Red Hat ENTERPRISE LINUX 4 - SELINUX GUIDE Betriebsanweisung

Stöbern Sie online oder laden Sie Betriebsanweisung nach Software Red Hat ENTERPRISE LINUX 4 - SELINUX GUIDE herunter. Red Hat ENTERPRISE LINUX 4 - SELINUX GUIDE User guide Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 128
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen

Inhaltsverzeichnis

Seite 1 - Security Guide

Red Hat Enterprise Linux 6Security GuideA Guide to Securing Red Hat Enterprise Linux

Seite 3

Chapter 2. Securing Your Network90• <user-defined-chain> — A user-defined chain within the table. User-defined chain names mustbe unique. This t

Seite 4

Saving IPTables Rules912.6.2.6. Listing OptionsThe default list command, iptables -L [<chain-name>], provides a very basic overview of thedefaul

Seite 5

Chapter 2. Securing Your Network92NoteNote the difference between the iptables command (/sbin/iptables), which is used tomanipulate the tables and cha

Seite 6

IPTables Control Scripts93value of IPTABLES_STATUS_NUMERIC to no. Refer to Section 2.6.4.1, “IPTables Control ScriptsConfiguration File” for more info

Seite 7 - 1. Document Conventions

Chapter 2. Securing Your Network94• IPTABLES_STATUS_NUMERIC — Outputs IP addresses in numeric form instead of domain orhostnames. This directive accep

Seite 8 - 1.2. Pull-quote Conventions

Chapter 3.95EncryptionThere are two main types of data that must be protected: data at rest and data in motion. Thesedifferent types of data are prote

Seite 9 - 2. We Need Feedback!

Chapter 3. Encryption96should also be protected when transmitted across a network. If the network session was encryptedthen you would not have to worr

Seite 10

LUKS Disk Encryption97default_algorithms = ALLdynamic_path = /usr/lib/openssl/engines/libpadlock.soinit = 1Note: for 64-bit systems, use dynamic_path

Seite 11 - Security Overview

Chapter 3. Encryption983.8.2. Manually Encrypting DirectoriesWarningFollowing this procedure will remove all data on the partition that you are encryp

Seite 12 - 1.1.1.2. Security Today

What you have just accomplished.993.8.4. What you have just accomplished.Congratulations, you now have an encrypted partition for all of your data to

Seite 13 - 1.1.3. Security Controls

Chapter 1.1Security OverviewBecause of the increased reliance on powerful, networked computers to help run businesses andkeep track of our personal in

Seite 14 - 1.1.4. Conclusion

Chapter 3. Encryption100WarningIf you forget your passphrase, the key cannot be used and any data encrypted using that key willbe lost.To find your GP

Seite 15 - 1.2. Vulnerability Assessment

About Public Key Encryption101At the confirmation prompt, enter the letter O to continue if all entries are correct, or use the otheroptions to fix an

Seite 17 - 1.2.3. Evaluating the Tools

Chapter 4.103General Principles of InformationSecurityThe following general principals provide an overview of good security practices:• encrypt all da

Seite 19 - 1.3.1.1. Shades of Gray

Chapter 5.105Secure InstallationSecurity begins with the first time you put that CD or DVD into your disk drive to install Red HatEnterprise Linux. Co

Seite 21 - 1.3.3.2. Unpatched Services

Chapter 6.107Software MaintenanceSoftware maintenance is extremely important to maintaining a secure system. It is vital to patchsoftware as soon as i

Seite 23

Chapter 7.109Federal Standards and Regulations7.1. IntroductionIn order to maintain security levels, it is possible for your organization to make effo

Seite 24

Chapter 1. Security Overview2The Internet and its earlier protocols, however, were developed as a trust-based system. That is,the Internet Protocol (I

Seite 25 - 1.5. Security Updates

Chapter 7. Federal Standards and Regulations1107.3. National Industrial Security Program Operating Manual(NISPOM)The NISPOM (also called DoD 5220.22-M

Seite 26

Chapter 8.111ReferencesThe following references are pointers to additional information that is relevant to SELinux and RedHat Enterprise Linux but bey

Seite 27 - 1.5.4. Applying the Changes

Chapter 8. References112CommunityFedora SELinux User Guidehttp://docs.fedoraproject.org/Fedora SELinux Managing Confined Services Guidehttp://docs.fed

