Re: securing server

2008-05-12 Thread Rich Healey
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 P PRABHU wrote: > HI > > Steps : > > 1 ) Dont run Xwindows and better install MINIMAL/SERVER edition of OS > 2 ) Remove all unwanted packages. U can very well reduce the number of > packages to 300max > 3 ) Remove all unwanted user/group accounts >

Re: securing server

2008-05-12 Thread Rich Healey
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Oliver Antwerpen wrote: > > Steve schrieb: >> Le 07-05-2008, à 17:34:08 +0800, Abdul Bijur Vallarkodath >> ([EMAIL PROTECTED]) a écrit : >> >> >>>just my two pence. >>> >> >> and my two centimes. >> >> >>>* Change the ports of most p

Re: securing server

2008-05-09 Thread Simon Brandmair
On Thu, 08 May 2008 08:40:12 +0200 Bjørn Mork wrote: > martin f krafft <[EMAIL PROTECTED]> writes: >> also sprach Simon Brandmair <[EMAIL PROTECTED]> [2008.05.07.2020 +0100]: >>> > no security benefit >>> >>> Just wondering: Why not? >> >> http://www.bpfh.net/simes/computing/chroot-break.html >

Re: securing server

2008-05-09 Thread Johannes Graumann
The database should be on read-only media - I assume that was meant ... try samhain in combination with gnupg for a remedy ... Joh On Friday 09 May 2008 14:54:40 phobot wrote: > On May 7, 1:10 pm, martin f krafft <[EMAIL PROTECTED]> wrote: > > > use integrit/aide/tripwire > > > > only useful wit

Re: securing server

2008-05-09 Thread weakish
On Fri, 2008-05-09 at 09:24 -0400, Noah Meyerhans wrote: > > At least tripwire has the ability to encrypt its database, which helps > to mitigate this problem. The claim that tripwire is only useful with > read-only media is too strong; it can be quite useful without it. > And you can sign yo

Re: securing server

2008-05-09 Thread Noah Meyerhans
On Fri, May 09, 2008 at 05:54:40AM -0700, phobot wrote: > On May 7, 1:10 pm, martin f krafft <[EMAIL PROTECTED]> wrote: > > > use integrit/aide/tripwire > > > > only useful with read-only media > > OK, I don't get it if the media is read-only none can alter it so you > don't really need tripwire.

Re: securing server

2008-05-09 Thread phobot
On May 7, 1:10 pm, martin f krafft <[EMAIL PROTECTED]> wrote: > > use integrit/aide/tripwire > > only useful with read-only media OK, I don't get it if the media is read-only none can alter it so you don't really need tripwire. But if the media is writable so changes can be made you need to run tr

Re: securing server

2008-05-08 Thread Maik Holtkamp
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, Jean-Paul Lacquement wrote/schrieb @ 07.05.2008 13:03: |> Besides that, what applications you plan to run? | | This server will only run proftpd, ssh, apache, nagios(via http), samba and cups *Oh*. IMHO you should consider whom you will serve,

Re: securing server

2008-05-07 Thread Bjørn Mork
martin f krafft <[EMAIL PROTECTED]> writes: > also sprach Simon Brandmair <[EMAIL PROTECTED]> [2008.05.07.2020 +0100]: >> > no security benefit >> >> Just wondering: Why not? > > http://www.bpfh.net/simes/computing/chroot-break.html You still need to be root before breaking the jail, and one of

Re: securing server

2008-05-07 Thread P PRABHU
HI Steps : 1 ) Dont run Xwindows and better install MINIMAL/SERVER edition of OS 2 ) Remove all unwanted packages. U can very well reduce the number of packages to 300max 3 ) Remove all unwanted user/group accounts 4 ) Update the packages 5 ) Do security tunings in Sysctl.conf 6 ) Do security tu

Re: securing server

2008-05-07 Thread Onno Gabriel
Hey guys, nice that you take care so much for server safety. But is this list not about "debian-security"? So, about security issues related to debian packages? There are hundreds of websites and forums about how to administrate and secure a webserver. Why do it here in this emaillist? Thanks

Re: securing server

2008-05-07 Thread Simon Valiquette
Jean-Paul Lacquement un jour écrivit: Hi, I plan to secure my Debian stable (or testing if you say it's better) server. The followings daemon are installed : - proftpd - apache2 - ssh If you need to offer a public ftp access, and that you don't need all the features of proftpd, I would su

Re: securing server

2008-05-07 Thread martin f krafft
also sprach Simon Brandmair <[EMAIL PROTECTED]> [2008.05.07.2020 +0100]: > > no security benefit > > Just wondering: Why not? http://www.bpfh.net/simes/computing/chroot-break.html -- .''`. martin f. krafft <[EMAIL PROTECTED]> : :' : proud Debian developer, author, administrator, and user

