logged
Will search about further information regardings these two things.

Quote:
- install and configure GNU Tiger, run it and post the report. # helps assess post-installation issues.
Done.
Attached Files
File Type: txt security.report.soxserver.txt (8.7 KB, 19 views)
 
Old 09-10-2009, 07:06 AM   #8
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Quote:
Originally Posted by SoX|OK View Post
As far as I know, no further network service is up and running, except ssh.
Excellent.

* I always forget (and then have trouble finding the post) to add that apt should use debsums and a configuration somewhat like this (please verify if still valid).
* I hope you implement a backup scheme that saves copies of files and dirs off-site. This should include your /etc tree, your /var/.*/apt tree, the samhain database and rkhunter.{conf,dat}.
* I also forgot that all reporting should not go to root but to the mailbox of an unprivileged user who will (must) read root email.


Quote:
Originally Posted by SoX|OK View Post
Installed Samhain, logwatch, chkrootkit & rkhunter.
- Chkrootkit doesn't need any configuration or additional tools (just a first run to check for errors) after which you can make a cronjob for it.
- Logwatch doesn't need much configuration either as long as you make sure the cronjob processes the logs of all services (also see ignore.conf to avoid displaying loglines you have verified to be harmless) and make sure you set the logging level to at least "Medium".
- Rootkit Hunter requires you to install 'lsof', 'skdet' and 'unhide'. Review rkhunter.conf (since the machine got compromised before you may elect to use "suspscan" on temp dirs and Apache docroot), then run 'rkhunter --propupd' to set a baseline.
- Samhain is a continuously running process and offers features most others don't have like its own LKM for checking kernel structures, a client-server setup, integrity checking and protection of itself using process hiding, encryption and steganography. Samhain needs configuring (also see attached "samhain_post.sh" to get kernel values and config example "samhain_conf_example" which you must not use unaltered) and might require rebuilding if you're missing features to use (see [1, 2, 3]). Which options you choose depends on the purpose of the machine and auditing requirements and maintenance trade-offs (for instance Samhain's LKM needs to be recompiled for each kernel upgrade). I doubt you'll need advanced self-protection like process hiding or stego. Note it is vital to get file integrity verification up and running a soon as possible.


Quote:
Originally Posted by SoX|OK View Post
I will read the man for hosts asap.
In this quick example:
Code:
ssh: 127.0.0.1, 192.168.1., 128.1.
"ssh" is the known name of the service as defined in /etc/services (try 'getent services ssh'), "127.0.0.1" the single loopback address (read "127.0.0.1/24"), "192.168.1." a "192.168.1.0/32" IP range and "128.1." a "128.1.0.0/16" IP range (notice the trailing dots).


Quote:
Originally Posted by SoX|OK View Post
Done.
Code:
-WARN-- [pass014w] Login ($LOGNAME) is disabled, but has a valid shell.
- This is a system account, necessary to run a service. Review if you need (to remove) the service which should remove the account.
- Possible targets for removal are: irc (there should not be IRC software or an IRC daemon on the system at this stage), games (this is a server), news (you're not running a NNTP daemon).
- Review the other system accounts for the need of a shell. For instance Apache does not need one and can use any inert binary as shell like /sbin/nologin or /bin/false.
- Set password aging and stronger password for root and all unprivileged (human) accounts.

Code:
--WARN-- [pass006w] Integrity of password files questionable (/usr/sbin/pwck -r).
As root run 'pwck -r' manually and review output. Output of form "user $LOGNAME: directory /some/dirname does not exist" is acceptable.

Code:
--WARN-- [acc021w] Login ID citadel appears to be a dormant account.
What is this account related to?

Code:
--WARN-- [acc006w] Login ID libuuid's home directory (/var/lib/libuuid) has group `106' write access.
Run 'getent passwd 106'.

Code:
--WARN-- [root003w] Root user has message capability turned on.
In /root/.bashrc set
Code:
mesg n; dmesg -n 4
.

Code:
--WARN-- [cron004w] Root crontab does not exist
Good!

Code:
--WARN-- [cron005w] Use of cron is not restricted
See manual page about /etc/cron.{deny,allow}. (Same should apply to the 'at' service.)

Code:
--FAIL-- [boot02] The configuration file /boot/grub/menu.lst has world permissions. Should be 0600
All users must be able to read in /etc, but no user except root has any business reading /boot. Chmod files to 0640.

