Cover image for Linux system security : an administrator's guide to open source security tools
Title:
Linux system security : an administrator's guide to open source security tools
Personal Author:
Publication Information:
Upper Saddle River, N.J. : Prentice Hall, 2000
ISBN:
9780130158079
Added Author:

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000004902965 QA76.76.O63 M354 2000 Open Access Book Book
Searching...
Searching...
30000004902957 QA76.76.O63 M354 2000 Open Access Book Book
Searching...

On Order

Summary

Summary

-- One of the first Linux security books to cover Bastille, a program which tightens system security and can even lock down the entire system in cases where the system is seriously compromised.-- New chapter on network sniffers and port scanners used to detect intruders.-- Updated for Redhat 7.2.As more companies are moving to Linux for mission-critical applications, security becomes a major issue. This guide explains the pros and cons of the most the valuable open source security tools and is complete with implementation details. It gives detailed instructions on the implementation, configuration, and use of publicly available tools and features of Linux as they relate to Linux security. Essential background information is provided in the book's introductory chapters. Administrators will learn to: Prepare Linux systems for a production environment; Identify vulnerabilities, and planning for security administration; Configure Linux-based firewalls, authentication, and encryption; Secure filesystems, email, web servers, and other key applications; Protect mixed Linux/Unix and Windows environments. New to this Edition: Updated for Redhat 7.2; One of the first Linux security books to cover Bastille, a hardening program which tightens system security and can even lock down the entire system in cases where the system is seriously compromised; New chapter on network sniffers and port scanners used to detect intruders; Will Cover Open SSH - the new open sour


Author Notes

Scott Mann currently works for SGI, specializing in Linux systems. Previously, he was an independent consultant providing system, network, and security administration services and education.
Ellen L. Mitchell is a network analyst at Texas AandM University, responsible for campus network security, development, and administration. A consultant specializing in UNIX and network security, she currently maintains the tiger UNIX security package.


