public inbox for gentoo-dev@lists.gentoo.org
 help / color / mirror / Atom feed
* [gentoo-dev] Security guidelines for Gentoo
@ 2002-03-14  9:11 kn
  2002-03-14  9:29 ` Einar Karttunen
                   ` (3 more replies)
  0 siblings, 4 replies; 19+ messages in thread
From: kn @ 2002-03-14  9:11 UTC (permalink / raw
  To: gentoo-dev; +Cc: gentoo-user

Hello everyone,

I wrote to Drobbins yesterday to ask if someone already has written security
guideline documentation for Gentoo. He had not heard of any projects in that
direction. So I have startet one :) ..

These are the chapters I want to write :

------------------

Step by step guide for Gentoo

Introduction
  Credits

Considerations before installation
  BIOS password
  Services
  Partition scheme
  Root password
  Policies
    Why is policies needed
    Security policy
    Acceptable use policy
    Email policy
    Password policy

Tightening the security after/during installation
  /etc/make.conf
  Grub/Lilo password
  Console restriction
  More logging
    syslogd
    metalog
    syslogd-n
  Mounting of partitions
    -noexec
    -nosuid
    -ro
  User/group limitations
    /etc/security/limits.conf
    /etc/limits
    Quotas
    /etc/login.defs
    /etc/login.access
  File permissions
    World readable
    World writeable
    SUID files
  PAM
  TCP Wrappers

Kernel security
  /proc
  Kernel patches
    Grsecurity
    Kerneli
    Links for more kernel patches
      OpenWall
      LIDS
      More ...

Securing Services
  Using xinetd
  ssh
  X
  Lpd
  FTP
    Pureftpd
    Proftpd
    virtual users
  Apache
    SSL
    PHP
  Mail
    Qmail
      Fighting Spam
      virtual users
  Bind
  Samba
    virtual users
  Chroot

Firewall (Iptables)

Intrusion detection
  Aide
  Snort

Backup
  Full system backup using Systemimager
  Partial backup using tar
  Backing up postgres

Pen-testing
  Remote audits
  Network audits

After a compromise
  How to report an incident
  Forensics analysis
    Creating an image of the system without destroying evidence (Using dd)
    Trap and trace (Using tcpdump)
    .. More to come ..
  Restoring system

FAQ

--------------


If I'm missing some vital aspect/information or someone already has startet
writing, I would sure like to know .. Otherwise I will start writing :)

Best regards
Kim





^ permalink raw reply	[flat|nested] 19+ messages in thread

* Re: [gentoo-dev] Security guidelines for Gentoo
  2002-03-14  9:11 [gentoo-dev] Security guidelines for Gentoo kn
@ 2002-03-14  9:29 ` Einar Karttunen
  2002-03-14  9:46   ` kn
                     ` (3 more replies)
  2002-03-14  9:41 ` Stefan Boresch
                   ` (2 subsequent siblings)
  3 siblings, 4 replies; 19+ messages in thread
From: Einar Karttunen @ 2002-03-14  9:29 UTC (permalink / raw
  To: gentoo-dev

On 14.03.02 10:11 +0100(+0000), kn@insecurity.dk wrote:
> Considerations before installation
>   BIOS password
If the machine is a server set the bios password only to guard
against modifying the settings i.e. it should not be asked on
startup because of remote reboots. Also make sure the machine
will not boot from floppy/cd/network.

>     Password policy
Gentoo could have a stricter pam config on this
because currently very weak passwords get through.

> Tightening the security after/during installation
>   /etc/make.conf
To this I would like to add signed ebuilds.

>   Grub/Lilo password
Against modifications yes, but not hindering the boot.

>   More Logging
Add log rotation to this

>     -noexec
Noexec is no real solution on linux.

>   PAM
Should be IMHO tighter by default.

> Kernel security
>   /proc
Some form restricting proc i.e. all
users but those belonging to one group
cannot see *anything* they don't need. 

>   Kernel patches
>     Grsecurity
Currently fails against the gentoo kernel
(see some posts this week about it on the 
gentoo-dev list)

>   Using xinetd
Or using no inetd at all. Many servers/home machines 
which run only http, ssh and mail do not imho need
inetd at all. 

>   X
Make sure the default installation does not listen to tcp.

>   Lpd
For home users pdq is more easy.

>   FTP
oftpd

>   Mail
On desktop machines the mail daemon should not accept connections
from outside.

>   Chroot
I have an jail ebuild if someone is interested.