Code:
--WARN-- [boot06] The Grub bootloader does not have a password configured.
Best ignored on remote servers ;-p

Code:
--FAIL-- [lin007w] Normal users can reboot the system through ctrl+alt+del in runlevels 12345
Comment out the "ctrlaltdel" line in /etc/inittab and also the "powerfail"/"powerokwait" lines if you don't use an UPS. Since this is a remote server you can also choose to reduce the amount of mingetty lines to say two.

Code:
--WARN-- [misc021w] There are no umask entries in /etc/init.d/rcS
Add line "umask 027" or "umask 022" depending on your needs.

Code:
--WARN-- [lin012w] The system accepts ICMP redirection messages
echo 0 > /proc/sys/net/ipv4/conf/all/accept_redirects
echo 0 > /proc/sys/net/ipv4/conf/all/send_redirects

Code:
--FAIL-- [lin013f] The system is not protected against Syn flooding attacks
echo 1 > /proc/sys/net/ipv4/tcp_syncookies

Code:
--FAIL-- [lin016f] The system permits source routing from incoming packets
echo 0 > /proc/sys/net/ipv4/conf/all/accept_source_route

Code:
--WARN-- [lin017w] The system is not configured to log suspicious (martian) packets
echo 1 > /proc/sys/net/ipv4/conf/all/log_martians

* Attach output of
Code:
sysctl -a | egrep -ie "(ip_always_defrag|icmp_echo_ignore_broadcasts|icmp_ignore_bogus_error_responses|accept_redirects|send_redirects|accept_source_route|log_martians|rp_filter|secure_redirects|tcp_syncookies|ip_default_ttl|tcp_max_syn_backlog|tcp_syn_retries|mtu_expires|tcp_keepalive_time|icmp_echoreply_rate|tcp_fin_timeout|tcp_rfc1337|ip_no_pmtu_disc|panic|panic_on_oops)"|tr '.' '/'| awk '{print "echo", $3, "> /proc/sys/"$1}'|column -t
Code:
--WARN-- [dev003w] The directory /dev/block resides in a device directory.
Looks good to me?..

Code:
--FAIL-- [logf001f] Log file /var/log/wtmp does not exist
--FAIL-- [logf002f] Log file /var/log/btmp does not exist
Create /var/log/wtmp with owner "root" and group "utmp", access rights might be 0664.
Create /var/log/btmp with owner "root" and group "utmp", access rights might be 0640.
* If warnings are logged (IIRC SSH) then try 0644.

Code:
--ERROR-- [init001e] Don't have required command LSOF.
You should really install this indispensable tool.

Code:
--WARN-- [lin002i] The process `sshd' is listening on socket XX (TCP) on every interface.
It is recommended to configure AllowGroups/AllowUsers in sshd_config, and set tcp wrappers for SSH, and protect by firewall rule, and use fail2ban or equivalent.

Code:
--WARN-- [ssh004w] The PasswordAuthentication directive in /etc/ssh/sshd_config is set to the unapproved defult value: yes.
Apparently you still allow password auth (as fallback?). Not good.

Code:
--FAIL-- [netw020f] There is no /etc/ftpusers file.
This should be configured before running the FTP daemon.

Code:
--WARN-- [xxxxx] The following files are unowned: /var/lib/libuuid
--WARN-- [xxxxx] The following files have undefined groups ownership: /var/lib/libuuid
I don't know who it should be owned by but this should be corrected I think.

Code:
11:33> Security report completed for soxserver.
Well done. It is advisable to rerun Tiger after you have added services.


* If there is anything that is unclear: ask. If there's anything you think implementing could constitute a loss of service, do consider using a local workstation (or virtualization) for testing. Note that using a staging machine to test things before moving to production is not only safe but when synchronized it also provides you with a backup.
Attached Files
File Type: txt samhain_post.sh.txt (383 Bytes, 22 views)
File Type: txt samhain_conf_example.txt (1.7 KB, 23 views)

Last edited by unSpawn; 09-11-2009 at 04:52 AM. Reason: //Added attachments, /NTP/N\0/ typo
 
Old 09-10-2009, 01:30 PM   #9
SoX|OK
LQ Newbie
 
Registered: Sep 2009
Posts: 20

Original Poster
Rep: Reputation: 0
Hi,

I have a question regarding the host-thing.
Is it possible to add a dyndns name there or do I have to add IPs?
Because my entry point is a normal dial up connection

Until now, I have set two passwords, one for root and the other for my personal account, both 32 characters long, containing upper- and lower case letter, numbers and special characters.
As I already told, root not accessable from external. And my account uses a private-key for auth.

