Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here. |
Notices |
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
Are you new to LinuxQuestions.org? Visit the following links:
Site Howto |
Site FAQ |
Sitemap |
Register Now
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
|
 |
03-16-2006, 02:16 AM
|
#1
|
LQ Newbie
Registered: Mar 2006
Posts: 2
Rep:
|
Harden file system protections
Hello everyone!
I have a "Linux question" concerning the hardening file sytem protections.
Do you guys think that it is wise to set all file system protections to least privelege model, where no "world" permissions exist?
I mean what if I have a script which removes all "world" permissions in all file system and skipping some "not ordinary" folders such as /proc, /dev, /mnt?
Do you think it will spoil all the system? Is there any list on the web which defines that certain files and directories MUST have "other" permissions in order to work properly, ex: /etc/passwd? What if my machine is only used for version control like CVS, thus will it protect system from usage of triggers (Taking into account that later cvsroot is chrooted)
Thank you for your ideas...
|
|
|
03-16-2006, 02:49 AM
|
#2
|
LQ Guru
Registered: Aug 2001
Location: Fargo, ND
Distribution: SuSE AMD64
Posts: 15,733
|
Some folders need to be world writable, such as in /tmp, /var/tmp, /var/spool/mail. Most distros allow you to have roots mail forwarded to you. There are programs that monitor the filesystems for you and alert you to world writable files and directories. You will also be warned about changed md5 checksums and altered configuration files. You will get a warning about world writable files that aren't required by the system. Read up on the documentation for your distro. I bet you already have a program like this, and it may even be running, but you haven't noticed it before.
|
|
|
03-16-2006, 03:30 AM
|
#3
|
LQ Newbie
Registered: Mar 2006
Posts: 2
Original Poster
Rep:
|
Thank for your answer.
Do you remember what are these programs for Redhat for example. Do you think of any other files and directories that need read or write or execute world perms?
|
|
|
03-16-2006, 04:27 AM
|
#4
|
LQ Guru
Registered: Aug 2001
Location: Fargo, ND
Distribution: SuSE AMD64
Posts: 15,733
|
I don't know which program Red Hat uses. You'll need to read the administration manual or use the help system, or google for an answer. Also, read through the root users mail. The system may be sending security check alerts already.
You can use the "find" command to locate files and directories with world writable permissions, and then decide if it is necessary. Also search for suid programs.
|
|
|
All times are GMT -5. The time now is 01:42 PM.
|
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.
|
Latest Threads
LQ News
|
|