- Einar Karttunen


^ permalink raw reply	[flat|nested] 19+ messages in thread

* Re: [gentoo-dev] Security guidelines for Gentoo
  2002-03-14  9:11 [gentoo-dev] Security guidelines for Gentoo kn
  2002-03-14  9:29 ` Einar Karttunen
@ 2002-03-14  9:41 ` Stefan Boresch
  2002-03-14  9:43   ` kn
  2002-03-14 11:11 ` Joachim Blaabjerg
  2002-03-14 21:01 ` Chuck Haines
  3 siblings, 1 reply; 19+ messages in thread
From: Stefan Boresch @ 2002-03-14  9:41 UTC (permalink / raw
  To: gentoo-dev

On Thu, Mar 14, 2002 at 10:11:43AM +0100, kn@insecurity.dk wrote:

> I wrote to Drobbins yesterday to ask if someone already has written security
> guideline documentation for Gentoo. He had not heard of any projects in that
> direction. So I have startet one :) ..

Many cheers to you!

[snip]

> Securing Services

[snip]

>   Mail
>     Qmail
>       Fighting Spam
>       virtual users

Since the default mailer in gentoo is now postfix, I think equivalent
sections for postfix would be required as well (Please let's not
start any discussion about the relative merits of qmail vs. postfix)

Best regards,

Stefan



^ permalink raw reply	[flat|nested] 19+ messages in thread

* Re: [gentoo-dev] Security guidelines for Gentoo
  2002-03-14  9:41 ` Stefan Boresch
@ 2002-03-14  9:43   ` kn
  0 siblings, 0 replies; 19+ messages in thread
From: kn @ 2002-03-14  9:43 UTC (permalink / raw
  To: gentoo-dev

> On Thu, Mar 14, 2002 at 10:11:43AM +0100, kn@insecurity.dk wrote:
>
>>   Mail
>>     Qmail
>>       Fighting Spam
>>       virtual users
>
> Since the default mailer in gentoo is now postfix, I think equivalent
> sections for postfix would be required as well (Please let's not
> start any discussion about the relative merits of qmail vs. postfix)

Great :) .. I'll put that on my list .. and start writing ..

/Kim





^ permalink raw reply	[flat|nested] 19+ messages in thread

* Re: [gentoo-dev] Security guidelines for Gentoo
  2002-03-14  9:29 ` Einar Karttunen
@ 2002-03-14  9:46   ` kn
  2002-03-14  9:58     ` Einar Karttunen
  2002-03-14 10:10   ` Martin Schlemmer
                     ` (2 subsequent siblings)
  3 siblings, 1 reply; 19+ messages in thread
From: kn @ 2002-03-14  9:46 UTC (permalink / raw
  To: gentoo-dev

> On 14.03.02 10:11 +0100(+0000), kn@insecurity.dk wrote:
[SNIP]

I'm not talking about the default installation .. I think it great .. I just
wanted to document how to make it more secure .. per default Gentoo is mutch
more secure than other linux distributions because if you have any ports
listning its because you installed it ..

/Kim




^ permalink raw reply	[flat|nested] 19+ messages in thread

* Re: [gentoo-dev] Security guidelines for Gentoo
  2002-03-14  9:46   ` kn
@ 2002-03-14  9:58     ` Einar Karttunen
  2002-03-14 10:01       ` kn
  0 siblings, 1 reply; 19+ messages in thread
From: Einar Karttunen @ 2002-03-14  9:58 UTC (permalink / raw
  To: gentoo-dev

On 14.03.02 10:46 +0100(+0000), kn@insecurity.dk wrote:
> > On 14.03.02 10:11 +0100(+0000), kn@insecurity.dk wrote:
> [SNIP]
> 
> I'm not talking about the default installation .. I think it great .. I just
> wanted to document how to make it more secure .. per default Gentoo is mutch
> more secure than other linux distributions because if you have any ports
> listning its because you installed it ..
> 

Yes, that's true. First I think it is a great idea to write a securing gentoo
manual. However most users start with a default installation so any potential
security considerations with it could be added to the manual. Are you trying
to make the manual gentoo specific or include more general things as well? 

