LinuxQuestions.org
Help answer threads with 0 replies.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 11-02-2012, 04:09 PM   #1
EganSolo
LQ Newbie
 
Registered: Nov 2012
Posts: 1

Rep: Reputation: Disabled
What security holes you see in this linux conf below?


Hi guys,

First time post here. I'm in the process of porting over a web site I run on a dedicated box to a newer version of that box.
Here's a brief outline of the security conf on the new box. I'm trying to keep it as simple as possible but don't want to miss any gaping hole.

Ubuntu 12.04 server.
LAMP stack.
Postfix / Dovcot / Spamassassin

1. No human users (other than myself) are allowed on this box. Thus, there are only two human users: egan and root.

2. Ports open: (nmap results)
open port 22/tcp
open port 995/tcp
open port 143/tcp
open port 80/tcp
open port 110/tcp
open port 443/tcp
open port 993/tcp
PORT STATE SERVICE
22/tcp open ssh
25/tcp filtered smtp
80/tcp open http
110/tcp open pop3
135/tcp filtered msrpc
139/tcp filtered netbios-ssn
143/tcp open imap
443/tcp open https
445/tcp filtered microsoft-ds
646/tcp filtered ldp
993/tcp open imaps
995/tcp open pop3s
1434/tcp filtered ms-sql-m

ssh is accessible only with key-cert (no password access allowed).
This server runs an ubuntu lamp stack with postfix/dovcot/spamassassin etc combo.
Nothing else runs on it.

Question:
==========
Since users cannot log in except through an ssh session for which they would need a key and the key is well protected, do I need to harden the system further?

If so, I am wondering if Apparmor is sufficient or if I need to use Grsecurity combo?

I do want a secure system but I don't want to go overboard with the admin
side of thing.

Any comments would be greatly appreciated.

Thanks

Egan
 
Old 11-02-2012, 05:33 PM   #2
linuxxer
Member
 
Registered: Apr 2011
Location: I have my own planet
Distribution: SlackwareŽ
Posts: 257

Rep: Reputation: Disabled
Quote:
Originally Posted by EganSolo View Post
If so, I am wondering if Apparmor is sufficient or if I need to use Grsecurity combo?
I think, Apparmor and GrSecurity both providing MAC.
So you can use only one of them, not both.

Last edited by linuxxer; 11-02-2012 at 06:28 PM.
 
Old 11-02-2012, 10:02 PM   #3
linosaurusroot
Member
 
Registered: Oct 2012
Distribution: OpenSuSE,RHEL,Fedora,OpenBSD
Posts: 982
Blog Entries: 2

Rep: Reputation: 244Reputation: 244Reputation: 244
I wouldn't put mail and web on the same box- the kinds of firewall rules you want for them are quite different. Why so many ports open? Have you removed unnecessary packages?
You haven't posted anything about the application configs.
 
Old 11-03-2012, 10:43 AM   #4
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Quote:
Originally Posted by EganSolo View Post
do I need to harden the system further?
While you have posted useful information what's missing is an overview of what steps you took. The easiest way to start is to read your distributions' documentation wrt security and hardening, turn it into a checklist and compare it with what you have done. That should address anything ranging from install time issues like package selection, post-install cleanup, account settings like password strength checking, aging, quota, ulimits, login access and process restrictions, service configuration, network configuration, access restrictions and traffic limiting, maintenance, updating, verifying integrity and making backups. A basic distro-agnostic tool to help compare certain local aspects is GNU/Tiger. Run it on a pristine setup, make changes, then run again to check the effect. After that you could try the "Securing Debian Manual" for any issues your distributions' documentation doesn't address, followed by a check against the Cisecurity.org Debian Benchmark and then address issues from the OWASP top ten. That should cover anything including LAMP stack and other network-related issues. A tool to help you assess the machines security stance from a remote POV is OpenVAS as it focuses on services rather than "simply" checking if a port is accessible or not like nmap does.

Some things to be mindful of no matter what you do:
- Know what you do: ignorance and negligence are the two most common causes for compromises.
- Allow (install, run, grant access to) only that what is strictly needed.
- Be vigilant always: security is not a one-off but a continuous process of auditing and adjusting.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Finding security holes roopakl Linux - Security 8 10-05-2011 04:14 AM
LXer: Damn Vulnerable Linux is Littered with Security Holes LXer Syndicated Linux News 0 07-30-2010 03:00 PM
what are the security holes of PAM ? vijith2k2 Linux - Software 2 11-27-2008 06:45 PM
LXer: Users get to the root of Linux security holes LXer Syndicated Linux News 0 01-24-2006 10:16 AM
Known RedHat Security holes? Volcom Linux - Security 2 06-13-2003 09:44 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 02:54 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration