File:  [LON-CAPA] / doc / Attic / security.txt
Revision 1.1.1.1 (vendor branch): download - view: text, annotated - select for diffs
Tue Nov 16 17:36:55 1999 UTC (24 years, 5 months ago) by albertel
Branches: foo
CVS tags: version_0_4, stable_2002_spring, stable_2002_july, stable_2002_april, stable_2001_fall, bar, STABLE


at some point must update redhat kernel to prevent
remote users from crashing machine!
something convenient for exam-anxious students

/usr/share/config/kcmlocalerc saved as /usr/share/config/kcmlocalerc.rpmsave 
/etc/X11/xdm/Xsetup_0 saved as /etc/X11/xdm/Xsetup_0.rpmsave
up to date patches



/etc/hosts.allow
/etc/hosts.deny

nmap
iptraf
tcpdump
ntop

http://ncb.intnet.mu/security/news03.htm

* tripwire like md5sum on any subdirectory recursively
  without following softlinks

logs
/var/lib/rpm/


World-writable files, particularly system files, can be a security
     hole if a cracker gains access to your system and modifies them.
     Additionally, world-writable directories are dangerous, since they
     allow a cracker to add or delete files as he wishes.  To locate all
     world-writable files on your system, use the following command:



                       root# find / -perm -2 ! -type l -ls




9.3.  Backup Your RPM or Debian File Database

  In the event of an intrusion, you can use your RPM database like you
  would use tripwire, but only if you can be sure it too hasn't been
  modified.  You should copy the RPM database to a floppy, and keep this
  copy off-line at all times. The Debian distribution likely has
  something similar.

  The files /var/lib/rpm/fileindex.rpm and /var/lib/rpm/packages.rpm
  most likely won't fit on a single floppy.  But if Compressed, each
  should fit on a seperate floppy.

  Now, when your system is compromised, you can use the command:



                               root#  rpm -Va




  to verify each file on the system.  See the rpm man page, as there are
  a few other options that can be included to make it less verbose.
  Keep in mind you must also be sure your RPM binary has not been com­
  promised.

  This means that every time a new RPM is added to the system, the RPM
  database will need to be rearchived.  You will have to decide the
  advantages versus drawbacks.




Internal integrity system

duplicate static logs
like packages.rpm etc that should never change



what to do in case of a security breach
send e-mail to korte@lite.msu.edu for now
maybe help@lite.msu.edu?

display warning message to all instructors
with limited information about nature
of security breach


FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>