Quote:
Originally Posted by KernelPaniker
The virtual dedicated server comes "ready to go" so I assumed (foolishly) that there were some things in place.
|
That would work partially if you leased your VDS from a quality company at the top end of the price range. In turn for shelling out way more cash you could expect the bed of roses type of service. I'm saying
partially because phones, the BFG2000, microwave ovens, small tactical nuclear missiles, hardware, software, most things come with a manual (or two). Not taking the time to or just not wanting to familiarize oneself with features offered and usage instructions may well lead to problems (as you've experienced). OTOH GNU/Linux' image, as offered by low range price fighting resellers, is also not helped by them promoting it as some sort of turnkey system and the (wrong) idea that
being able to click ones way through some web-based admin panel is a substitute for knowledge or even makes one (feel like) a Good Admin. Not.
I. There is no substitute for knowledge.
Quote:
Originally Posted by KernelPaniker
I ran rkhunter and chkrootkit and they both informed me of SHV4 and SHV5. Also there were a lot of "errors" when I tried yum update and proc aux. I have no idea how they got in. (..) The machine has already been re-provisioned (reinstalled).
|
Alright. So the next things you should learn are that you should suppress the "on failure immediately re-install whole OS" reflex and investigate before nuking things and that when it comes to assessing a situation we will almost always want to see logs or log excerpts, actual tool output and exact error messages. Because without knowing how they got in you're bound to make the same mistake again and tools may emit what really are false positives.
Quote:
Originally Posted by KernelPaniker
I am guessing because of not being updated.
|
With all due respect but whatever the reason for doing that, that is a major error on your side. While you may not exactly care or feel responsible, we do. Because when a machine connected to the 'net gets compromised it may well serve as a springboard to other systems.
II. Running GNU/Linux comes with responsibilities.
Quote:
Originally Posted by KernelPaniker
I guess What I want to know is if there are some newbie guides to hardening.
|
Please read
at least these:
- the
CERT Intruder Detection Checklist (to be prepared),
- the Centos documentation at
http://www.centos.org/docs/5/ (basic admin),
- the Centos Wiki
HowTos > OS Protection > Basic Hardening,
-
Hardening RHEL5,
-
NSA reference guide for securing Linux installations,
-
NSA Guide to securing Linux installations.
Add these:
-
Securing and Hardening Red Hat Linux Production Systems (puschitz),
-
Securing Debian Manual (one of the oldest, most comprehensive ones).
And maybe check the
LQ FAQ: Security references.
I suggest you read the first 6 documents, extract core measures to take to a checklist then post your checklist here. We'll then help you adjust and correct. Deal?