- Einar Karttunen


^ permalink raw reply	[flat|nested] 19+ messages in thread

* Re: [gentoo-dev] Security guidelines for Gentoo
  2002-03-14  9:58     ` Einar Karttunen
@ 2002-03-14 10:01       ` kn
  2002-03-14 21:15         ` Andreas Waschbuesch
  0 siblings, 1 reply; 19+ messages in thread
From: kn @ 2002-03-14 10:01 UTC (permalink / raw
  To: gentoo-dev

> Yes, that's true. First I think it is a great idea to write a securing
> gentoo manual. However most users start with a default installation so
> any potential security considerations with it could be added to the
> manual. Are you trying to make the manual gentoo specific or include
> more general things as well?
>
Well .. A little bit of both .. its going to be gentoo specific but it will
also include chapters like security polices, backup and intrusion detection
since I think new linux users should be aware of this .. I know that Gentoo
is proberly not used by new linux users (But they should since they can
learn a lot) but still think it should be there .. not mutch but proberly
some links and information why it's needed

Best regards
Kim




^ permalink raw reply	[flat|nested] 19+ messages in thread

* Re: [gentoo-dev] Security guidelines for Gentoo
  2002-03-14  9:29 ` Einar Karttunen
  2002-03-14  9:46   ` kn
@ 2002-03-14 10:10   ` Martin Schlemmer
  2002-03-14 11:09   ` Joachim Blaabjerg
  2002-03-14 12:34   ` Morten Liebach
  3 siblings, 0 replies; 19+ messages in thread
From: Martin Schlemmer @ 2002-03-14 10:10 UTC (permalink / raw
  To: gentoo-dev

On Thu, 2002-03-14 at 11:29, Einar Karttunen wrote:
> On 14.03.02 10:11 +0100(+0000), kn@insecurity.dk wrote:
> > Considerations before installation
> >   BIOS password
> If the machine is a server set the bios password only to guard
> against modifying the settings i.e. it should not be asked on
> startup because of remote reboots. Also make sure the machine
> will not boot from floppy/cd/network.
> 
> >     Password policy
> Gentoo could have a stricter pam config on this
> because currently very weak passwords get through.
> 

Hi, this is in the works with masked pam-0.75-r4 and shadow-4.0.2.
It uses pam_stack.so and libcrack to check for weak passwords.

If you want to help test these, just merge them, update the stuff
in /etc/pam.d and give it a reboot (for libcrack to kick in) and
let me know.

> > Tightening the security after/during installation
> >   /etc/make.conf
> To this I would like to add signed ebuilds.
> 
> >   Grub/Lilo password
> Against modifications yes, but not hindering the boot.
> 
> >   More Logging
> Add log rotation to this
> 
> >     -noexec
> Noexec is no real solution on linux.
> 
> >   PAM
> Should be IMHO tighter by default.
> 
> > Kernel security
> >   /proc
> Some form restricting proc i.e. all
> users but those belonging to one group
> cannot see *anything* they don't need. 
> 
> >   Kernel patches
> >     Grsecurity
> Currently fails against the gentoo kernel
> (see some posts this week about it on the 
> gentoo-dev list)
> 
> >   Using xinetd
> Or using no inetd at all. Many servers/home machines 
> which run only http, ssh and mail do not imho need
> inetd at all. 
> 
> >   X
> Make sure the default installation does not listen to tcp.
> 
> >   Lpd
> For home users pdq is more easy.
> 
> >   FTP
> oftpd
> 
> >   Mail
> On desktop machines the mail daemon should not accept connections
> from outside.
> 
> >   Chroot
> I have an jail ebuild if someone is interested.
> 
> - Einar Karttunen
> _______________________________________________
> gentoo-dev mailing list
> gentoo-dev@gentoo.org
> http://lists.gentoo.org/mailman/listinfo/gentoo-dev
-- 
Martin Schlemmer
Gentoo Linux Developer, Desktop Team
Cape Town, South Africa



^ permalink raw reply	[flat|nested] 19+ messages in thread

* Re: [gentoo-dev] Security guidelines for Gentoo
  2002-03-14  9:29 ` Einar Karttunen
  2002-03-14  9:46   ` kn
  2002-03-14 10:10   ` Martin Schlemmer
@ 2002-03-14 11:09   ` Joachim Blaabjerg
  2002-03-14 11:17     ` Einar Karttunen
  2002-03-14 12:34   ` Morten Liebach
  3 siblings, 1 reply; 19+ messages in thread
From: Joachim Blaabjerg @ 2002-03-14 11:09 UTC (permalink / raw
  To: gentoo-dev

On Thu, 2002-03-14 at 10:29, Einar Karttunen wrote:
> On 14.03.02 10:11 +0100(+0000), kn@insecurity.dk wrote:
> > Considerations before installation
> >   BIOS password
> If the machine is a server set the bios password only to guard
> against modifying the settings i.e. it should not be asked on
> startup because of remote reboots. Also make sure the machine
> will not boot from floppy/cd/network.
> 
> >     Password policy
> Gentoo could have a stricter pam config on this
> because currently very weak passwords get through.

I think pam_passwdqc (http://www.openwall.com/passwdqc/) is the best
option for this job. I could make an ebuild (if there isn't one
already).

