
Table of Contents
1. Introduction.....................................................................................................................................................1
1.1. Why me?...........................................................................................................................................1
1.2. Notes.................................................................................................................................................2
1.3. Copyright..........................................................................................................................................2
1.4. Credits...............................................................................................................................................3
1.5. Disclaimer.........................................................................................................................................3
1.6. New Versions and Changelog...........................................................................................................3
1.7. Feedback...........................................................................................................................................4
2. Foreword..........................................................................................................................................................5
2.1. The Optimum Configuration............................................................................................................6
2.2. Before We Start.................................................................................................................................6
3. Step 1: Which services do we really need?...................................................................................................7
3.1. System Audit.....................................................................................................................................7
3.2. The Danger Zone (or r00t m3 pl34s3)..............................................................................................9
3.3. Stopping Services.............................................................................................................................9
3.3.1. Stopping Init Services.....................................................................................................10
3.3.2. Inetd................................................................................................................................11
3.3.3. Xinetd..............................................................................................................................13
3.3.4. When All Else Fails........................................................................................................14
3.4. Exceptions.......................................................................................................................................15
3.5. Summary and Conclusions for Step 1.............................................................................................16
4. Step 2: Updating............................................................................................................................................17
4.1. Summary and Conclusions for Step 2.............................................................................................17
5. Step 3: Firewalls and Setting Access Policies.............................................................................................19
5.1. Strategy...........................................................................................................................................19
5.2. Packet Filters −− Ipchains and Iptables..........................................................................................19
5.2.1. ipchains...........................................................................................................................20
5.2.2. iptables............................................................................................................................23
5.2.3. Red Hat Firewall Configuration Tools...........................................................................25
5.3. Tcpwrappers (libwrap)....................................................................................................................26
5.3.1. xinetd..............................................................................................................................28
5.4. PortSentry.......................................................................................................................................29
5.5. Proxies............................................................................................................................................29
5.6. Individual Applications...................................................................................................................30
5.7. Verifying.........................................................................................................................................32
5.8. Logging...........................................................................................................................................33
5.9. Where to Start.................................................................................................................................34
5.10. Summary and Conclusions for Step 3...........................................................................................34
6. Intrusion Detection.......................................................................................................................................36
6.1. Intrusion Detection Systems (IDS).................................................................................................36
6.2. Have I Been Hacked?......................................................................................................................36
6.3. Reclaiming a Compromised System...............................................................................................38
Security Quick−Start HOWTO for Red Hat Linux
i
Commenti su questo manuale