Table of Contents

Figuresp. xix
Examplesp. xxi
Tablesp. xxix
Prefacep. xxxiii
Chapter 1 Vulnerability Surveyp. 1
What Happened?p. 2
Other Cracker Activitiesp. 3
So, Are You Going to Show Us How to Break into Systems?p. 3
A Survey of Vulnerabilities and Attacksp. 4
Technicalp. 4
Socialp. 6
Physicalp. 6
Chapter 2 Security Policiesp. 11
What Is Computer and Network Security?p. 13
Elements of a Computing Environmentp. 13
Risk Analysisp. 14
The Security Policyp. 14
Securing Computers and Networksp. 15
User Privacy and Administrator Ethicsp. 18
Chapter 3 Background Informationp. 21
BIOS Passwordsp. 22
Linux Installation and LILOp. 22
A Note about LILOp. 22
Recovering a Corrupt Systemp. 24
Installation and LILO Resourcesp. 24
Start-Up Scriptsp. 24
Red Hat Package Managerp. 26
Verifying Packages with RPMp. 26
Checking PGP Signatures with RPMp. 27
RPM Resourcesp. 28
RPM Mailing Listp. 28
TCP/IP Networking Overviewp. 28
The TCP/IP Model Layersp. 30
Remote Procedure Call Applicationsp. 36
Trusted Host Files and Related Commandsp. 36
Some Major Applicationsp. 37
Network Monitoringp. 38
General TCP/IP Networking Resourcesp. 39
NFS, Samba, NIS, and DNS Resourcesp. 40
Request for Commentp. 40
Cryptographyp. 41
The Purpose of Cryptographyp. 41
Algorithm Typesp. 42
Hash Functions and Digital Signaturesp. 44
Passwords Aren't Encrypted, They're Hashed!p. 45
An Overview of PGPp. 45
Cryptography Referencesp. 47
Testing and Production Environmentsp. 47
Security Archivesp. 47
Software Testingp. 48
Source Code Auditingp. 48
Pristine Backupsp. 49
Security Resourcesp. 49
Licensesp. 50
Chapter 4 Users, Permissions, and Filesystemsp. 57
User Account Managementp. 57
Good Passwordsp. 58
All Accounts Must Have Passwords! Or Be Locked!p. 59
Password Aging and the Shadow Filep. 61
Restricted Accountsp. 64
Shell Historyp. 66
The Root Accountp. 66
Using the Root Accountp. 66
Multiple root Usersp. 67
Minimizing the Impact of root Compromisep. 68
Configuring /etc/securettyp. 68
Group Account Managementp. 69
File and Directory Permissionsp. 70
User File and Directory Permissionsp. 71
System File and Directory Permissionsp. 73
SUID and SGIDp. 74
File Attributesp. 75
Using xlock and xscreensaverp. 77
Filesystem Restrictionsp. 78
Chapter 5 Pluggable Authentication Modulesp. 81
PAM Overviewp. 82
PAM Configurationp. 83
PAM Administrationp. 86
PAM and Passwordsp. 86
PAM and Passwords Summaryp. 92
PAM and loginp. 93
Time and Resource Limitsp. 95
Access Control with pam_listfilep. 100
PAM and sup. 103
Using pam_accessp. 104
Using pam_lastlogp. 105
Using pam_rhosts_authp. 106
One-Time Password Supportp. 108
PAM and the other Configuration Filep. 108
Additional PAM Optionsp. 109
PAM Logsp. 109
Available PAM Modulesp. 109
PAM-Aware Applicationsp. 112
Important Notes about Configuring PAMp. 112
The Future of PAMp. 114
Chapter 6 One-Time Passwordsp. 117
The Purpose of One-Time Passwordsp. 118
S/Keyp. 118
S/Key OTP Overviewp. 119
S/Key Version 1.1bp. 121
S/Key Version 2.2p. 132
OPIEp. 132
Obtaining and Installing OPIEp. 133
Implementing and Using OPIEp. 139
OPIE and PAMp. 143
Obtaining and Installing pam_opiep. 143
Obtaining and Installing pam_ifp. 144
Implementing pam_opie and pam_ifp. 144
Which OTP System Should I Use?p. 147
Advantages and Disadvantages of S/Keyp. 147
Advantages and Disadvantages of OPIEp. 147
S/Key and OPIE Vulnerabilitiesp. 147
Chapter 7 System Accountingp. 149
General System Accountingp. 149
Connection Accountingp. 150
The last Commandp. 151
The who Commandp. 152
One Other Commandp. 153
Process Accountingp. 153
The sa Commandp. 154
The lastcomm Commandp. 155
Accounting Filesp. 156
Chapter 8 System Loggingp. 159
The syslog System Logging Utilityp. 159
Overviewp. 160
The /etc/syslog.conf Filep. 160
Invoking the syslogd Daemonp. 164
Configuring /etc/syslog.confp. 164
The klogd Daemonp. 170
Other Logsp. 170
Alternatives to syslogp. 171
The auditd Utilityp. 171
Chapter 9 Superuser Do (sudo)p. 173
What Is sudo?p. 173
Obtaining and Implementing sudop. 174
Features of Version 1.5.9p4p. 174
Implementing Version 1.5.9p4p. 175
Using sudop. 178
The Functionality of sudop. 178
The /etc/sudoers Filep. 178
General Syntax of /etc/sudoersp. 181
The visudo Commandp. 184
Options to the sudo Commandp. 184
A More Sophisticated Examplep. 185
Setting Up sudo Loggingp. 188
Reading sudo Logsp. 188
PAM and sudop. 189
Disabling root Accessp. 190
Vulnerabilities of sudop. 191
Chapter 10 Securing Network Services: TCP_wrappers, portmap, and xinetdp. 193
TCP_Wrappersp. 194
Building TCP_Wrappersp. 196
Access Control with TCP_Wrappersp. 202
TCP_Wrappers Utility Programsp. 216
TCP_Wrappers Vulnerabilitiesp. 218
The Portmapperp. 218
Building the Portmapperp. 219
Implementing Portmapper Access Controlp. 223
The portmap Log Entriesp. 224
Gracefully Terminating and Recovering the Portmapperp. 224
Portmapper Vulnerabilitiesp. 226
Unwrapped Servicesp. 226
Replacing inetd with xinetdp. 226
Advantages of xinetdp. 227
Disadvantages of xinetdp. 228
Obtaining xinetdp. 228
Building xinetdp. 229
The xinetd Configuration Filep. 232
The xinetd Daemonp. 250
Which One Should I Use?p. 252
Chapter 11 The Secure Shellp. 257
Overview of SSHp. 257