> >   Kernel patches
> >     Grsecurity
> Currently fails against the gentoo kernel
> (see some posts this week about it on the 
> gentoo-dev list)

It doesn't apply cleanly, but it's no problem to fix it by hand. 

> >   Using xinetd
> Or using no inetd at all. Many servers/home machines 
> which run only http, ssh and mail do not imho need
> inetd at all.
> 
> >   FTP
> oftpd

I personally prefer vsftpd. _Very_ fast, written with security and
performance as top priorities.

-- 
Joachim Blaabjerg
styx@SuxOS.org
www.SuxOS.org



^ permalink raw reply	[flat|nested] 19+ messages in thread

* Re: [gentoo-dev] Security guidelines for Gentoo
  2002-03-14  9:11 [gentoo-dev] Security guidelines for Gentoo kn
  2002-03-14  9:29 ` Einar Karttunen
  2002-03-14  9:41 ` Stefan Boresch
@ 2002-03-14 11:11 ` Joachim Blaabjerg
  2002-03-14 21:01 ` Chuck Haines
  3 siblings, 0 replies; 19+ messages in thread
From: Joachim Blaabjerg @ 2002-03-14 11:11 UTC (permalink / raw
  To: gentoo-dev

On Thu, 2002-03-14 at 10:11, kn@insecurity.dk wrote:
> Hello everyone,
> 
> I wrote to Drobbins yesterday to ask if someone already has written security
> guideline documentation for Gentoo. He had not heard of any projects in that
> direction. So I have startet one :) ..

Hi,

Great initiative! Maybe we could work together a bit on this (I'm the
guy who's supposed to get started on Secure Gentoo ;]). Feel free to
contact me (on- or off-list).

-- 
Joachim Blaabjerg
styx@SuxOS.org
www.SuxOS.org



^ permalink raw reply	[flat|nested] 19+ messages in thread

* Re: [gentoo-dev] Security guidelines for Gentoo
  2002-03-14 11:09   ` Joachim Blaabjerg
@ 2002-03-14 11:17     ` Einar Karttunen
  2002-03-14 12:32       ` Joachim Blaabjerg
  0 siblings, 1 reply; 19+ messages in thread
From: Einar Karttunen @ 2002-03-14 11:17 UTC (permalink / raw
  To: gentoo-dev

On 14.03.02 12:09 +0100(+0000), Joachim Blaabjerg wrote:
> > >     Grsecurity
> > Currently fails against the gentoo kernel
> > (see some posts this week about it on the 
> > gentoo-dev list)
> 
> It doesn't apply cleanly, but it's no problem to fix it by hand. 

Could you send the patch somewhere, this would be great for those
of us with little kernel knowledge. What about grsecurity vs. posix
acls?

- Einar Karttunen


^ permalink raw reply	[flat|nested] 19+ messages in thread

* Re: [gentoo-dev] Security guidelines for Gentoo
  2002-03-14 11:17     ` Einar Karttunen
@ 2002-03-14 12:32       ` Joachim Blaabjerg
  0 siblings, 0 replies; 19+ messages in thread
From: Joachim Blaabjerg @ 2002-03-14 12:32 UTC (permalink / raw
  To: gentoo-dev

On Thu, 2002-03-14 at 12:17, Einar Karttunen wrote:
> On 14.03.02 12:09 +0100(+0000), Joachim Blaabjerg wrote:
> > > >     Grsecurity
> > > Currently fails against the gentoo kernel
> > > (see some posts this week about it on the 
> > > gentoo-dev list)
> > 
> > It doesn't apply cleanly, but it's no problem to fix it by hand. 
> 
> Could you send the patch somewhere, this would be great for those
> of us with little kernel knowledge. What about grsecurity vs. posix
> acls?

I'll make a patch right away, haven't thought much about the POSIX ACLs,
but I *think* we'll be fine.

-- 
Joachim Blaabjerg
styx@SuxOS.org
www.SuxOS.org



^ permalink raw reply	[flat|nested] 19+ messages in thread

* Re: [gentoo-dev] Security guidelines for Gentoo
  2002-03-14  9:29 ` Einar Karttunen
                     ` (2 preceding siblings ...)
  2002-03-14 11:09   ` Joachim Blaabjerg
@ 2002-03-14 12:34   ` Morten Liebach
  2002-03-14 12:44     ` Einar Karttunen
  3 siblings, 1 reply; 19+ messages in thread
From: Morten Liebach @ 2002-03-14 12:34 UTC (permalink / raw
  To: gentoo-dev

On 2002-03-14 11:29:14 +0200, Einar Karttunen wrote:
> On 14.03.02 10:11 +0100(+0000), kn@insecurity.dk wrote:
> >   Chroot
> I have an jail ebuild if someone is interested.

