Securing Linux: Is it Necessary Beyond Just Installing

Discussion in 'all things UNIX' started by Searching_ _ _, Mar 25, 2009.

Thread Status:
Not open for further replies.
  1. Searching_ _ _

    Searching_ _ _ Registered Member

    Joined:
    Jan 2, 2008
    Posts:
    1,988
    Location:
    iAnywhere
    Apparently the answer is yes.

    Read more...itsolutionskb
     
  2. sukarof

    sukarof Registered Member

    Joined:
    Jun 22, 2004
    Posts:
    1,887
    Location:
    Stockholm Sweden
    Re: Securing Linux: Is it Nescessary Beyond Just Installing

    Here's a couple of noob questions from someone new in the Linux world:
    • Could someone please define "Anybody"
      Is anybody someone who finds an open port through the net and by so gets access to these folders?
      Or is anybody another user on the computer?
    • How does this anybody get access to those folders so he can run all these scripts? Javascripts on the web?
    • Anybody doesnt have to know the sudo password?
    • The restricted account that you have as default is useless when it comes to those folders?
     
  3. Searching_ _ _

    Searching_ _ _ Registered Member

    Joined:
    Jan 2, 2008
    Posts:
    1,988
    Location:
    iAnywhere
    Re: Securing Linux: Is it Nescessary Beyond Just Installing

    I guess that is an operative scare word in articles that Mrkvonick mentions.

    Would've been nice if he stated more about how permissions work for those folders.
    As it is, he is telling us how to secure something without the why of it.
     
  4. Mrkvonic

    Mrkvonic Linux Systems Expert

    Joined:
    May 9, 2005
    Posts:
    10,224
    Searching, relax!

    We're talking local access, local access = game over. Nothing special. You might as well blow torch the hard disk, no protection against it, eh?

    And it's mrkvonic, no a no k at the end :) or just mrk or if you must mr K

    Mrk
     
  5. Searching_ _ _

    Searching_ _ _ Registered Member

    Joined:
    Jan 2, 2008
    Posts:
    1,988
    Location:
    iAnywhere
    Yeah, bout that. Just a typo. In the process of deleting the K I got distracted. My bad.
    Thanks for clarifying.

    [side]Have you tried working on the unsolved Sonoluminescence problem.[/side]
     
  6. sukarof

    sukarof Registered Member

    Joined:
    Jun 22, 2004
    Posts:
    1,887
    Location:
    Stockholm Sweden
    That is what I suspected. No need to do that paranoid howto in other words. For a second I thought -
    "Just when I thought I was out, they pulled me back in!" (ie: soon there will be HIPS for linux) :D
     
  7. Dogbiscuit

    Dogbiscuit Guest

    Know where your users live. ;)
     
  8. Mrkvonic

    Mrkvonic Linux Systems Expert

    Joined:
    May 9, 2005
    Posts:
    10,224
    That howto is basically resetting your password in single mode. That's all. No different than using BartPE to reset Windows passwords. And just for reference, there's no network in runlevel 1.
    Mrk
     
  9. bktII

    bktII Registered Member

    Joined:
    Apr 12, 2006
    Posts:
    224
    A fair number of posts regarding securing /tmp, /var/tmp, /dev/shm on the internet. They are targeted towards securing a linux/unix server.

    As for the thread title, "Securing Linux: Is it Necessary Beyond Just Installing", it depends on the distro and what you do with it. There are many distros. After install, some distros drop you into a user account, others drop you into the root account. Some distros enable (or at least offer to enable) the setup of an iptables-based firewall during the install, but not all. If you have a hardware firewall (not everyone does) and it is properly configured, an iptables-based firewall is not necessary. Also lots of variability on services/ports running by default with various distros. This is mitigated with a properly configured software and/or hardware firewall.

    Running a home linux server open to the internet at large requires more consideration than a home linux desktop.

    Good practice to run 'sudo netstat -tap' from a terminal window after installing linux to check for open ports. Also good practice to run periodically as some services have been known to reopen ports after service-related packages are updated. If you are not behind a hardware firewall, good practice to run 'sudo iptables -L' from a terminal window after installing linux to check if an iptables-based firewall is up and running.

    HIPS software does exist for linux, but are targeted for businesses running servers.
     
  10. lodore

    lodore Registered Member

    Joined:
    Jun 22, 2006
    Posts:
    9,065
    if your really paranoid use SElinux and crank it up until it wont let you do anything:p
     
  11. Pedro

    Pedro Registered Member

    Joined:
    Nov 2, 2006
    Posts:
    3,502
    Or rsbac, grsecurity, etc. which a certain person should write about :rolleyes:
    I must protest!
     
  12. Mrkvonic

    Mrkvonic Linux Systems Expert

    Joined:
    May 9, 2005
    Posts:
    10,224
    Eventually ... soon ... why don't you write about it and I'll feature it, a guest article?
    Mrk
     
  13. Pedro

    Pedro Registered Member

    Joined:
    Nov 2, 2006
    Posts:
    3,502
    I'm not exactly Mrkvonic or Alphalutra :D
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.