You mentioned 'skdet', was is it, because I cannot find it with apt?

Removal of unused accounts will be done tomorrow, because then I have much more time. How should I remove them, only deleting them in passwd?

'pwck -r' only return 'directory XXX does not exist'

I have no idea for what the account 'citadel' is used, it is a fresh install and until now I haven't installed anything except the things we talk/write about.

'getent passwd 106' return nothing

'/root/.bashrc' updated.

Set chmod 0640 for /boot.

Updated /etc/inittab as mentioned.

Code:
error: "Success" reading key "dev.parport.parport0.autoprobe"
error: "Success" reading key "dev.parport.parport0.autoprobe0"
error: "Success" reading key "dev.parport.parport0.autoprobe1"
error: "Success" reading key "dev.parport.parport0.autoprobe2"
error: "Success" reading key "dev.parport.parport0.autoprobe3"
error: permission denied on key 'net.ipv4.route.flush'
error: permission denied on key 'net.ipv6.route.flush'
echo  0     >  /proc/sys/kernel/panic
echo  0     >  /proc/sys/kernel/panic_on_oops
echo  0     >  /proc/sys/kernel/unknown_nmi_panic
echo  0     >  /proc/sys/kernel/panic_on_unrecovered_nmi
echo  0     >  /proc/sys/vm/panic_on_oom
echo  64    >  /proc/sys/net/ipv4/ip_default_ttl
echo  0     >  /proc/sys/net/ipv4/ip_no_pmtu_disc
echo  5     >  /proc/sys/net/ipv4/tcp_syn_retries
echo  7200  >  /proc/sys/net/ipv4/tcp_keepalive_time
echo  60    >  /proc/sys/net/ipv4/tcp_fin_timeout
echo  1     >  /proc/sys/net/ipv4/tcp_syncookies
echo  0     >  /proc/sys/net/ipv4/tcp_rfc1337
echo  1024  >  /proc/sys/net/ipv4/tcp_max_syn_backlog
echo  600   >  /proc/sys/net/ipv4/route/mtu_expires
echo  0     >  /proc/sys/net/ipv4/conf/all/accept_redirects
echo  1     >  /proc/sys/net/ipv4/conf/all/secure_redirects
echo  1     >  /proc/sys/net/ipv4/conf/all/rp_filter
echo  0     >  /proc/sys/net/ipv4/conf/all/send_redirects
echo  0     >  /proc/sys/net/ipv4/conf/all/accept_source_route
echo  1     >  /proc/sys/net/ipv4/conf/all/log_martians
echo  0     >  /proc/sys/net/ipv4/conf/all/arp_filter
echo  1     >  /proc/sys/net/ipv4/conf/default/accept_redirects
echo  1     >  /proc/sys/net/ipv4/conf/default/secure_redirects
echo  0     >  /proc/sys/net/ipv4/conf/default/rp_filter
echo  1     >  /proc/sys/net/ipv4/conf/default/send_redirects
echo  1     >  /proc/sys/net/ipv4/conf/default/accept_source_route
echo  0     >  /proc/sys/net/ipv4/conf/default/log_martians
echo  0     >  /proc/sys/net/ipv4/conf/default/arp_filter
echo  1     >  /proc/sys/net/ipv4/conf/lo/accept_redirects
echo  1     >  /proc/sys/net/ipv4/conf/lo/secure_redirects
echo  0     >  /proc/sys/net/ipv4/conf/lo/rp_filter
echo  1     >  /proc/sys/net/ipv4/conf/lo/send_redirects
echo  1     >  /proc/sys/net/ipv4/conf/lo/accept_source_route
echo  0     >  /proc/sys/net/ipv4/conf/lo/log_martians
echo  0     >  /proc/sys/net/ipv4/conf/lo/arp_filter
echo  1     >  /proc/sys/net/ipv4/conf/eth0/accept_redirects
echo  1     >  /proc/sys/net/ipv4/conf/eth0/secure_redirects
echo  0     >  /proc/sys/net/ipv4/conf/eth0/rp_filter
echo  1     >  /proc/sys/net/ipv4/conf/eth0/send_redirects
echo  1     >  /proc/sys/net/ipv4/conf/eth0/accept_source_route
echo  0     >  /proc/sys/net/ipv4/conf/eth0/log_martians
echo  0     >  /proc/sys/net/ipv4/conf/eth0/arp_filter
echo  1     >  /proc/sys/net/ipv4/icmp_echo_ignore_broadcasts
echo  1     >  /proc/sys/net/ipv4/icmp_ignore_bogus_error_responses
echo  1     >  /proc/sys/net/ipv6/conf/all/accept_redirects
echo  0     >  /proc/sys/net/ipv6/conf/all/accept_source_route
echo  1     >  /proc/sys/net/ipv6/conf/default/accept_redirects
echo  0     >  /proc/sys/net/ipv6/conf/default/accept_source_route
echo  1     >  /proc/sys/net/ipv6/conf/lo/accept_redirects
echo  0     >  /proc/sys/net/ipv6/conf/lo/accept_source_route
echo  1     >  /proc/sys/net/ipv6/conf/eth0/accept_redirects
echo  0     >  /proc/sys/net/ipv6/conf/eth0/accept_source_route
echo  600   >  /proc/sys/net/ipv6/route/mtu_expires
Quote:
Apparently you still allow password auth (as fallback?). Not good.
Yes, the password auth is the fallback but I think that the 32character password should hold some time, or not?

