[rescue] Re: Solaris security
Ido Dubrawsky
rescue at sunhelp.org
Sun Jul 29 22:10:07 CDT 2001
--nFreZHaLTZJo0R7j
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
On Sun, Jul 29, 2001 at 12:01:21PM -0500, rescue-request at sunhelp.org wrote:
> David Passmore <dpassmor at sneakers.org> wrote:
>=20
> > * If you run SSH, compile in TCP wrapper support and ACL it too. Contra=
ry to
> > the delusions of many sysadmins, SSH is not invulnerable.
>=20
> Unfortunately for me, one of the main reasons I run sshd is so that I can
> access my box from anywhere in the world. Therefore TCP wrappers aren't
> really an option. I realise it ain't invulnerable, but it is at least
> bullet-proof :-).
>=20
That is true...if you're trying to provide access from anywhere in the wo=
rld,
TCP wrappers in SSH just doesn't work. Since I want to access my system fr=
om
wherever I go, I use SSH but with only with RSA authentication. Access can
only be acheived by connecting to my network at home through my laptop. =20
Eliminates the brute-force password guessing problem quite nicely. The only
other thing that I do at home is have ingress and egress filters on my rout=
er
as well as run snort to monitor traffic to ports 22, 25, and 443.
>
> > * If possible, run your network services (web, etc) in a chroot'ed
> > environment, so if they are compromised, they cannot leverage it to get=
root
> > access on the box. If you have machines which must trust each other in =
some
> > way (say, to do an automated nightly scp of files) make /damn sure/ this
> > happens in a chroot'ed environment.
>=20
> chroot isn't invulnerable either of course - although every little bit
> helps.
>
There are some nice papers on breaking out of a chroot'ed jail...I'll have =
to
dig up the URLs and post them.
>=20
> > Don't rely on a firewall or filtering software. Well-meaning, authorized
> > users tend to punch nasty holes in them when they find them inconvenien=
t.
>=20
To deal with such users, you really need to use tight egress filtering...on=
ly
allow out what you want to let out.
>
> Even without such users, still don't rely on a firewall or packet filteri=
ng.
> Don't rely on any single technological measure.
>=20
Very true. If you're going to put a box out on the internet you should use
a firewall along with both a network intrusion detection system /AS WELL AS=
/ a
host-based intrusion detection system. I wrote some documentation when I=
=20
worked at a previous employer describing a Solaris box I built (SPARC 10)
running a minimized Solaris 7 with Apache/mod_ssl as well as the UCD SNMP
software. It was designed to run MRTG to monitor traffic in and out of the=
=20
data center they had in Virginia. If I can find the specs/docs I'll e-mail
them to Bill for posting if anyone's interested.
Ido
--=20
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D
|Ido Dubrawsky E-mail: idubraws at cisco=
.com
| | |Network Security Engineer
:|: :|: |Cisco Secure Consulting Services
:|||: :|||: |Cisco Systems, Inc.
=2E:|||||||:..:|||||||:. |Austin, TX. 78759
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D
--nFreZHaLTZJo0R7j
Content-Type: application/pgp-signature
Content-Disposition: inline
-----BEGIN PGP SIGNATURE-----
Version: PGP 6.5.8
iQA/AwUBO2TP+yvdAjj7YsWhEQIlLgCfSFOYWyVaz/X38+CQ1M8yfNbmCnAAoPof
m3i6Wm4P+8sIePT8EXRb6QVf
=UEZb
-----END PGP SIGNATURE-----
--nFreZHaLTZJo0R7j--
More information about the rescue
mailing list