Seite 28

113Appendix A. Encryption StandardsA.1. Synchronous EncryptionA.1.1. Advanced Encryption Standard - AESIn cryptography, the Advanced Encryption Standa

Seite 29 - Applying the Changes

Appendix A. Encryption Standards114collaborated to publicly break a DES key in 22 hours and 15 minutes (see chronology). There are alsosome analytical

Seite 30

RSA115communications channel. This key can then be used to encrypt subsequent communications using asymmetric key cipher.12A.2.1.1. Diffie-Hellman His

Seite 31 - Securing Your Network

Appendix A. Encryption Standards116of the decisional Diffie–Hellman assumption. Developed by Ronald Cramer and Victor Shoup in 1998,it is an extension

Seite 32 - /sbin/grub-md5-crypt

117Appendix B. Revision HistoryRevision 1.5 Apr 19 2010 Scott Radvan [email protected] fixes, final build for BetaRevision 1.4.1 Mar 5 2010 Scot

Seite 34

SELinux3system administrators, developers, and engineers to ensure 24x7 reliability of their systems, services,and information. Falling victim to mali

Seite 35

Chapter 1. Security Overview41.1.3.1. Physical ControlsPhysical control is the implementation of security measures in a defined structure used to dete

Seite 36

Vulnerability Assessment51.2. Vulnerability AssessmentGiven time, resources, and motivation, an attacker can break into nearly any system. All of thes

Seite 37 - 2.1.3.2.3. Password Aging

Chapter 1. Security Overview61.2.2. Defining Assessment and TestingVulnerability assessments may be broken down into one of two types: Outside looking

Seite 38

Evaluating the Tools7• Finds potential exploits before crackers find them• Results in systems being kept up to date and patched• Promotes growth and a

Seite 39 - 2.1.4.1. Allowing Root Access

Chapter 1. Security Overview81.2.3.1.1. Using NmapNmap can be run from a shell prompt by typing the nmap command followed by the hostname or IPaddress

Seite 40

Attackers and Vulnerabilities91.2.3.4. Anticipating Your Future NeedsDepending upon your target and resources, there are many tools available. There a

Seite 41

Security GuideRed Hat Enterprise Linux 6 Security GuideA Guide to Securing Red Hat Enterprise LinuxEdition 1.5AuthorCopyright © 2010 Red Hat, Inc.The

Seite 42 - 2.1.4.3. Limiting Root Access

Chapter 1. Security Overview10Gray hat hackers typically subscribe to another form of the hacker ethic, which says it is acceptable tobreak into syste

Seite 43 - 2.1.4.3.2. The sudo Command

Threats to Server Security11pathway into the system for crackers. Refer To Section 2.2, “Server Security” for information on closingports and disablin

Seite 44 - 2.1.5.1. Risks To Services

Chapter 1. Security Overview12Inherently, such services can also more easily fall prey to what the security industry terms the man-in-the-middle attac

Seite 45

Common Exploits and Attacks13explanations of how they are performed and how administrators can properly safeguard their networkagainst such attacks.Ta

Seite 46 - 2.1.5.3. Insecure Services

Chapter 1. Security Overview14Exploit Description NotesPreventative measures includeservices with cryptographic keyexchange, one-time passwords, orenc

Seite 47 - 2.1.6. Personal Firewalls

Security Updates15Exploit Description Notesalleviate the burdens of multi-seatsecurity deployments.Denial of Service(DoS) AttacksAttacker or group of

Seite 48 - 2.2. Server Security

Chapter 1. Security Overview161.5.2. Verifying Signed PackagesAll Red Hat Enterprise Linux packages are signed with the Red Hat GPG key. GPG stands fo

Seite 49 - 220-Hello, %c

Applying the Changes17rpm -ivh /tmp/updates/<kernel-package>Replace <kernel-package> in the previous example with the name of the kernel R

Seite 50 - 2.2.1.2.1. Setting a Trap

Chapter 1. Security Overview18Shared LibrariesShared libraries are units of code, such as glibc, which are used by a number of applicationsand service

Seite 51

Applying the Changes19In the previous examples, replace <PID> with the process identification number (found in thesecond column of the ps comman

Seite 54 - 255.255.255.0 192.168.0.0

Chapter 2.21Securing Your Network2.1. Workstation SecuritySecuring a Linux environment begins with the workstation. Whether locking down a personal ma

Seite 55 - 2.2.4. Securing NFS

Chapter 2. Securing Your Network22user mode, which in turn allows them to start arbitrary processes on the system or copy sensitivedata.2. Preventing

