Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here. |
Notices |
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
Are you new to LinuxQuestions.org? Visit the following links:
Site Howto |
Site FAQ |
Sitemap |
Register Now
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
|
 |
04-27-2006, 12:57 PM
|
#1
|
Member
Registered: Aug 2005
Location: Lancashire (United Kingdom)
Distribution: Debian Etch, on 686 machine.
Posts: 509
Rep:
|
Questions on securing my system by a newbie
At present I am running debian etch and I was wondering if there are any other easy steps I take that will help me stay secure on my system.
I checkfor updates everday with apt and apply them as soon as any hit the repositories. I have enabled the etch security repositories also.
I do not run as root at all. When I need to run as root I use su or kdesu and then quick the application as soon as possable.
I change my root and user passwords regularaly.
I run chkrootkit and rkhunter regularaly.
I have a hardware firewall on my router and use ip tables locally on this machine (paranoir really).
I avoid pre built debian packages as much as possable, If I need them I get them from the projects own site or from sources I trust.
I have disabled all of the services that I do not need running.
So are there any other easy steps I can take to keep my self secure. I read the thread stickied above that covers security but much of it was too advanced for me. This is just a desktop machine.
Thanks in advance
Michael.
Last edited by Michael_aust; 04-27-2006 at 01:00 PM.
|
|
|
04-27-2006, 01:17 PM
|
#2
|
LQ Guru
Registered: Dec 2005
Location: Somewhere on the String
Distribution: Debian Wheezy (x86)
Posts: 6,094
|
My  is that you're doing quite well (better than me anyway). I would look into using sudo instead of su because you can limit your user to only specific root tasks (and I believe directories or files also). That way if you accidentally were to run some malicious script, it wouldn't be able to have complete root priveledges.
Also, in the event you have friends with Windows machines, you might use a virus scanner just to keep from infecting them (you're not affected by the viruses, but you can still transmit them by forwarding malicious attachments or file sharing, etc).
|
|
|
04-27-2006, 01:19 PM
|
#3
|
Member
Registered: Aug 2005
Location: Lancashire (United Kingdom)
Distribution: Debian Etch, on 686 machine.
Posts: 509
Original Poster
Rep:
|
i will look into sudo, thanks. Well i dont run any scripts I download as root only as a user, so the script would only be able to infect that user accoutn correct?
|
|
|
04-27-2006, 01:23 PM
|
#4
|
LQ Guru
Registered: Dec 2005
Location: Somewhere on the String
Distribution: Debian Wheezy (x86)
Posts: 6,094
|
That's correct. It may come to pass though that sometime down the road you do want to run a script that needs root priveledge. So it's a good habit anyway...
|
|
|
04-27-2006, 01:57 PM
|
#5
|
Member
Registered: Dec 2004
Location: IN, USA
Distribution: debian etch
Posts: 402
Rep:
|
A few apps that may help you:
tiger
bastille
harden-tools (and a number of others with harden in the title)
|
|
|
04-27-2006, 03:25 PM
|
#6
|
Member
Registered: Aug 2005
Location: Lancashire (United Kingdom)
Distribution: Debian Etch, on 686 machine.
Posts: 509
Original Poster
Rep:
|
are such tools overly restricting to what I can do? Or will they not affect my while im running an application as root?
|
|
|
04-27-2006, 03:56 PM
|
#7
|
Member
Registered: Dec 2004
Location: IN, USA
Distribution: debian etch
Posts: 402
Rep:
|
Not at all.
Tiger just does a daily scan to check for security vulnerabilities and emails you a summary. It is up to you to fix any problems.
Bastille is run once. It looks for security holes and asks you what you want to do about them.
I haven't used harden-tools, so I can't comment on that one.
For the super paranoid there is selinux. But this one looks pretty hard to set up, and is probably a bit restrictive.
Hacking Linux Exposed is a good book to learn about security stuff. And easy to read even for newbie.
|
|
|
04-27-2006, 04:23 PM
|
#8
|
Member
Registered: Aug 2005
Location: Lancashire (United Kingdom)
Distribution: Debian Etch, on 686 machine.
Posts: 509
Original Poster
Rep:
|
yeh iv read about selinux, seems fedora users have a hardtime with it
|
|
|
04-27-2006, 06:29 PM
|
#9
|
Senior Member
Registered: May 2004
Location: Albuquerque, NM USA
Distribution: Debian-Lenny/Sid 32/64 Desktop: Generic AMD64-EVGA 680i Laptop: Generic Intel SIS-AC97
Posts: 4,250
Rep:
|
|
|
|
All times are GMT -5. The time now is 07:40 PM.
|
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.
|
Latest Threads
LQ News
|
|