Check List For Linux Security
Check List For Linux Security

Check List For Linux SecurityLinux Is An Amazing Operating System Considering How It Was Originally Created. It Was A Modest Program Written For One Person As A Hobby Linus Torvald Of Finland. It Has Grown Into A Full-fledge 32-bit Operating System. It Is Solid, Stable And Provides Support For An Incredible Number Of Applications. It Has Very Powerful Capabilities And Runs Very Fast And Rarely Crashes.Unfortunately Linux Machines Are Broken Almost Every Day. This Happens Not Because It Is An Insecure Operating System. It Contains All The Necessary Tools To Make It Very Secure. But The Truth Is. It Hasnt Become Significantly More Secure With The Increase In Popularity. On The Other Hand, Our Understanding Of The Hackers Methods And The Wide Variety Of Tools And Techniques Available Contributed To Help System Administrators To Secure Their Linux Computers.Our Goal In This Article Is To List The Most Critical Situations, And How To Prevent An Invasion With Simple Measures.1-Weak Passwords By Far The First And Most Used Method Used By Hackers To Try Penetrating A Linux System Is Cracking A Password, Preferently Of The User Root. Usually They Will Target A Common User First, And Then, Using Hisher Access To The Operating System, Try To Get A Privileged Access Cracking The Root Password. Good Password Policy, And Good Passwords Are Absolutely Critical To The Security On Any Computer. Some Common Mistakes When Selecting A Password:A- Use Password As Password.B- Use The Name Of The Computer.C- A Well-know Name From Science, Sports Or Politics.D- Reference To Movies.E- Anything That Is Part Of The User Web Site.F References Associated With The Account. The Latest Version Of Linux Offer Shadowed Passwords. If A Cracker Can See An Encrypted Password, Crack It Would A Simple Task. So, Instead Of Storing The Password In The Passwd File, They Are Now Stored In The Shadow File Which Is Readable Only For Root. Before A Hacker Can Crack A Password He Needs To Figure Out An Account Name. So, Simple Accounts Names Must Be Avoided As Well. Another Security Measure Is To Apply A No Login To The Account In The Passwd File. This Must Be Done To All The Accounts That Dont Need To Log In To The System. Examples Are: Apache, Mysql, Ftp And Other.Limit Which Terminals Root May Log In From. If The Root Account Is Allowed To Log In Only In Certain Terminals That Are Considered Secure, It Will Be Almost Impossible For A Hacker To Penetrate The System. This Can Be Done Listing The Allowed Terminals On Etcsecurity. The Login Program Will Consider Insecure Any Terminal That Is Not Listed On This File, Which Is Readable, Only By Root.2-Open Network PortsAny Linux Default Installation Will Provide The Operating System With Tons Of Software And Services. Several Of Them Are Not Necessary Or Even Wanted By The Administrator. Removing These Software And Services Will Close The Path To Several Attacks And Improve Security. The Sbinchkconfig Program Can Be Used To Stop Services From Automatically Starting At Run Levels 3, 4 And 5. Log In As Root And Type Sbinchkconfig --list To View All The Services Set To Start Automatically. Select The Ones You Dont Need And Type Sbinchkconfig 345 Nameofservice Off. You Must Do That To All Services You Dont Want To Keep Running. Also, The Xinetd Server Can Be Used To Disable Other Services As Well. 3-Old Software VersionsEveryday Vulnerabilities Are Found In Programs, And Most Of Them Are Fixed Constantly. It Is Important, And Sometimes Critical, To Keep Up With The Changes. There Are Mailing Lists For Every Linux Distribution Where One Can Have Security Related Informations, And The Latest Vulnerabilities Found. Some Place To Watch For Security Holes Are:http:www.redhat.commailmanlistinforedhat-announce-list Http:www.debian.orgMailingLists Http:www.mandrakesecure.netenmlist.php Http:www.suse.comusprivatesupportsecurityindex.html Http:www.freebsd.orgsecurityindex.htmlhttp:www.linuxtoday.com Http:www.lwn.net It Is Crucial To Insure That The Security Released Patches Are Applied To The Programs As Soon As They Area Available. The Hacker Community Will Be Aware Of The Discovered Holes And Will Try To Explore Them Before The Fixes Are Applied.4-Insecure And Badly Configured ProgramsThere Are Some Programs That Have A History Of Security Problems. To Name A Few IMAP, POP, FTP, Port Map And NFS, Are The Most Known. The Good Thing Is That Most Of These Programs Can Be Replaced By A Secure Version Like Spop, Sftp Or Scp. It Is Important That, Before Deploying Any Service, The Administrator Investigate Its Security History. Sometimes Simple Configuration Measures Can Prevent Serious Headaches In The Future.Some Advices Regarding A Web Server Configuration Are Well Worth To Mention:-Never Run The Web Server As A Privileged User;-Do Not Keep Clients Confidential Data On The Web Server Credit Card Numbers, Phone Numbers, Mailing Addresses, Must Be Recorded On A Different Machine.-Make Sure The Privileged Data That A User Supplies On A Form Does Not Show Up As A Default For The Next Person To Use The Form; - Establish Acceptable Values For Data That Is Supplied By Web Clients. - Check Vulnerabilities On CGI Programs.5-Stale And Unnecessary AccountsWhen A User No Longer Uses His Her Account, Make Sure It Is Removed From The System. This Stale Account Wont Have This Password Changed Periodically Leaving A Hole. Publicly Readable Or Writable Files Owned By That Account Must Be Removed. When You Remove An Unnecessary Service Make Sure You Remove Or Disable The Correspondent Account. Security Resources In The WebBugtraq Includes Detailed Discussions Of Unix Security Holeshttp:www.securityfocus.comFirewalls Discuss The Design, Construction, Operation, And Maintenance Of Firewall Systems.http:www.isc.orgservicespubliclistsfirewalls.htmlRISKS Discuss Risks To Society From Computershttp:www.risks.orgInsecure.orghttp:www.insecure.org