Seite 56 - UserDir disabled root

Password Security23Replace <password-hash> with the value returned by /sbin/grub-md5-crypt2.The next time the system boots, the GRUB menu preven

Seite 57 - 2.2.6. Securing FTP

Chapter 2. Securing Your Network24cracker starts an attack in the middle of the night on a system with weak passwords, the cracker mayhave gained acce

Seite 58 - 2.2.6.3. User Accounts

Password Security25• Your name• The names of pets• The names of family members• Any birth dates• Your phone number or zip code• Do Not Invert Recogniz

Seite 59 - 2.2.7. Securing Sendmail

Chapter 2. Securing Your Network26• Next, turn it into an acronym (including the punctuation).otrattw,tghwg.• Add complexity by substituting numbers a

Seite 60 - 2.2.7.3. Mail-only Users

Password Security27• Slurpie — Slurpie is similar to John The Ripper and Crack, but it is designed to run onmultiple computers simultaneously, creatin

Seite 61 - 2.3. TCP Wrappers and xinetd

Chapter 2. Securing Your Network28Refer to the man page for chage for more information on the available options.You can also use the graphical User Ma

Seite 62 - 2.3.1. TCP Wrappers

Administrative Controls29NoteThe s may be upper case or lower case. If it appears as upper case, it means that the underlyingpermission bit has not be

Seite 63 - [root@myServer ~]#

Security Guideiv2.4.2. Openswan ... 672.5. Firew

Seite 64

Chapter 2. Securing Your Network30Method Description Effects Does Not Affect· kdm· xdm· su· ssh· scp· sftp· FTP clients· Email clientsDisablingrootacc

Seite 65 - 2.3.2.1.1. Wildcards

Administrative Controls31ImportantPrograms that do not require access to the shell, such as email clients or the sudo command,can still access the roo

Seite 66

Chapter 2. Securing Your Network32sense=deny file=/etc/vsftpd.ftpusers onerr=succeedThis instructs PAM to consult the /etc/vsftpd.ftpusers file and de

Seite 67 - 2.3.2.1.4. Operators

Administrative Controls33Figure 2.2. Adding users to the "wheel" group.Open the PAM configuration file for su (/etc/pam.d/su) in a text edit

Seite 68 - 2.3.2.2. Option Fields

Chapter 2. Securing Your Network34ImportantUsers of the sudo command should take extra care to log out before walking away from theirmachines since su

Seite 69 - 2.3.2.2.4. Expansions

Available Network Services35• Distributed Denial of Service Attack (DDoS) — A type of DoS attack which uses multiplecompromised machines (often number

Seite 70 - 2.3.3. xinetd

Chapter 2. Securing Your Network36same is true for portmap. If you do not mount NFSv3 volumes or use NIS (the ypbind service), thenportmap should be d

Seite 71

Personal Firewalls37Other services like finger and rwhod reveal information about users of the system.Examples of inherently insecure services include

Seite 72 - 2.3.4.3.1. Logging Options

Chapter 2. Securing Your Network38firewall). This tool creates broad iptables rules for a general-purpose firewall using a controlpanel interface.Refe

Seite 73

Securing Services With TCP Wrappers and xinetd39• Serve only one type of network service per machine whenever possible.• Monitor all servers carefully

Seite 74

v7.4. Payment Card Industry Data Security Standard (PCI DSS) ... 1107.5. Security Technical Implementation Guid

Seite 75 - 2.3.5. Additional Resources

Chapter 2. Securing Your Network402.2.1.1.2. TCP Wrappers and Attack WarningsIf a particular host or network has been detected attacking the server, T

Seite 76 - 2.3.5.3. Related Books

Securing Services With TCP Wrappers and xinetd41Edit the file /etc/xinetd.d/telnet and change the flags line to read:flags = SENSORAdd the f

Seite 77 - 2.4.2. Openswan

Chapter 2. Securing Your Network422.2.2. Securing PortmapThe portmap service is a dynamic port assignment daemon for RPC services such as NIS and NFS.

