> making the disks readonly is not trivial ...
> lots of work  to make it readonly.. a fun project ...

Not really. Nothing should write anywhere except /var and /tmp 
(did I miss any). Also, if you have users, then /home.

In particular, if it is in $PATH, make it read-only. Many root 
kits trojan system binaries, and will fail on read-only media.

By using ramdisks, you can easily make the entire file-system 
read-only; you need only hit reset restore.

>
>>      o apt-get remove gcc
>
> i'd remove make, tar and perl

Won't removing tar break dpkg? And many other things? Same with perl?

And without tar, how to do backups...

>
> its fun to see installed new root kits that couldn't finish its
> tasks cause gcc and tar etc is missing...
>       - never did understand why the rootkit didnt come with
>       its own pre-compiled binaries ...
>

They would have to be staticly linked to have a chance of 
working, and then the root kit would be several megs per 
executable larger.

>> and, most important:
>>      o apt-get update && apt-get upgrade
>
> that assumes that security.debian.org is listed in sources.list
> ( *sorry* just had to add the comment.. :-)

I've never understood why it isn't always by default.
>

> for simplicity... one can start here
> http://www.debian.org/doc/manuals/securing-debian-howto/

Yep.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to