Currently I do not plan to use an FTP deamon. But if I use it, then yes, I need to configure the ftp_users.
 
Old 09-10-2009, 06:34 PM   #10
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Quote:
Originally Posted by SoX|OK View Post
I have a question regarding the host-thing.
Is it possible to add a dyndns name there or do I have to add IPs?
Because my entry point is a normal dial up connection
The problem with using hostnames is names have to be (actively?) resolved thus meaning an extra step. Why wouldn't a range do?


Quote:
Originally Posted by SoX|OK View Post
You mentioned 'skdet', was is it, because I cannot find it with apt?
One of the regulars on our rkhunter users mailing list, Dick Gevers, has offered to put it up for D/L. Credit where credit is due: see http://www.mail-archive.com/rkhunter.../msg01350.html.


Quote:
Originally Posted by SoX|OK View Post
Removal of unused accounts will be done tomorrow, because then I have much more time. How should I remove them, only deleting them in passwd?
Keep them around by setting an(y) inert shell. If no probs occur (research) then opt for removal.


Quote:
Originally Posted by SoX|OK View Post
'pwck -r' only return 'directory XXX does not exist'
Good.


Quote:
Originally Posted by SoX|OK View Post
I have no idea for what the account 'citadel' is used, it is a fresh install and until now I haven't installed anything except the things we talk/write about.
You'll have to do research then.


Quote:
Originally Posted by SoX|OK View Post
'getent passwd 106' return nothing
Now that is odd.


Quote:
Originally Posted by SoX|OK View Post
Code:
error: "Success" reading key "dev.parport.parport0.autoprobe"
echo  $[64*2] >  /proc/sys/net/ipv4/ip_default_ttl # Could increase easily
echo  1 >  /proc/sys/net/ipv4/ip_no_pmtu_disc # trade-off. I set "1".
echo  $[7200/12] >  /proc/sys/net/ipv4/tcp_keepalive_time # Lower means faster reuse.
echo  $[60/2] >  /proc/sys/net/ipv4/tcp_fin_timeout # Lower means faster reuse.
echo  $[1024*4] >  /proc/sys/net/ipv4/tcp_max_syn_backlog # For busy server I start at * 4
echo  0 >  /proc/sys/net/ipv4/conf/all/secure_redirects # Secure redirects should be OK.
echo  0 >  /proc/sys/net/ipv4/conf/default/send_redirects 
echo  0 >  /proc/sys/net/ipv4/conf/default/accept_source_route
echo  1 >  /proc/sys/net/ipv4/conf/default/log_martians
echo  0 >  /proc/sys/net/ipv4/conf/lo/accept_redirects
echo  1 >  /proc/sys/net/ipv4/conf/lo/secure_redirects
echo  1 >  /proc/sys/net/ipv4/conf/lo/rp_filter
echo  0 >  /proc/sys/net/ipv4/conf/lo/send_redirects
echo  0 >  /proc/sys/net/ipv4/conf/lo/accept_source_route
echo  1 >  /proc/sys/net/ipv4/conf/lo/log_martians
echo  0 >  /proc/sys/net/ipv4/conf/eth0/accept_redirects
echo  0 >  /proc/sys/net/ipv4/conf/eth0/secure_redirects
echo  1 >  /proc/sys/net/ipv4/conf/eth0/rp_filter
echo  0 >  /proc/sys/net/ipv4/conf/eth0/send_redirects
echo  0 >  /proc/sys/net/ipv4/conf/eth0/accept_source_route
echo  1 >  /proc/sys/net/ipv4/conf/eth0/log_martians
echo  1 >  /proc/sys/net/ipv4/conf/eth0/arp_filter
           /proc/sys/net/ipv6/conf/ # I don't think you use IPv6.