Seite 78 - 2.4.2.3. Commands

Securing NIS43• /usr/sbin/rpc.ypxfrd — Also called the ypxfrd service, this daemon is responsible for NISmap transfers over the network.• /usr/sbin/yp

Seite 79 - 2.5. Firewalls

Chapter 2. Securing Your Network44Below is a sample entry from a /var/yp/securenets file:255.255.255.0 192.168.0.0WarningNever start an NIS server

Seite 80

Securing NFS452.2.4. Securing NFSImportantThe version of NFS included in Red Hat Enterprise Linux 6, NFSv4, no longer requires theportmap service as o

Seite 81 - 2.5.1. Netfilter and IPTables

Chapter 2. Securing Your Network46• MOUNTD_PORT — TCP and UDP port for mountd (rpc.mountd)• STATD_PORT — TCP and UDP port for status (rpc.statd)• LOCK

Seite 82

Securing FTP47ImportantDo not remove the IncludesNoExec directive. By default, the Server-Side Includes (SSI)module cannot execute commands. It is rec

Seite 83 - 2.5.2.4. Other Ports

Chapter 2. Securing Your Network48It also is possible to send additional banners to incoming connections using TCP Wrappers asdescribed in Section 2.2

Seite 84 - 2.5.3. Using IPTables

Securing Sendmail49local_enable=NO2.2.6.3.1. Restricting User AccountsTo disable FTP access for specific accounts or specific groups of accounts, such

Seite 86 - 2.5.5. FORWARD and NAT Rules

Chapter 2. Securing Your Network50NoteWith NFSv4 using Kerberos, this is not the case, since the SECRPC_GSS kernel module does notutilize UID-based au

Seite 87

TCP Wrappers and xinetd51This output shows the system is running portmap due to the presence of the sunrpc service.However, there is also a mystery se

Seite 88 - 2.5.5.3. DMZs and IPTables

Chapter 2. Securing Your Network52Figure 2.4. Access Control to Network ServicesThis chapter focuses on the role of TCP Wrappers and xinetd in control

Seite 89

TCP Wrappers Configuration Files53Because TCP Wrappers are a valuable addition to any server administrator's arsenal of security tools,most netwo

Seite 90 - 2.5.9. Additional Resources

Chapter 2. Securing Your Network54• Because access rules in hosts.allow are applied first, they take precedence over rules specifiedin hosts.deny. The

Seite 91 - 2.6. IPTables

TCP Wrappers Configuration Files55NoteMore information on some of the terms above can be found elsewhere in this guide:• Section 2.3.2.1.1, “Wildcards

Seite 92

Chapter 2. Securing Your Network56ImportantThe KNOWN, UNKNOWN, and PARANOID wildcards should be used with care, because they rely ona functioning DNS

Seite 93

TCP Wrappers Configuration Files57• The slash (/) — If a client list begins with a slash, it is treated as a file name. This is useful if rulesspecify

Seite 94 - 2.6.2.2. Command Options

Chapter 2. Securing Your Network582.3.2.2. Option FieldsIn addition to basic rules that allow and deny access, the Red Hat Enterprise Linux implementa

Seite 95

TCP Wrappers Configuration Files59in.telnetd : .example.com \ : spawn /bin/echo `/bin/date` from %h>>/var/log/telnet.log \ : allow• twist — Repl

Seite 96

viiPreface1. Document ConventionsThis manual uses several conventions to highlight certain words and phrases and draw attention tospecific pieces of i

Seite 97 - 2.6.2.4.1. TCP Protocol

Chapter 2. Securing Your Network60 : spawn /bin/echo `/bin/date` access denied to %h>>/var/log/sshd.log \ : denySimilarly, expansions can be use

Seite 98 - 2.6.2.4.3. ICMP Protocol

xinetd Configuration Files61includedir /etc/xinetd.dThese lines control the following aspects of xinetd:• instances — Specifies the maximum number of

Seite 99 - 2.6.2.5. Target Options

Chapter 2. Securing Your Network62• service — Specifies the service name, usually one of those listed in the /etc/services file.• flags — Sets any of

Seite 100

xinetd Configuration Files63This section discusses using xinetd to control access to services.NoteUnlike TCP Wrappers, changes to access control only

Seite 101 - 2.6.3. Saving IPTables Rules

Chapter 2. Securing Your Network64When using TCP Wrappers in conjunction with xinetd access controls, it is important to understandthe relationship be

Seite 102

Additional Resources65 socket_type = stream wait = no server = /usr/kerberos/sbin/telnetd log_on_success += DURATION USERID log_on_failure

Seite 103

Chapter 2. Securing Your Network66• /usr/share/doc/tcp_wrappers-<version>/ — This directory contains a README file thatdiscusses how TCP Wrapper

