1 Linux Security. 2 Linux is not secure No computer system can ever be "completely secure". –make it increasingly difficult for someone to compromise.

Slides:



Advertisements
Similar presentations
Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)
Advertisements

CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
Linux Security An overview notes from Linux Network Security HowTO.
Securing Network using Linux. Lesson Outline Setting up a secure system TCP Wrapper configuration Firewalls in Linux Authentication Systems –NIS –Kerberos.
Linux+ Guide to Linux Certification, Second Edition Chapter 15 Configuring Network Services and Security.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Lesson 19: Configuring Windows Firewall
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Payment Card Industry (PCI) Data Security Standard
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
COEN 252: Computer Forensics Router Investigation.
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
Firewall and Proxy Server Director: Dr. Mort Anvari Name: Anan Chen Date: Summer 2000.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
Firewalls, Perimeter Protection, and VPNs - SANS © SSH Operation The Swiss Army Knife of encryption tools…
Ssh: secure shell. overview Purpose Protocol specifics Configuration Security considerations Other uses.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Copyright © 2002 ProsoftTraining. All rights reserved. Operating System Security.
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
Chapter 6: Packet Filtering
Chapter 10 Networking and the Internet ITSC 1458.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Linux Security Chapter 21 (section 1-7) By Yanjun Zuo.
Managing User Accounts. Module 2 – Creating and Managing Users ♦ Overview ► One should log into a Linux system with a valid user name and password granted.
Unix Operating Systems Module 7. Unix Operating System Versions Basic Information User and Group Settings File Permissions Local Firewall Local Security.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Linux Networking Security Sunil Manhapra & Ling Wang Project Report for CS691X July 15, 1998.
Linux Networking and Security
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
Chapter 3 & 6 Root Status and users File Ownership Every file has a owner and group –These give read,write, and execute priv’s to the owner, group, and.
Topics Network topology Virtual LAN Port scanners and utilities Packet sniffers Weak protocols Practical exercise.
Linux Security. Module 13 – Linux Security ♦ Overview Linux is more prone today to security loopholes and attacks, both inside and outside the network.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
1 Security. 2 Linux is not secure No computer system can ever be "completely secure". –make it increasingly difficult for someone to compromise your system.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Linux Services Configuration
XWN740 X-Windows Configuring and Using Remote Access (Chapter 13: Pages )‏
Module 10: Windows Firewall and Caching Fundamentals.
SCSC 455 Computer Security Chapter 3 User Security.
Linux Operations and Administration
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
CHAPTER 3 Router CLI Command Line Interface. Router User Interface User and privileged modes User mode --Typical tasks include those that check the router.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
Ssh: secure shell.
Working at a Small-to-Medium Business or ISP – Chapter 8
FIREWALL configuration in linux
Chapter 9 Router Configuration (Ospf, Rip) Webmin, usermin Team viewer
Chapter 21 (section 1-7) By Yanjun Zuo
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
XWN740 X-Windows Configuring and Using Remote Access
IS3440 Linux Security Unit 6 Using Layered Security for Access Control
Information Security Session October 24, 2005
Haifa Linux Club Orr Dunkelman
Firewalls Purpose of a Firewall Characteristic of a firewall
Lab 7 - Topics Establishing SSH Connection Install SSH Configure SSH
Linux Security.
Convergence IT Services Pvt. Ltd
Presentation transcript:

1 Linux Security

2 Linux is not secure No computer system can ever be "completely secure". –make it increasingly difficult for someone to compromise your system. The more secure your system, the more miserable you and your users will tend to be Security = 1/(1.072 * Convenience)

3 Linux Security What level of threat the system needs to be protected against? –Analyze the system Packet Filtering Turn off unnecessary services –Be aware of what is happening on your system –Keep track the vulnerabilities - Software patches Backups –Recover effectively from a security incident User accounts –Minimal amount of privilege they need –Remove inactive accounts –The use of the same user-ID on all computers and networks is desirable for the purpose of account maintenance –User account provides accountability

4 Linux Security Root Security –Only become root to do single specific tasks –Never use the rlogin/rsh/rexec suite of tools (called the r- utilities) as root –Always be slow and deliberate running as root. Your actions could affect a lot of things. Think before you type!

5 Password security and encryption Use shadow password Password checking and selection Pluggable Authentication Modules – PAM –man pam.d

Linux-PAM Linux Pluggable Authentication Modules –Login, ftp, su, sudo, etc. Modules: /lib/security Configurations file: /etc/pam.d –Determine the method to authenticate –Contain a list (i.e., stack) of calls to the modules Pluggable: it is easy to add/remove modules from an authentication stack 6

PAM example auth requisite pam_securetty.so –To make sure the root user logs in from an allowed terminal session required pam_limits.so –Set up user limits according to /etc/security/limits.conf 7

8 Restricting access Control access to your system –/etc/hosts.deny man hosts.deny –/etc/hosts.allow man hosts.allow

9 Miscellaneous Security Issues Remote event logging hosts.equiv and ~/.rhosts –Rshd, rlogind should be disabled fingerd Security and NIS –/etc/group, /etc/passwd, /etc/hosts… Security and NFS Security and sendmail

10 Security of NFS A client request will include the client user-id of the process making the request The server must decide whether to believe the client's user-ids. NFS provides a means to authenticate users and machines Recommend the use of globally unique UID and the root_squash Use /etc/hosts.deny and /etc/hosts.allow to grant access

11 Security Tools nmap nessus tripwire crack Other powerful tools

12 Security Preparation Make a full backup of your machine Keep track of your system accounting data Apply all new system updates Subscribe to mailing lists to get information about potential problems

OpenSSH OpenSSH: –Secure Network Communication –A suite of secure tools that replaces telnet, rcp, ftp, etc. SSH protocol version 2 (SSH2) –Not compatible with SSH protocol version 1 When OpenSSH starts –Establish an encrypted connection –Authenticate the user –Client and server send information back and forth 13

SSH Use two key pairs –Host key pair: a set of public/private keys that is established when you install openssh-server package /etc/ssh –Session key pair: a set of public/private keys that change hourly./ssh 14

SSH First time when SSH client connects with SSH server –After verification, the client makes a copy of the server’s public host key The client then generates a random key, which is encrypted and sent to the server 15

Set up a Firewall under Ubuntu firestarter: a sophisticated, graphical tool for building and maintaining a firewall ufw –uncomplicated firewall –Command-line intrface to iptables gufw (gufw.tuxfamily.org): a graphical interface to ufw firestarter and gufw utilities are graphical front-ends for iptables Iptables: Build and manipulate network packet filtering rules in the Linux kernel 16

A Typical Firewall Setup 17

Ufw: the uncomplicated firewall sudo ufw allow ssh sudo ufw enable –to turn on ufw –By default, ufw starts with a default policy that blocks all inbound traffic and allows outbound traffic sudo ufw status verbose gufw 18

iptables Two components –Netfilter Run in the kernel space A set of tables that hold rules that the kernel uses to control network packet filtering –Iptables Run in the user space Set up, maintain, and display the rules by netfilter 19

iptables First rule: test whether a packet destination is port 23 and drops the packet if it is Second rule: tests whether a packet is received from the IP address and alter the packet destination if it was 20

21 How iptables work

22 One iptables Example

23 Useful Websites – 