18.12.2012 Views

O'Reilly - Practical UNIX & Internet Sec... 7015KB

O'Reilly - Practical UNIX & Internet Sec... 7015KB

O'Reilly - Practical UNIX & Internet Sec... 7015KB

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

[Appendix A] <strong>UNIX</strong> <strong>Sec</strong>urity Checklist<br />

●<br />

●<br />

●<br />

●<br />

●<br />

●<br />

●<br />

●<br />

●<br />

●<br />

●<br />

●<br />

●<br />

●<br />

●<br />

●<br />

●<br />

●<br />

●<br />

●<br />

●<br />

●<br />

●<br />

Disable or replace the finger service with something that provides less information.<br />

If you are using POP or IMAP, configure your system to use APOP or Kerberos for authentication.<br />

Consider running the authd daemon for all machines in the local net.<br />

Configure your NNTP or INND server to restrict who can post articles or transfer Usenet news.<br />

Make sure that you have the most recent version of the software.<br />

Block NTP connections from outside your organization.<br />

Block SNMP connections from outside your organization.<br />

Disable rexec service unless needed.<br />

Routinely scan your system for suspicious .rhosts files. Make sure that all existing .rhosts files are<br />

protected to mode 600.<br />

Consider not allowing users to have .rhosts files on your system.<br />

If you have a plus sign (+) in your /etc/hosts.equiv file, remove it.<br />

Do not place usernames in your /etc/hosts.equiv file.<br />

Restrict access to your printing software via the /etc/hosts.lpd file.<br />

Make your list of trusted hosts as small as possible.<br />

Block incoming RIP packets; use static routes where possible and practical.<br />

Disable UUCP over IP unless needed.<br />

Set up your logindevperm or fbtab files to restrict permissions on frame buffers and devices, if this<br />

is possible on your system.<br />

If your X11 Server blocks on null connections, get an updated version.<br />

Enable the best X11 authentication possible in your configuration (e.g., Kerberos, <strong>Sec</strong>ure RPC,<br />

"magic cookies") instead of using xhost.<br />

Disable the rexd RPC service.<br />

Be very cautious about installing MUDS, IRCS, or other servers.<br />

Scan your network connections regularly with netstat.<br />

Scan your network with tools such as SATAN and ISS to determine if you have uncorrected<br />

vulnerabilities - before an attacker does the same.<br />

Re-evaluate why you are connected to the network at all, and disconnect machines that do not<br />

really need to be connected.<br />

A.1.1.17 Chapter 18: WWW <strong>Sec</strong>urity<br />

file:///C|/Oreilly Unix etc/<strong>O'Reilly</strong> Reference Library/networking/puis/appa_01.htm (14 of 21) [2002-04-12 10:44:34]

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!