[NTLUG:Discuss] Intrusion and Detection
Steve
steve at cyberianhamster.com
Mon Dec 24 10:37:55 CST 2001
Chris Cox wrote:
> Tripwire is ok (beware of licening on it though).
I thought that Tripwire for Linux, by itself, was under the GPL.
> Basically the idea
> of doing checksums of critical system files is a good thing.
This is basically the last line of defense, and people should treat it
as such. That means all critical Tripwire files used in benchmarking
your existing files with the clean / baseline set must be on a
non-writable medium (i.e., floppy, CD-R, etc.) Tripwire emails should be
sent off the machine. The value of Tripwire drops sharply if people
leave it all on the machine that is compromised.
> Unforntunately, anyone who is root on your system can do
> ANYTHING... including thwarting your tripwire or whatever
> IDS techniques you have in place.... remember ROOT can
> do ANYTHING.
Having an IDS with secured baseline files substantially raises the bar
for the level of expertise needed to sneak by. Even if he hacked your
kernel, you should still be able to load up your filesystem through
another way (another machine, CD, etc.) and run off secure Tripwire files.
> So... first you may want to look at:
> http://www.linuxdoc.org/guides.html (look for Securing and Optimizing
> Redhat Linux... though most of it is good for
> any distribution of Linux)
> This document has good techniques including using the ext2 immutable
> flag.
Yeah. Biggest problem with security is the prevention aspect. You get a
much bigger bang for the buck on the prevention aspect.
> Someone has to stay abreast of issues... I recommend subscribing to
> things like:
>
> http://www.cert.org/contact_cert/certmaillist.html
> and most defintitely the bugtraq mailing list:
> http://www.securityfocus.com/cgi-bin/forums.pl
> Most all problems will be seen on bugtraq before general news
> flashes come out.
This is a lot for people who do not do this for a living. You may be
better off just regularly visiting your distro's site for
vulnerabilities warnings. Still better than general news flashes but not
as hairy as the these technical areas. Or use something with a very good
package updating mechanism like Debian.
> One last thing... throw the hacker a curve ball. The reason that
> platforms get hacked more often today is because of the
> similarity of machine configurations.
I think the reason platforms get hacked today is poor setup and poor
maintenance. The common setups are a liability yes, but most of the
cracks that I've seen exploit people whose systems aren't up to date or
are poorly configured.
- Only run the services that you need.
- Try to understand the nature of your services.
- Keep those services up to date religiously.
The easiest step for the user is the 3rd. Yet, it seems to be the one
that crackers take the most advantage of.
> <note>> ....just don't ever tick them off :-) A "cracker" is something
> you have with soup.
> </note>
Uh. Well there is the pigment-laden association...
Steve
More information about the Discuss
mailing list