Host-Based Authentication Using RSAp. 257
Authenticating the Userp. 259
Available Versions of SSHp. 263
Obtaining and Installing SSHp. 264
Compiling SSHp. 265
Configuring the Secure Shellp. 267
Configuring the Server Sidep. 269
Configuring the Client Sidep. 275
Using SSHp. 282
Configuring SSH Authentication Behaviorp. 282
sshd Missing in Actionp. 282
Authentication Flow of Eventsp. 283
Nonpassword Authenticationp. 289
Password-Based Authenticationp. 304
Exploring ssh Functionalityp. 304
ssh Examplesp. 304
scp Examplesp. 306
Port Forwarding and Application Proxyingp. 307
Secure Shell Alternativesp. 310
Chapter 12 Crackp. 313
Obtaining Crackp. 314
Major Components of Crackp. 314
Crack Overviewp. 315
Building Crackp. 318
Modifying Crack for Linuxp. 318
Modifying Crack for MD5p. 319
Modifying Crack for Bigcryptp. 319
Preparing Crack for crypt (3)p. 320
Compiling and Linking Crackp. 320
Compiling Crack Itselfp. 320
Crack Dictionariesp. 321
Obtaining Other Crack Dictionariesp. 323
Using Crackp. 323
Running Crackp. 323
Running Crack over the Networkp. 328
Crack 7p. 330
Crack Rulesp. 330
What Do We Do about Cracked Passwords?p. 336
The White Hat Use of Crackp. 337
Effectively Using Crackp. 338
Chapter 13 Auditing Your System with tigerp. 341
Overview of tigerp. 341
Obtaining tigerp. 342
Major Components of tigerp. 342
Overview of tiger Configurationp. 347
Overview of Run-Time Operationp. 360
tiger Scriptsp. 361
Installing tiger to Run through cronp. 368
Which Scripts Should I Run?p. 370
cronrc for a Development Machinep. 372
Running Crack from tigerp. 373
Deciphering tiger Outputp. 373
Troubleshooting tigerp. 375
Modifying tigerp. 375
Modifying Scriptsp. 376
Adding New Checksp. 376
Signaturesp. 377
Recommendationsp. 379
Chapter 14 Tripwirep. 381
Tripwire Overviewp. 382
Obtaining and Installing Tripwirep. 383
Tripwire Version 1.2p. 383
The Tripwire Configuration Filep. 386
Extending the Configuration Filep. 389
Effectively Building the Tripwire Configuration Filep. 391
Example Configuration File for Red Hat Linuxp. 393
The tripwire Commandp. 395
Tripwire Initialize Modep. 396
Effective Tripwire Initializationp. 397
Storing the Databasep. 398
Routine Tripwire Runs--Compare Modep. 399
A Note on Performancep. 402
Tripwire Update Modep. 402
Chapter 15 The Cryptographic and Transparent Cryptographic Filesystemsp. 405
Overview of the Cryptographic File Systemp. 405
CFS Flow of Eventsp. 406
Obtaining and Installing CFSp. 406
CFS Administrative Tasksp. 408
Using CFSp. 410
Creating and Attaching CFS Directoriesp. 410
The CFS Commands and Daemon Detailedp. 414
Using CFS over NFSp. 416
Vulnerabilities of CFSp. 416
Overview of TCFSp. 416
Obtaining and Installing TCFSp. 417
The TCFS Client Sidep. 417
The TCFS Server Sidep. 424
Using TCFSp. 425
Configuring TCFS for Use with PAMp. 425
TCFS Administrative Tasksp. 426
Extended Attributes for TCFSp. 427
Setting up the Encrypted Directoryp. 428
TCFS Groupsp. 429
TCFS Key Managementp. 429
Vulnerabilities of TCFSp. 430
CFS and TCFS Comparisonp. 431
Securely Deleting Filesp. 431
Alternatives to CFS and TCFSp. 432
Chapter 16 Packet Filtering with ipchainsp. 435
Packet Filteringp. 436
Configuring the Kernel for ipchainsp. 437
ipchains Overviewp. 437
Behavior of a Chainp. 438
Malformed Packetsp. 438
Analysis of an Inbound Packetp. 438
Analysis of an Outbound Packetp. 440
The Loopback Interfacep. 440
Custom Chainsp. 440
Introduction to Using ipchainsp. 440
The ipchains Commandp. 441
Some Simple Examplesp. 446
Packet Fragmentsp. 457
IP Masqueradingp. 458
Adding Custom Chainsp. 461
ICMP Rules in a Custom Chainp. 461
Antispoofing Rulesp. 463
Rule Ordering Is Important!p. 464
Saving and Restoring Rulesp. 465
Rule Writing and Logging Tipsp. 466
Changing Rulesp. 467
ipchains Start-up Scriptsp. 467
Building Your Firewallp. 469
Simple Internal Networkp. 469
Simple Internal Network Using DHCPp. 481
ipchains Isn't Just for Firewalls!p. 484
One More Thingp. 484
Supplementary Utilitiesp. 484
Other Examplesp. 484
Port Forwardingp. 485
The fwconfig GUIp. 485
Masonp. 485
The Network Mapper (nmap)p. 486
Additional Firewall Softwarep. 486
Virtual Private Networks and Encrypted Tunnelsp. 486
The Next Generationp. 486
Chapter 17 Log File Managementp. 491
General Log File Managementp. 491
logrotatep. 492
Obtaining and Installing logrotatep. 492
Configuring logrotatep. 492
Pulling It All Togetherp. 498
swatchp. 498
Obtaining swatchp. 499
Installing swatchp. 500
Configuring and Running swatchp. 503
logcheckp. 507
Obtaining logcheckp. 507
Major Components of logcheckp. 508
Configuring and Installing logcheckp. 508
logcheck Outputp. 513
Troubleshooting logcheckp. 514
Chapter 18 Implementing and Managing Securityp. 515
So, Where Do I Start?p. 516
Hardening Linuxp. 516
Selecting the Right Toolsp. 523
Reducing the Workloadp. 523
What if My Systems Are Already in the Production Environment?p. 524
The Internal Networkp. 524
Critical Internal Serversp. 524
Internal Maintenancep. 525
Firewalls and the DMZp. 525
External Maintenancep. 526
Break-in Recoveryp. 526
Adding New Softwarep. 526
Only through Knowledgep. 527
Appendix A Keeping Up to Datep. 529
Appendix B Tools Not Coveredp. 543
Glossaryp. 547
Indexp. 555