As in FreeBSD jail(8)? Sounds very very interesting.

Have a nice day
                                 Morten

-- 
Morten Liebach <m@kallisti.dk>, webpages at http://kallisti.dk/
PGP-key: http://kallisti.dk/ml.asc or Key-ID 0xD796A4EB on keyserver.net


^ permalink raw reply	[flat|nested] 19+ messages in thread

* Re: [gentoo-dev] Security guidelines for Gentoo
  2002-03-14 12:34   ` Morten Liebach
@ 2002-03-14 12:44     ` Einar Karttunen
  0 siblings, 0 replies; 19+ messages in thread
From: Einar Karttunen @ 2002-03-14 12:44 UTC (permalink / raw
  To: gentoo-dev

On 14.03.02 13:34 +0100(+0000), Morten Liebach wrote:
> On 2002-03-14 11:29:14 +0200, Einar Karttunen wrote:
> > On 14.03.02 10:11 +0100(+0000), kn@insecurity.dk wrote:
> > >   Chroot
> > I have an jail ebuild if someone is interested.
> 
> As in FreeBSD jail(8)? Sounds very very interesting.
> 

No, as in jail chroot project, see 
http://www.gsyc.inf.uc3m.es/~assman/jail/

The biggest problem is proc, which some apps
need but leaks too much info even with grsecurity.
Now if only it would be possible to have
two different proc filesystems mounted:
one normal, and one with only the data necessary to
run apps.

- Einar Karttunen


^ permalink raw reply	[flat|nested] 19+ messages in thread

* Re: [gentoo-dev] Security guidelines for Gentoo
  2002-03-14  9:11 [gentoo-dev] Security guidelines for Gentoo kn
                   ` (2 preceding siblings ...)
  2002-03-14 11:11 ` Joachim Blaabjerg
@ 2002-03-14 21:01 ` Chuck Haines
  3 siblings, 0 replies; 19+ messages in thread
From: Chuck Haines @ 2002-03-14 21:01 UTC (permalink / raw
  To: gentoo-dev

[-- Attachment #1: Type: text/plain, Size: 2902 bytes --]

I would be very interested in this manual.   Keep us posted on its
progress.

On Thu, 2002-03-14 at 04:11, kn@insecurity.dk wrote:
> Hello everyone,
> 
> I wrote to Drobbins yesterday to ask if someone already has written security
> guideline documentation for Gentoo. He had not heard of any projects in that
> direction. So I have startet one :) ..
> 
> These are the chapters I want to write :
> 
> ------------------
> 
> Step by step guide for Gentoo
> 
> Introduction
>   Credits
> 
> Considerations before installation
>   BIOS password
>   Services
>   Partition scheme
>   Root password
>   Policies
>     Why is policies needed
>     Security policy
>     Acceptable use policy
>     Email policy
>     Password policy
> 
> Tightening the security after/during installation
>   /etc/make.conf
>   Grub/Lilo password
>   Console restriction
>   More logging
>     syslogd
>     metalog
>     syslogd-n
>   Mounting of partitions
>     -noexec
>     -nosuid
>     -ro
>   User/group limitations
>     /etc/security/limits.conf
>     /etc/limits
>     Quotas
>     /etc/login.defs
>     /etc/login.access
>   File permissions
>     World readable
>     World writeable
>     SUID files
>   PAM
>   TCP Wrappers
> 
> Kernel security
>   /proc
>   Kernel patches
>     Grsecurity
>     Kerneli
>     Links for more kernel patches
>       OpenWall
>       LIDS
>       More ...
> 
> Securing Services
>   Using xinetd
>   ssh
>   X
>   Lpd
>   FTP
>     Pureftpd
>     Proftpd
>     virtual users
>   Apache
>     SSL
>     PHP
>   Mail
>     Qmail
>       Fighting Spam
>       virtual users
>   Bind
>   Samba
>     virtual users
>   Chroot
> 
> Firewall (Iptables)
> 
> Intrusion detection
>   Aide
>   Snort
> 
> Backup
>   Full system backup using Systemimager
>   Partial backup using tar
>   Backing up postgres
> 
> Pen-testing
>   Remote audits
>   Network audits
> 
> After a compromise
>   How to report an incident
>   Forensics analysis
>     Creating an image of the system without destroying evidence (Using dd)
>     Trap and trace (Using tcpdump)
>     .. More to come ..
>   Restoring system
> 
> FAQ
> 
> --------------
> 
> 
> If I'm missing some vital aspect/information or someone already has startet
> writing, I would sure like to know .. Otherwise I will start writing :)
> 
> Best regards
> Kim
> 
> 
> 
> _______________________________________________
> gentoo-dev mailing list
> gentoo-dev@gentoo.org
> http://lists.gentoo.org/mailman/listinfo/gentoo-dev
-- 
---------------------------------------------
| Chuck Haines        | AIM: CyberGrex      |
| GDC Webmaster       | ICQ: 3707881        |
| WPI Class of 2005   | MSN: CyberGrex      |
| chaines@wpi.edu     | Yahoo: CyberGrex_27 |
---------------------------------------------

