> i'm trying to make my system as secure as possible, in light of recent
> news of networks getting broken.  the first thing i did was to turn off
> services spawned by the inet daemon that i don't use.  currently the
> following are the only ones running - i didn't turn them off since i
> don't know exactly what they do:

good.

>       discard
>       daytime

turn both of these off, they are useless and potentially dangerous.

>       time

unless something is using rdate to set it's time off of your computer, turn
this off.

>       saft    ?? What is this used for? is this like ftp?

i have no idea what this is, and it isn't even in my debian inetd.conf so
i'm not sure where it came from.  look for what the daemon is called (the
last argument on the line from inetd.conf which starts with saft) and read
the man page.  if there is no man page for it do this:

# dpkg -S daemonname

that will tell you which package it came from, then go into
/usr/share/doc/package name and decide if you need it or not.  most likely
you do not.

>       cvspserver  ?? is this safe to turn off?

you don't need this unless you are doing source code work on your box and
allowing other people to download that source via cvs (you would know if you
were :-).

> i dont quite know what discard, daytime, and time do is it safe to turn
> these guys off?  i run nntp - does nntp rely on daytime and time?

you run a news server?  are you sure you don't mean a news
client?  regardless it doesn't rely on either daytime, discard or time.

> in general is it better to use tcpserver than the inet daemon.  i run

i've stayed away from qmail in general so i'm not really sure.  my
inclination would be to say stick with inetd until there is a feature in
tcpserver that you really need, since inetd is pretty simple and more people
will be able to help you with it ... but there may be compelling reasons to
use tcpserver that i'm not aware of.

> qmail which uses tcpserver and i'm planning to have sshd be spawned by
> tcpserver.  i've read the tcpserver is better than inet - does anyone
> have any opinion on this?  are there any draw backs to removing the inet
> daemon completely?  if i can turn off the services i've listed above i
> would not have any use for inet.

if nothing is running from inetd (common if you don't run telnet or ftp).

> has anyone have any experience with SRP - Secure Remote Password.  is

i assume you read the slashdot article to hear abou srp?  if not go look it
up there (it was a few days ago, it should still be in the "older
stuff" section).  i've never used srp so no comment.

> this similar to ssh.  i've also looked at FreeS/WAN and it looks like a
> very good solution to network security.  is anyone using this now and
> how is it working for you?  while reading about FreeS/WAN i also came
> across DNSSEC - DNS Security - featured in Bind-8.2.2p5, which i am
> using.  exactly what is this feature and how do i take advantage of it?

frees/wan is a great solution if you need to have secure encrypted
*IP* tunnles between computers (like what a vpn does).  if all you want to
do is ssh between boxes, you have no need of it.  i talked to the frees/wan
guys at the BOF at LISA this year and it seemed quite impressive and there
were a lot of very positive and large scale testimonials from people.  i'm
quite excited about playing with it... but unless you have a need for it,
don't bother.

as far as dnssec goes, don't worry about it.  so long as you are running the
latest bind you should be safe from the vast majority of attacks.  dnssec is
at this point still mostly a theoritical solution to a problem which hasn't
been implemented by many people.

...

it sounds to me like you're doing an admirable thing, trying to secure your
box and learn how it all works.  but don't be mislead, just because
something is a security product, doesn't mean installing it will make your
system more secure.  in fact a badly installed or maintained "security
product" can actually seriously degrade your performance.

what you need to do is learn about the system you have.  that will probably
mean breaking things every once in a while.  look at the processes running
on your box, make sure that you know what they all do.  if you don't need
them find out where they start and turn them off one by one (and be ready
for things to break if you guess wrong about needing them with a tested boot
floppy).  go through your /bin, /sbin, /usr/bin and /usr/sbin directories
look at all the programs there, find out what they do by reading the man
pages.  go through the /etc directory and figure out what all the files in
there do.  remember that "dpkg -S filename" will tell you which package a
file came from so you can figure out where the docs for it are.

the most secure system will be the simplest one.  the more complexity you
add the more room for holes and config mistakes there will be.

read.  read.  read.

adam.

Reply via email to