07.06.2014 Views

2 - Raspberry PI Community Projects

2 - Raspberry PI Community Projects

2 - Raspberry PI Community Projects

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

possible, but if the web application was not up-to-date, chances are that the kernel and other<br />

programs are outdated too; this sometimes follows a decision from the administrator who, despite<br />

knowing about the vulnerability, neglected to upgrade the system since there are no local<br />

users. The attacker can then take advantage of this second vulnerability to get root access.<br />

VOCABULARY<br />

Privilege escalation<br />

This term covers anything that can be used to obtain more permissions than a<br />

given user should normally have. The sudo program is designed for precisely<br />

the purpose of giving administrative rights to some users. But the same term<br />

is also used to describe the act of an aacker exploiting a vulnerability to<br />

obtain undue rights.<br />

Now the attacker owns the machine; they will usually try to keep this privileged access for as<br />

long as possible. This involves installing a rootkit, a program that will replace some components<br />

of the system so that the attacker will be able to obtain the administrator privileges again at a<br />

later time; the rootkit also tries hiding its own existence as well as any traces of the intrusion.<br />

A subverted ps program will omit to list some processes, netstat will not list some of the active<br />

connections, and so on. Using the root permissions, the attacker was able to observe the<br />

whole system, but didn't find important data; so they will try accessing other machines in the<br />

corporate network. Analyzing the administrator's account and the history files, the attacker<br />

finds what machines are routinely accessed. By replacing sudo or ssh with a subverted program,<br />

the attacker can intercept some of the administrator's passwords, which they will use on<br />

the detected servers… and the intrusion can propagate from then on.<br />

This is a nightmare scenario which can be prevented by several measures. The next few sections<br />

describe some of these measures.<br />

14.5.3. Choosing the Soware Wisely<br />

Once the potential security problems are known, they must be taken into account at each step of<br />

the process of deploying a service, especially when choosing the software to install. Many web<br />

sites, such as SecurityFocus.com, keep a list of recently-discovered vulnerabilities, which can<br />

give an idea of a security track record before some particular software is deployed. Of course,<br />

this information must be balanced against the popularity of said software: a more widely-used<br />

program is a more tempting target, and it will be more closely scrutinized as a consequence. On<br />

the other hand, a niche program may be full of security holes that never get publicized due to a<br />

lack of interest in a security audit.<br />

VOCABULARY<br />

Security audit<br />

A security audit is the process of thoroughly reading and analyzing the source<br />

code of some soware, looking for potential security vulnerabilities it could<br />

contain. Such audits are usually proactive and they are conducted to ensure<br />

a program meets certain security requirements.<br />

In the Free Software world, there is generally ample room for choice, and choosing one piece<br />

of software over another should be a decision based on the criteria that apply locally. More<br />

402 The Debian Administrator's Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!