[-- Attachment #2: This is a digitally signed message part --]
[-- Type: application/pgp-signature, Size: 232 bytes --]

^ permalink raw reply	[flat|nested] 19+ messages in thread

* Re: [gentoo-dev] Security guidelines for Gentoo
  2002-03-14 10:01       ` kn
@ 2002-03-14 21:15         ` Andreas Waschbuesch
  2002-03-14 21:53           ` Zach Forrest
  2002-03-15  6:32           ` kn
  0 siblings, 2 replies; 19+ messages in thread
From: Andreas Waschbuesch @ 2002-03-14 21:15 UTC (permalink / raw
  To: gentoo-dev

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

electrogramma tua profluit verbis:
>
> Well .. A little bit of both .. its going to be gentoo specific but it will
> also include chapters like security polices, backup and intrusion detection
> since I think new linux users should be aware of this .. I know that Gentoo
> is proberly not used by new linux users (But they should since they can
> learn a lot) but still think it should be there .. not mutch but proberly
> some links and information why it's needed

Would U mind including some hints on naming conventions? It's a very easy 
step to make footprinting a little harder ... ;-)

Andrew 

- -- 
Andreas Waschbuesch, GAUniversity KG MA FNZ FK01
eMail: awaschb@gwdg.de

In the long run we are all dead.
		-- John Maynard Keynes
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE8kRLd2s5UCjOaQbYRAsJUAJsFi3P4lLxRftBZI+35K6i70hd9pgCfbOLb
8xcNQZuPXV153waWWHktA8U=
=fmDZ
-----END PGP SIGNATURE-----


^ permalink raw reply	[flat|nested] 19+ messages in thread

* Re: [gentoo-dev] Security guidelines for Gentoo
  2002-03-14 21:15         ` Andreas Waschbuesch
@ 2002-03-14 21:53           ` Zach Forrest
  2002-03-15  6:31             ` kn
  2002-03-15  6:32           ` kn
  1 sibling, 1 reply; 19+ messages in thread
From: Zach Forrest @ 2002-03-14 21:53 UTC (permalink / raw
  To: gentoo-dev

One of the most comprehensive guides for securing linux can be found at 
the TrinityOS homepage found here: 
http://www.ecst.csuchico.edu/~dranch/LINUX/index-linux.html

It starts at the BIOS and works its way up. There is also a script to 
help you configure your system. At the *very* least this is a great 
starting point.

Zach (see below for some details)

 From the website --->

Here is TrinityOS's current feature set..

----------------------------------------------------------------------

TrinityOS is a step by step, example driven, HOWTO on building a very 
functional Linux box with strong security in mind.


Current
Features:
=========

Master References and Recommended Guidelines
--------------------------------------------
     + An extensive URL library and current version list for all
       installed and recommended Linux tools and applications
     + Example guidelines on documenting the hardware and partition
       layout of your specific hardware

Linux Distribution Thoughts:
----------------------------
     + Thoughts and recommendations on picking a Linux distribution
     + A common "Search & Replace" key to customize this doc to YOUR
       specific environment

Core OS setup:
--------------
     + Configuring, compiling, installing, and booting both a 2.2.x &
       2.0.x kernel
     + Lilo configuration and security
     + PCMCIA / CARDBUS PC-Card Services
     + Software RAID 0 (striping) hard drives
     + 7-CD SCSI CD-ROM changer system
     + Automated Patching via RPM notifiers
     + EXT2 file system tuning
     + IDE hard drive performance optimization
     + Dual printing system support for both UNIX and Windows/Samba hosts

