LinuxQuestions.org
Latest LQ Deal: Latest LQ Deals
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 11-25-2009, 11:59 AM   #31
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600

You're both right of course. I'd like to think there's also knowledge involved (or lack thereof: especially with those that don't even know know GNU/Linux except for the web-based panels they "administer" machines from) but of course even knowledge (the right way) doesn't prohibit people from making bad decisions anyway, especially where things boil down to simple economics...

OK, so except for money, trends, referrals and contracts (both good points!) there should also be ways to check for security practically, right? Web stack checklists, specific diagnostic tools, et cetera?
 
Old 11-26-2009, 01:03 AM   #32
slimm609
Member
 
Registered: May 2007
Location: Chas, SC
Distribution: slackware, gentoo, fedora, LFS, sidewinder G2, solaris, FreeBSD, RHEL, SUSE, Backtrack
Posts: 430

Rep: Reputation: 67
There are many good guides out there that people look over everyday



There are the DISA STIG guides (Security Technical Implementation Guidelines). The STIGs are open to the public.

http://iase.disa.mil/stigs/stig/unix-stig-v5r1.pdf

and they even have a package to download and run against your machine and it will tell you if you meet the common best practices.

Unix scripts
http://iase.disa.mil/stigs/SRR/unix.html

and

Unix web server scripts
http://iase.disa.mil/stigs/SRR/websr...0070727.tar.gz
 
1 members found this post helpful.
Old 11-29-2009, 06:45 PM   #33
unixfool
Member
 
Registered: May 2005
Location: Northern VA
Distribution: Slackware, Ubuntu, FreeBSD, OpenBSD, OS X
Posts: 782
Blog Entries: 8

Rep: Reputation: 158Reputation: 158
Quote:
Originally Posted by slimm609 View Post
There are many good guides out there that people look over everyday



There are the DISA STIG guides (Security Technical Implementation Guidelines). The STIGs are open to the public.

http://iase.disa.mil/stigs/stig/unix-stig-v5r1.pdf

and they even have a package to download and run against your machine and it will tell you if you meet the common best practices.

Unix scripts
http://iase.disa.mil/stigs/SRR/unix.html

and

Unix web server scripts
http://iase.disa.mil/stigs/SRR/websr...0070727.tar.gz
DISA's STIGs totally slipped my mind! Thanks for the reminder!

There are also quite a few non-govt-related write-ups similar to DISA's STIGs.

I worked for one government organization that was trying to apply STIGs as policy. While this is usually a good practice, this particular organization was doing several things that were a bit extreme:

1. Installing AV on Linux hosts that were dedicated NIDS.

2. Installing iptables on Linux hosts that were dedicated NIDS.

I disagree with doing the above. Those particular IDSs were dropping packets BEFORE AV was installed. They were dealing with extreme amounts of traffic and had a pretty decent signature base. Adding AV to this mix is a recipe for disaster, as both IDS software and AV usually has high levels of overhead. The systems were also pretty deep into the network. IMO, using iptables was like using a sledgehammer when a regular hammer was the better tool.

What ticked me off about all of this was the organization's blind acceptance of a guideline. IDSs should always be bastion hosts. Sometimes, exceptions to guidelines and policy needs to be made.

They also had DNS services running on one particular platform of IDS, which kept crashing the server because of the high stress of sniffing and resolving addresses.

I think it is important to not overload certain systems. The STIGs are pretty good but organizations that have the need to follow STIGs should know that these are only recommendations. Seeing smart people do dumb things makes me not want to work for them (yeah, it wasn't long after that that I left).

Last edited by unixfool; 11-29-2009 at 06:47 PM. Reason: slight edit
 
Old 11-30-2009, 08:01 AM   #34
Jim Bengtson
Member
 
Registered: Feb 2009
Location: Iowa
Distribution: Ubuntu 9.10
Posts: 164

Rep: Reputation: 38
I've found an excellent book on handling an intrusion incident:

Incident response: investigating computer crime
by Chris Prosise, Kevin Mandia, and Matt Pepe
http://www.amazon.com/Incident-Respo...dp_ob_title_bk

Monitoring computer systems for evidence of malicious activity, and reacting to such activity when it's detected. With coverage of Windows and Unix systems as well as non-platform-specific resources like Web services and routers, the book covers the fundamentals of incident response, processes for gathering evidence of an attack, and tools for making forensic work easier.
 
Old 11-30-2009, 09:01 AM   #35
abefroman
Senior Member
 
Registered: Feb 2004
Location: lost+found
Distribution: CentOS
Posts: 1,430

Rep: Reputation: 55
Quote:
Originally Posted by Jim Bengtson View Post
I've found an excellent book on handling an intrusion incident:

Incident response: investigating computer crime
by Chris Prosise, Kevin Mandia, and Matt Pepe
http://www.amazon.com/Incident-Respo...dp_ob_title_bk

Monitoring computer systems for evidence of malicious activity, and reacting to such activity when it's detected. With coverage of Windows and Unix systems as well as non-platform-specific resources like Web services and routers, the book covers the fundamentals of incident response, processes for gathering evidence of an attack, and tools for making forensic work easier.
Looks like a good book, its from 2003 though, so I'm sure there have been a lot of changes since then.
 
Old 11-30-2009, 09:07 AM   #36
Jim Bengtson
Member
 
Registered: Feb 2009
Location: Iowa
Distribution: Ubuntu 9.10
Posts: 164

Rep: Reputation: 38
Quote:
Looks like a good book, its from 2003 though, so I'm sure there have been a lot of changes since then.
The tools used to attack have changed, but how you respond to an attack hasn't. This book isn't about how to protect yourself against the latest threats, it assumes that you will be attacked and that the attacker will succeed. This book covers what to do BEFORE that attack, what do do when you detect the attack, how to gather information about the attack, how to recover from an attack, and how to document the attack and your response for possible use by the courts, and so you know that you've succeeded in removing any back doors or malware left behind by the attacker.
 
Old 11-30-2009, 09:13 AM   #37
abefroman
Senior Member
 
Registered: Feb 2004
Location: lost+found
Distribution: CentOS
Posts: 1,430

Rep: Reputation: 55
Quote:
Originally Posted by Jim Bengtson View Post
The tools used to attack have changed, but how you respond to an attack hasn't. This book isn't about how to protect yourself against the latest threats, it assumes that you will be attacked and that the attacker will succeed. This book covers what to do BEFORE that attack, what do do when you detect the attack, how to gather information about the attack, how to recover from an attack, and how to document the attack and your response for possible use by the courts, and so you know that you've succeeded in removing any back doors or malware left behind by the attacker.
OK, sounds like a good one then.
 
Old 11-30-2009, 10:01 AM   #38
Jim Bengtson
Member
 
Registered: Feb 2009
Location: Iowa
Distribution: Ubuntu 9.10
Posts: 164

Rep: Reputation: 38
I'll try to post a full review when I've finished reading it.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
LXer: Securing Your Server With A Host-based Intrusion Detection System LXer Syndicated Linux News 0 09-20-2006 03:54 PM
intrusion? tincat2 Linux - Security 2 01-01-2005 01:56 AM
Intrusion Detection!!! egyptian Linux - Security 2 04-02-2004 11:37 AM
Intrusion Detection? matador Linux - Security 5 09-03-2003 04:44 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 02:01 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration