Annotation of doc/security.txt, revision 1.1.1.1

1.1       albertel    1: at some point must update redhat kernel to prevent
                      2: remote users from crashing machine!
                      3: something convenient for exam-anxious students
                      4: 
                      5: /usr/share/config/kcmlocalerc saved as /usr/share/config/kcmlocalerc.rpmsave 
                      6: /etc/X11/xdm/Xsetup_0 saved as /etc/X11/xdm/Xsetup_0.rpmsave
                      7: up to date patches
                      8: 
                      9: 
                     10: 
                     11: /etc/hosts.allow
                     12: /etc/hosts.deny
                     13: 
                     14: nmap
                     15: iptraf
                     16: tcpdump
                     17: ntop
                     18: 
                     19: http://ncb.intnet.mu/security/news03.htm
                     20: 
                     21: * tripwire like md5sum on any subdirectory recursively
                     22:   without following softlinks
                     23: 
                     24: logs
                     25: /var/lib/rpm/
                     26: 
                     27: 
                     28: World-writable files, particularly system files, can be a security
                     29:      hole if a cracker gains access to your system and modifies them.
                     30:      Additionally, world-writable directories are dangerous, since they
                     31:      allow a cracker to add or delete files as he wishes.  To locate all
                     32:      world-writable files on your system, use the following command:
                     33: 
                     34: 
                     35: 
                     36:                        root# find / -perm -2 ! -type l -ls
                     37: 
                     38: 
                     39: 
                     40: 
                     41: 9.3.  Backup Your RPM or Debian File Database
                     42: 
                     43:   In the event of an intrusion, you can use your RPM database like you
                     44:   would use tripwire, but only if you can be sure it too hasn't been
                     45:   modified.  You should copy the RPM database to a floppy, and keep this
                     46:   copy off-line at all times. The Debian distribution likely has
                     47:   something similar.
                     48: 
                     49:   The files /var/lib/rpm/fileindex.rpm and /var/lib/rpm/packages.rpm
                     50:   most likely won't fit on a single floppy.  But if Compressed, each
                     51:   should fit on a seperate floppy.
                     52: 
                     53:   Now, when your system is compromised, you can use the command:
                     54: 
                     55: 
                     56: 
                     57:                                root#  rpm -Va
                     58: 
                     59: 
                     60: 
                     61: 
                     62:   to verify each file on the system.  See the rpm man page, as there are
                     63:   a few other options that can be included to make it less verbose.
                     64:   Keep in mind you must also be sure your RPM binary has not been com­
                     65:   promised.
                     66: 
                     67:   This means that every time a new RPM is added to the system, the RPM
                     68:   database will need to be rearchived.  You will have to decide the
                     69:   advantages versus drawbacks.
                     70: 
                     71: 
                     72: 
                     73: 
                     74: Internal integrity system
                     75: 
                     76: duplicate static logs
                     77: like packages.rpm etc that should never change
                     78: 
                     79: 
                     80: 
                     81: what to do in case of a security breach
                     82: send e-mail to korte@lite.msu.edu for now
                     83: maybe help@lite.msu.edu?
                     84: 
                     85: display warning message to all instructors
                     86: with limited information about nature
                     87: of security breach
                     88: 

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>