Seite 104 - 2.6.6. Additional Resources

How Does a VPN Work?672.4.1. How Does a VPN Work?When a packet is transmitted from a client, it sends it through the VPN router or gateway, which adds

Seite 105 - Encryption

Chapter 2. Securing Your Network68• /etc/ipsec.d/cert*.db - Certificate database files. The old default NSS database file iscert8.db. From Red Hat Ent

Seite 106 - 3.7. OpenSSL PadLock Engine

Firewalls69• Adding/deleting a connection:• ipsec auto --add/delete <connection name>• Connection establishment/breaking:• ipsec auto --up/down

Seite 107 - 3.8. LUKS Disk Encryption

PrefaceviiiClose to switch the primary mouse button from the left to the right (making the mousesuitable for use in the left hand).To insert a special

Seite 108 - Important

Chapter 2. Securing Your Network70Apart from the differences between hardware and software firewalls, there are also differences in theway firewalls f

Seite 109 - 3.8.5. Links of Interest

Netfilter and IPTables712.5.1. Netfilter and IPTablesThe Linux kernel features a powerful networking subsystem called Netfilter. The Netfilter subsyst

Seite 110

Chapter 2. Securing Your Network72Figure 2.5. Firewall Configuration ToolNoteThe Firewall Configuration Tool only configures a basic firewall. If the

Seite 111

Basic Firewall Configuration732.5.2.3. Trusted ServicesEnabling options in the Trusted services list allows the specified service to pass through the

Seite 112

Chapter 2. Securing Your Network742.5.2.5. Saving the SettingsClick OK to save the changes and enable or disable the firewall. If Enable firewall was

Seite 113 - Security

Common IPTables Filtering75The three built-in chains are INPUT, OUTPUT, and FORWARD. These chains are permanent andcannot be deleted. The chain specif

Seite 114

Chapter 2. Securing Your Network76To allow users to perform network-related functions and to use networking applications, administratorsmust open cert

Seite 115 - Secure Installation

FORWARD and NAT Rules77Administrators must, therefore, find alternative ways to share access to Internet services without givingpublic IP addresses to

Seite 116

Chapter 2. Securing Your Network78To allow LAN nodes with private IP addresses to communicate with external public networks, configurethe firewall for

Seite 117 - Software Maintenance

Malicious Software and Spoofed IP Addresses79With this command, all HTTP connections to port 80 from outside of the LAN are routed to the HTTPserver o

Seite 118

Notes and Warningsixpublic class ExClient{ public static void main(String args[]) throws Exception { InitialContext iniCtx = new Initi

Seite 119 - 7.1. Introduction

Chapter 2. Securing Your Network80• ESTABLISHED — A packet that is part of an existing connection.• RELATED — A packet that is requesting a new connec

Seite 120 - (NISPOM)

IPTables812.5.9.3. Related Documentation• Red Hat Linux Firewalls, by Bill McCarty; Red Hat Press — a comprehensive reference to buildingnetwork and s

Seite 121 - References

Chapter 2. Securing Your Network82The built-in chains for the nat table are as follows:• PREROUTING — Alters network packets when they arrive.• OUTPUT

Seite 122

Command Options for IPTables83Regardless of their destination, when packets match a particular rule in one of the tables, a targetor action is applied

Seite 123 - A.1. Synchronous Encryption

Chapter 2. Securing Your Network84Type iptables -h to view a comprehensive list of iptables command structures.2.6.2.2. Command OptionsCommand options

Seite 124 - A.2. Public-key Encryption

Command Options for IPTables85• -N — Creates a new chain with a user-specified name. The chain name must be unique, otherwisean error message is displ

Seite 125 - A.2.4. SSL/TLS

Chapter 2. Securing Your Network86If the -i parameter is used but no interface is specified, then every interface is affected by the rule.• -j — Jumps

Seite 126 - A.2.6. ElGamal Encryption

Command Options for IPTables87WarningSecure the /etc/services file to prevent unauthorized editing. If this file is editable, crackerscan use it to en

Seite 127 - Appendix B. Revision History

Chapter 2. Securing Your Network88• SYN• URG• ALL• NONEFor example, an iptables rule that contains the following specification only matches TCP packet

Seite 128

Command Options for IPTables89The limit module enables the following options:• --limit — Sets the maximum number of matches for a particular time peri

Kommentare zu diesen Handbüchern

Keine Kommentare