Network Connectivity:
---------------------
     + Strong, comfigrable, and well commented IPCHAINS and IPFWADM
       packet firewall rule sets with a complete intro on how Packet and
       Stateful Inspected firewalls work
     + Automated rollback script for the loading of rc.firewall rule sets
       so that if you make an error in the firewall rule set and the rule
       set doesn't complete, a backup
       rule set will be automatically loaded to restore connectivity.
     + Full LAN masquerading (NAT or Network Address Translation) using
       private IP addressing
     + Masq IP port forwarding support (IPportfw)
     + Dual 10Mb/s Ethernet network card support setup and TCP/IP
       Performance optimization (modem and cable modem users)
     + How to setup fully authoritative primary and secondary DNS servers
       (Bind v8.x) in a CHROOTed and and SPLIT Zone configuration
     + Full Sendmail e-mail system support w/ domain masquerading &
       Anti-SPAM measures with support for more than one Internet domain
       on one EMAIL server
     + IMAP4 / POP3 remote email service
     + Masq IP port forwarding support (IPportfw)
     + DHCP server for other LAN machines (laptops, etc)
     + DHCP client setup for TCP/IP addresses
     + Samba : Full Microsoft Windows file & printing support
     + NFS: Full Sun RPC-based Network File System support
     + IPSEC (Swan) VPN [Almost Complete]
     + Apache WWW server
     + PPP connectivity for primary PPP connectivity AND backup PPP
       connections
     + Dial-on-Demand (Diald) Internet connections (modem users) -
       Automatic Internet connections every 15 minutes (modem users)
     + Direct dial-in terminal / PPP access via a modem
     + How to apply for a full Internet domain name via Network Solutions
     + Full documentation on how understand and FIGHT all that SPAM email
     + NTP time calibration
     + Full UNIX (SMB) printing

Security:
---------
     + Complete physical and OS-level security recommendations and
       guidelines
     + Full SSH telnet support [Future: X-windows encrypted tunnels]
     + Actively Updated Linux system security and patching (Shadow
       passwords, etc)
     + Advanced SYSLOG logging and nightly filtered reports emailed to
       the root user
     + TrinityOS "CRITICALITY" rating in the CHANGELOG section to gauge
       the level of urgency of security vulnerabilities, system
       mis-configurations, etc.
     + Tripwire Security Breech monitoring [not completed yet]
     + NMAP port scanning to test your packet firewall
     + Figuring out if you have been hacked.. Confirm it!
     + Prioritized ChangeLog to let users know what changes are and are
       NOT too important
     + Anonymized Sendmail Banners

System backup:
--------------
     + Minimum backups to floppy
     + Full tape backup via BRU with emergency restore diskette creation
     + Full APC SmartUPS power down support (APCUPSd) w/ paging support
     + Backing up the server to a CD-R [not completed yet]

More Extensive Guides:
----------------------
     + How to fix LILO, HD partitioning, and file system corruption
     + How to obtain an Internet domain(s)
     + How to successfully move Internet domains across DNS servers
       and/or TCP/IP addresses
     + How to recover from your box being hacked into and how to
       RE-secure it
     + How to understand and fight SPAM email
     + SSH encrypted tunnels for email, etc


Future
Features:
=========

(Won't be implemented in any particular order)

* TrinityOS TO-DOs:
-------------------
     + Add more "Configuration via GUI tools" sections

* Network stuff
---------------
     + Modularize the rc.firewall rulset so updates can be transparent
       and not require additional tailoring for each update.
     + Add a single interface IPCHAINS rc.firewall for eth0/1/2 and
       ppp0/1/2 users
     + Remove LPR and replace it with LPRng or CUPS
     + Mail Backup: Setup high cost MX records and ETRN email backup
     + IPv6: Configure and setup IPv6 and possibly setup a IPv6 tunnel
       via the 6Bone
     + Dial Backup: Add automatic analog modem dial backup when the
       ADSL/Cable modem goes down
     + CODA: Replace NFS support with CODA
     + Implement IMAP4 for a complete email subsystem
     + Add a CACHING only setup for 8.1.x DNS
     + Setup a email list server (MajorDomo, Petidomo, dunno yet)
     + Email sent dynamic IP address exception requests for access
       through the TCP Wrappers and the IPFWADM rule sets
     + DHCPc client setup for Cablemodems
     + 128-bit encrypted Apache SSL WWW server
     + Move over to xinetd for better DoS protection
     + WWW Proxy services
     + WWW banner add filtering

* Security Stuff
----------------
     + Replace the Sendlogs script to use either Swatch or LogSentry
     + Automate the firewall hits logging for trend analysis
     + Install PGP / GPG for secure and/or verified communications to:
       other users, Internic, binaries/source code verification, etc.
     + SATAN / SAINT / Nessus / COPS / ISS security testing