Quote:
Originally Posted by SoX|OK View Post
Yes, the password auth is the fallback but I think that the 32character password should hold some time, or not?
If the server recognizes you don't advertise / do pubkey auth it'll fall back to passwd auth. How much milliseconds does that gain you?

Last edited by unSpawn; 09-11-2009 at 04:53 AM. Reason: //Close tags
 
Old 09-10-2009, 11:40 PM   #11
chrism01
LQ Guru
 
Registered: Aug 2004
Location: Sydney
Distribution: Rocky 9.2
Posts: 18,359

Rep: Reputation: 2751Reputation: 2751Reputation: 2751Reputation: 2751Reputation: 2751Reputation: 2751Reputation: 2751Reputation: 2751Reputation: 2751Reputation: 2751Reputation: 2751
Just noticed this
Quote:
news (you're not running a NTP daemon).
Probably a typo, NNTP=News (you prob don't want this), NTP=Network Time Protocol (you prob just want to recv this, but not run an NTP server).
 
Old 09-11-2009, 04:54 AM   #12
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Thanks, I've corrected it.
 
Old 09-11-2009, 10:14 AM   #13
SoX|OK
LQ Newbie
 
Registered: Sep 2009
Posts: 20

Original Poster
Rep: Reputation: 0
Quote:
Why wouldn't a range do?
I will check if a range will work as well.

What do you mean with 'inert shell'? '/bin/false'?

'citadel' is a Mail-Transport-Agent and as far as I could see, a standard process in the debian-lenny install.

Quote:
If the server recognizes you don't advertise / do pubkey auth it'll fall back to passwd auth. How much milliseconds does that gain you?
So if I disabled the password-auth, it will still fall back to it when no private key is used?

Last edited by SoX|OK; 09-11-2009 at 10:15 AM. Reason: writing mistake
 
Old 09-12-2009, 04:41 AM   #14
SoX|OK
LQ Newbie
 
Registered: Sep 2009
Posts: 20

Original Poster
Rep: Reputation: 0
Another thing,

anything that speaks agains ZNC or is any other bouncer commendable or maybe better/saver?

regards,
OK

Last edited by SoX|OK; 09-12-2009 at 04:42 AM. Reason: wording
 
Old 09-20-2009, 07:13 AM   #15
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
My apologies for the late reply. I asked somebody to take care of this thread but unfortunately that person did not.

Quote:
Originally Posted by SoX|OK View Post
What do you mean with 'inert shell'?
An "inert shell", usually a binary like /sbin/nologin or bin/false, denies that user to use a shell, as opposed to the "/bin/bash (-i)" a regular user would. Note that not all system users that have "/bin/sh" must have an inert shell. For example the account that has /bin/halt as shell is better left as it is.


Quote:
Originally Posted by SoX|OK View Post
'citadel' is a Mail-Transport-Agent and as far as I could see, a standard process in the debian-lenny install.
OK.


Quote:
Originally Posted by SoX|OK View Post
So if I disabled the password-auth, it will still fall back to it when no private key is used?
This is something on a level that you could easily test yourself without asking.


Quote:
Originally Posted by SoX|OK View Post
anything that speaks agains ZNC or is any other bouncer commendable or maybe better/saver
As far as I can see there's two CVE's: CVE-2009-2658 (Directory traversal vulnerability in ZNC before 0.072) and CVE-2009-0759 (Multiple CRLF injection vulnerabilities in webadmin in ZNC before 0.066). Regardless the thing shouldn't run as root and running it under a combination of SELinux, firewall rules (DoS?), traffic monitoring and a chroot may provide additional security.

Last edited by unSpawn; 09-20-2009 at 07:15 AM. Reason: //more *is* more
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
hardening \ securing \ auditing a linux server account Networking Linux - Security 15 09-22-2009 07:00 PM
hardening \ securing \ auditing a linux server account Networking Linux - Security 4 08-06-2009 01:20 PM
Securing / Hardening RHEL4 for Web Hosting?? phpinfo Linux - Security 7 02-12-2009 08:08 AM
LXer: Securing and Hardening Linux Production Systems LXer Syndicated Linux News 0 01-21-2006 01:16 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 09:50 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration