Annotation of doc/security.txt, revision 1.1

1.1     ! albertel    1: at some point must update redhat kernel to prevent
        !             2: remote users from crashing machine!
        !             3: something convenient for exam-anxious students
        !             4: 
        !             5: /usr/share/config/kcmlocalerc saved as /usr/share/config/kcmlocalerc.rpmsave 
        !             6: /etc/X11/xdm/Xsetup_0 saved as /etc/X11/xdm/Xsetup_0.rpmsave
        !             7: up to date patches
        !             8: 
        !             9: 
        !            10: 
        !            11: /etc/hosts.allow
        !            12: /etc/hosts.deny
        !            13: 
        !            14: nmap
        !            15: iptraf
        !            16: tcpdump
        !            17: ntop
        !            18: 
        !            19: http://ncb.intnet.mu/security/news03.htm
        !            20: 
        !            21: * tripwire like md5sum on any subdirectory recursively
        !            22:   without following softlinks
        !            23: 
        !            24: logs
        !            25: /var/lib/rpm/
        !            26: 
        !            27: 
        !            28: World-writable files, particularly system files, can be a security
        !            29:      hole if a cracker gains access to your system and modifies them.
        !            30:      Additionally, world-writable directories are dangerous, since they
        !            31:      allow a cracker to add or delete files as he wishes.  To locate all
        !            32:      world-writable files on your system, use the following command:
        !            33: 
        !            34: 
        !            35: 
        !            36:                        root# find / -perm -2 ! -type l -ls
        !            37: 
        !            38: 
        !            39: 
        !            40: 
        !            41: 9.3.  Backup Your RPM or Debian File Database
        !            42: 
        !            43:   In the event of an intrusion, you can use your RPM database like you
        !            44:   would use tripwire, but only if you can be sure it too hasn't been
        !            45:   modified.  You should copy the RPM database to a floppy, and keep this
        !            46:   copy off-line at all times. The Debian distribution likely has
        !            47:   something similar.
        !            48: 
        !            49:   The files /var/lib/rpm/fileindex.rpm and /var/lib/rpm/packages.rpm
        !            50:   most likely won't fit on a single floppy.  But if Compressed, each
        !            51:   should fit on a seperate floppy.
        !            52: 
        !            53:   Now, when your system is compromised, you can use the command:
        !            54: 
        !            55: 
        !            56: 
        !            57:                                root#  rpm -Va
        !            58: 
        !            59: 
        !            60: 
        !            61: 
        !            62:   to verify each file on the system.  See the rpm man page, as there are
        !            63:   a few other options that can be included to make it less verbose.
        !            64:   Keep in mind you must also be sure your RPM binary has not been com­
        !            65:   promised.
        !            66: 
        !            67:   This means that every time a new RPM is added to the system, the RPM
        !            68:   database will need to be rearchived.  You will have to decide the
        !            69:   advantages versus drawbacks.
        !            70: 
        !            71: 
        !            72: 
        !            73: 
        !            74: Internal integrity system
        !            75: 
        !            76: duplicate static logs
        !            77: like packages.rpm etc that should never change
        !            78: 
        !            79: 
        !            80: 
        !            81: what to do in case of a security breach
        !            82: send e-mail to korte@lite.msu.edu for now
        !            83: maybe help@lite.msu.edu?
        !            84: 
        !            85: display warning message to all instructors
        !            86: with limited information about nature
        !            87: of security breach
        !            88: 

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>