* Application stuff
-------------------
     + Implement Procmail to do local email filtering
     + Setup fetchmail to get remote email vs. setting up a
       remote .forward
     + Full SVGA X-Windows support w/ the WindowMaker window Manager
       (Xfree)

* Administration stuff
----------------------
     + Up the logging time on the UPS to 1 second increments and then
       plot all the stuff with GNU Plot to then be emailed via "Sendlogs"
     + Rotate the UPS logs
     + Implement automatic weekly incremental tape backups to the TR4
       tape drive.
     + BZip2 compression w/ tar patches

* System Stuff
--------------
     + Iomega parallel ZIP drive support

Andreas Waschbuesch wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> electrogramma tua profluit verbis:
> 
>>Well .. A little bit of both .. its going to be gentoo specific but it will
>>also include chapters like security polices, backup and intrusion detection
>>since I think new linux users should be aware of this .. I know that Gentoo
>>is proberly not used by new linux users (But they should since they can
>>learn a lot) but still think it should be there .. not mutch but proberly
>>some links and information why it's needed
> 
> 
> Would U mind including some hints on naming conventions? It's a very easy 
> step to make footprinting a little harder ... ;-)
> 
> Andrew 
> 
> - -- 
> Andreas Waschbuesch, GAUniversity KG MA FNZ FK01
> eMail: awaschb@gwdg.de
> 
> In the long run we are all dead.
> 		-- John Maynard Keynes
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.0.6 (GNU/Linux)
> Comment: For info see http://www.gnupg.org
> 
> iD8DBQE8kRLd2s5UCjOaQbYRAsJUAJsFi3P4lLxRftBZI+35K6i70hd9pgCfbOLb
> 8xcNQZuPXV153waWWHktA8U=
> =fmDZ
> -----END PGP SIGNATURE-----
> _______________________________________________
> gentoo-dev mailing list
> gentoo-dev@gentoo.org
> http://lists.gentoo.org/mailman/listinfo/gentoo-dev
> 




^ permalink raw reply	[flat|nested] 19+ messages in thread

* Re: [gentoo-dev] Security guidelines for Gentoo
  2002-03-14 21:53           ` Zach Forrest
@ 2002-03-15  6:31             ` kn
  0 siblings, 0 replies; 19+ messages in thread
From: kn @ 2002-03-15  6:31 UTC (permalink / raw
  To: gentoo-dev

> One of the most comprehensive guides for securing linux can be found at
>  the TrinityOS homepage found here:
> http://www.ecst.csuchico.edu/~dranch/LINUX/index-linux.html

[SNIP]

I will try to read it .. But my guide will not be about tuning linux .. that
should be in a different guide because security and performance do not
always agreed on settings

Best regards
Kim

ps. I have startet writing the guide and a preview can be found at:
http://www.insecurity.dk/gentoo/secure-guide/security-guidelines.html




^ permalink raw reply	[flat|nested] 19+ messages in thread

* Re: [gentoo-dev] Security guidelines for Gentoo
  2002-03-14 21:15         ` Andreas Waschbuesch
  2002-03-14 21:53           ` Zach Forrest
@ 2002-03-15  6:32           ` kn
  1 sibling, 0 replies; 19+ messages in thread
From: kn @ 2002-03-15  6:32 UTC (permalink / raw
  To: gentoo-dev

>
> Would U mind including some hints on naming conventions? It's a very
> easy  step to make footprinting a little harder ... ;-)
>
I'll do everything that I can to make this the best guide

/Kim




^ permalink raw reply	[flat|nested] 19+ messages in thread

end of thread, other threads:[~2002-03-15  6:41 UTC | newest]

Thread overview: 19+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2002-03-14  9:11 [gentoo-dev] Security guidelines for Gentoo kn
2002-03-14  9:29 ` Einar Karttunen
2002-03-14  9:46   ` kn
2002-03-14  9:58     ` Einar Karttunen
2002-03-14 10:01       ` kn
2002-03-14 21:15         ` Andreas Waschbuesch
2002-03-14 21:53           ` Zach Forrest
2002-03-15  6:31             ` kn
2002-03-15  6:32           ` kn
2002-03-14 10:10   ` Martin Schlemmer
2002-03-14 11:09   ` Joachim Blaabjerg
2002-03-14 11:17     ` Einar Karttunen
2002-03-14 12:32       ` Joachim Blaabjerg
2002-03-14 12:34   ` Morten Liebach
2002-03-14 12:44     ` Einar Karttunen
2002-03-14  9:41 ` Stefan Boresch
2002-03-14  9:43   ` kn
2002-03-14 11:11 ` Joachim Blaabjerg
2002-03-14 21:01 ` Chuck Haines

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox