Securing Linux Production Systems 30
robyannetta writes "Securing Linux Production Systems: A Practical Guide to Basic Security in Linux Production Environments is a practical step-by-step guide for securing Linux production systems. It shows how to meet basic security requirements for Linux systems that need to pass security audits. If you have been assigned to come up with a corporate Linux Security Standard, then you should definitely read on."
Other interesting stuff (Score:1, Informative)
/ and /boot (Score:1)
Re:/ and /boot (Score:2, Informative)
While I'm sure with enough fiddling it can be done, /boot generally doesn't like living in an LVM filesystem. The main reason for that would be the boot loader needs to load extra and interpret the metadata to figure out where the initrd you want is loaded from. I imagine most distros simply won't let you put /boot on a logical volume because it requires too much extra.
I did manage to get /boot to live happily on a software RAID1 mirrored partition - th
Re:/ and /boot (Score:2)
Re:/ and /boot (Score:1)
Of course, again, if you have the luxury of good hardware RAID, then you don't even have to think about this.
Re:/ and /boot (Score:1)
Re:/ and /boot (Score:1)
Mounting it ro doesn't seem as good a reason though, as many people recommend mounting / ro as well (good advice IMO).
Historical (Score:2)
Not that impressed with the list ... (Score:2)
Um, why? He talks about physical security first, but if the machine is physically secure, why would you care about this entry? Being able to hit CAD is useful ... but I guess you could force somebody to login, su to root, then reboot the box, creating a log trail ... or they could just h
Re:Not that impressed with the list ... (Score:2)
Well, duh. But when you install a system, it usually comes with a large (and getting larger, as time goes on) list of accounts already installed. How does a newbie (whom the original article was written for) know which are used and which aren't?
NONE of these accounts can be removed without understanding if they're really used. (And assuming that you installed only the packages that you need, they're probably ALL being used.)
Re:Not that impressed with the list ... (Score:2)
In any case, what use does CAD serve? You can always become root and type "reboot", right? Unless, of course, the machine is h
Re:Not that impressed with the list ... (Score:2)
Yes, it is a bad starting point. Because merely not finding any files does not mean that you can safely remove the account. Most system accounts don't own any files. (root and bin (though I forgot the purpose behind bin long ago) are the big exceptions.)
This is really only useful if you've just removed a user account and want to remove any files he had (
Firewall? (Score:3, Insightful)
I will not cover iptables in this paper. The reason is because most companies use hardware based firewalls to protect the servers in their production network. And this is usually being taken care of by another team and not by Linux systems administrators. If you are interested in a Linux Stateful Firewall using iptables, you might want to check out my instructions at Linux Stateful Firewall & IP Masquerading [puschitz.com].
Werner made somewhat incorrect assumptions in that little paragraph.
iptables is an extra security measure I highly recommend - even on networks with hardware firewalls.
It is unwise to lock the security screen door but leave the front door unlocked when you are not home.
It's also intersting to note the following at the bottom of the page:
Copyright © Notice
This article may not be published, sold, reproduced or copied in whole or in part without obtaining permission first. But you are welcome to put links from your site to the article.
If Werner is going to claim copyright, he should state his sources - there is very little chance that he wrote every word. --Mike
Re:Firewall? (Score:1)
There is every chance, actually. I've read some of Werner's Oracle installation stuff - it's very much "what I learnt bashing my head against all these problems" digested relatively neatly into a pseudo-howto. From what I've seen he generally writes from experience (or his notes), and hiss mis-steaks are hiss onw. ;)
Good Stuff Werner. I wish I had this when I was setting up our la
Re:Firewall? (Score:3, Interesting)
Re:Firewall? (Score:2)
Re:Firewall? (Score:2)
Re:Firewall? (Score:2)
Re:Firewall? (Score:2)
Why?
What you say is phrased as if it is wisdom, though I can't think of a technical or practical reason for it.
If the machine is a server, you've already stripped it down to the base functions, audited it, and know just how it could be exploited.
You know that most of those methods are social
Re:Firewall? (Score:2)
As for your Apache example...the web server itself is both stable and secure. The apps on it have to be chosen with care, though. One of the reasons why I try and stay away from PHP apps...they tend to have poor default security. (Not all PHP, though I've noticed it too many times to
Re:Firewall? (Score:1, Informative)
Your assertion is simply incorrect. You seem to have too much time to make other people look bad. When this article was posted on osnews I got emails from people about why I didn't cover iptables. I realized that I should have explained my reasoning behind this which prompted me to add a note. My experience is that hardware based firewalls are used for production systems/networks and not iptables. And just because some
Roles, anyone? (Score:2, Insightful)
A secure system is great, but it is totally pointless if the server doesn't serve a function. Securing a system should always start with defining what exactly the system needs to do, so that you can know what exactly it doesn't need to do, as securing a system equates to eliminating possible security risks that aren't essential to sys
mistake (Score:2)
CERT checklist (Score:1)