22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

9.4.9 Remote log server<br />

One of the many techniques would-be attackers use to <strong>cover</strong> their presence is to<br />

wipe clean any logging facilities that may (or rather should) have been enabled.<br />

This includes: account logging, system messages, error logs, traffic logs, and so<br />

forth.<br />

One way to circumvent this problem is to log all of the organization’s servers to a<br />

remote logging machine. The remote logging machine should only accept<br />

logging traffic from those servers. That way, even if a server is compromised, the<br />

logs will still be available to perform the forensic analysis of what went on.<br />

The appropriate packet filter should be configured on the logging server to drop<br />

all traffic except UDP/514. The logs on the logging server can additionally be<br />

archived to media such as CD-R, WORM, or tape.<br />

UNIX has very strong centralized logging facilities. It is true that some<br />

applications use their own log files and do not use syslog. However, the file<br />

system hierarchy is designed with support for a centralized location, /var/log.<br />

Additionally, most UNIX systems and GNU/Linux distributions come with an<br />

automated log rotation and management facility. The logs are automatically<br />

rotated, based on criteria such as size or age; and can automatically be<br />

compressed, renamed, and even archived.<br />

To further enhance the logging capabilities of the UNIX or GNU/Linux server, the<br />

normal syslogd should be replaced with a more robust, configurable, and secure<br />

alternative known as syslog-ng. It has several enhancements over the normal<br />

syslogd, including the ability to filter messages on message content, not just<br />

facility.priority pairs.<br />

Using regular expressions, host information could be logged into individual logs.<br />

syslog-ng might already come with the UNIX operating system or GNU/Linux<br />

distribution, but if it does not, it can be found at the following URL:<br />

http://www.balabit.hu/en/products/syslog-ng/<br />

This concludes the discussion on hardening UNIX operating systems and<br />

GNU/Linux distributions. While this material applies to AIX as well, AIX has some<br />

unique traits, which are <strong>cover</strong>ed separately in the next section.<br />

9.5 Hardening the AIX operating system<br />

AIX is an open UNIX operating environment that provides increased levels of<br />

integration, flexibility, and reliability that are essential for meeting the high<br />

Chapter 9. Server hardening 399

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!