07.06.2014 Views

2 - Raspberry PI Community Projects

2 - Raspberry PI Community Projects

2 - Raspberry PI Community Projects

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

features imply a increased risk of a vulnerability hiding in the code; picking the most advanced<br />

program for a task may actually be counter-productive, and a better approach is usually to pick<br />

the simplest program that meets the requirements.<br />

VOCABULARY<br />

Zero-day exploit<br />

A zero-day exploit aack is hard to prevent; the term covers a vulnerability<br />

that is not yet known to the authors of the program.<br />

14.5.4. Managing a Machine as a Whole<br />

Most Linux distributions install by default a number of Unix services and many tools. In many<br />

cases, these services and tools are not required for the actual purposes for which the administrator<br />

set up the machine. As a general guideline in security matters, unneeded software is best<br />

uninstalled. Indeed, there's no point in securing an FTP server, if a vulnerability in a different,<br />

unused service can be used to get administrator privileges on the whole machine.<br />

By the same reasoning, firewalls will often be configured to only allow access to services that<br />

are meant to be publicly accessible.<br />

Current computers are powerful enough to allow hosting several services on the same physical<br />

machine. From an economic viewpoint, such a possibility is interesting: only one computer to<br />

administrate, lower energy consumption, and so on. From the security point of view, however,<br />

such a choice can be a problem. One compromised service can bring access to the whole machine,<br />

which in turn compromises the other services hosted on the same computer. This risk<br />

can be mitigated by isolating the services. This can be attained either with virtualization (each<br />

service being hosted in a dedicated virtual machine), or with SELinux (each service daemon<br />

having an adequately designed set of permissions).<br />

14.5.5. Users Are Players<br />

Discussing security immediately brings to mind protection against attacks by anonymous crackers<br />

hiding in the Internet jungle; but an often-forgotten fact is that risks also come from inside:<br />

an employee about to leave the company could download sensitive files on the important<br />

projects and sell them to competitors, a negligent salesman could leave their desk without locking<br />

their session during a meeting with a new prospect, a clumsy user could delete the wrong<br />

directory by mistake, and so on.<br />

The response to these risks can involve technical solutions: no more than the required permissions<br />

should be granted to users, and regular backups are a must. But in many cases, the<br />

appropriate protection is going to involve training users to avoid the risks.<br />

QUICK LOOK<br />

autolog<br />

The autolog package provides a program that automatically disconnects inactive<br />

users aer a configurable delay. It also allows killing user processes that<br />

persist aer a session ends, thereby preventing users from running daemons.<br />

Chapter 14 — Security<br />

403

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!