Re: securing server

2008-05-07 Thread Simon Brandmair
On Wed, 07 May 2008 12:10:08 +0200 martin f krafft wrote: > also sprach weakish <[EMAIL PROTECTED]> [2008.05.07.1028 +0100]: > >> You may consider chroot. > > no security benefit Just wondering: Why not? Cheers, Simon -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscr

Re: securing server

2008-05-07 Thread Ticlea Petru Alexandru
Jean-Paul Lacquement <[EMAIL PROTECTED]> wrote: Hi, I plan to secure my Debian stable (or testing if you say it's better) server. I already did the followings: - installed chkrootkit - installed fail2ban (for ssh and proftpd) - allow only one user (not root) via /etc/ssh/sshd_config, only ssh

Re: securing server

2008-05-07 Thread Daniel Leidert
Am Mittwoch, den 07.05.2008, 19:39 +0800 schrieb Abdul Bijur Vallarkodath: > haha. not really! if u have really managed an online server u'd have > seen tons of attacks and login attempts on your default ports by bots > looking around for weaker systems. But what you suggest doesn't increase th

Re: securing server

2008-05-07 Thread Alex Mestiashvili
Alex Mestiashvili wrote: Jean-Paul Lacquement wrote: Hi, I plan to secure my Debian stable (or testing if you say it's better) server. I already did the followings: - installed chkrootkit - installed fail2ban (for ssh and proftpd) - allow only one user (not root) via /etc/ssh/sshd_config, o

Re: securing server

2008-05-07 Thread Alex Mestiashvili
Jean-Paul Lacquement wrote: Hi, I plan to secure my Debian stable (or testing if you say it's better) server. I already did the followings: - installed chkrootkit - installed fail2ban (for ssh and proftpd) - allow only one user (not root) via /etc/ssh/sshd_config, only ssh v2 The followings

Re: securing server

2008-05-07 Thread Harry Jackson
Just install xinted and use the "only_from" option. H On Wed, 2008-05-07 at 19:39 +0800, Abdul Bijur Vallarkodath wrote: > haha. not really! if u have really managed an online server u'd have > seen tons of attacks and login attempts on your default ports by bots > looking around for weaker sys

Re: securing server

2008-05-07 Thread Oliver Antwerpen
Steve schrieb: Le 07-05-2008, à 17:34:08 +0800, Abdul Bijur Vallarkodath ([EMAIL PROTECTED]) a écrit : just my two pence. and my two centimes. * Change the ports of most ports like ssh, ftp, smtp, imap etc. from the default ones to some other ones. >From my poo

Re: securing server

2008-05-07 Thread Bernd Eckenfels
In article <[EMAIL PROTECTED]> you wrote: >>* Change the ports of most ports like ssh, ftp, smtp, imap etc. from the >>default ones to some other ones. > >>From my poor understanding of security related issues, I guess this is > totally useless since any (good) port scanner will defeat th

Re: securing server

2008-05-07 Thread Steve
Le 07-05-2008, à 19:39:57 +0800, Abdul Bijur Vallarkodath ([EMAIL PROTECTED]) a écrit : >haha. not really! if u have really managed an online server u'd have >seen tons of attacks and login attempts on your default ports by bots >looking around for weaker systems. Yes I have also s

Re: securing server

2008-05-07 Thread Stephen Vaughan
If your running apache I'd suggest installing modsecurity. As for the other services, disable password authentication on ssh (start using ssh keypairs), force ssh2 proftpd has a couple of tweaks, remove the banner, implement connection limits inetd is always worth shutting down unless you really

Re: securing server

2008-05-07 Thread Julien Gormotte
Le Wed, 7 May 2008 13:03:03 +0200, "Jean-Paul Lacquement" <[EMAIL PROTECTED]> a écrit : > > > I already did the followings: > > > - installed chkrootkit > > > - installed fail2ban (for ssh and proftpd) > > > > Beware of DOS. > > > > > > > - allow only one user (not root) via /etc/ssh/sshd_con

Re: securing server

2008-05-07 Thread Holger Wesser
Jean-Paul Lacquement schrieb: Would you please list me which packages to install and which rules to apply ? The Center of Internetsecurity has several documents of how to secure different operating systems: http://www.cisecurity.org/ Hope this helps. Regards, Holger -- To UNSUBSCRIBE, em

Re: securing server

2008-05-07 Thread Abdul Bijur Vallarkodath
haha. not really! if u have really managed an online server u'd have seen tons of attacks and login attempts on your default ports by bots looking around for weaker systems. This is hence especially helpful, I myself have seen these bot attacks reduce to almost zero once i had changed the port n

Re: securing server

2008-05-07 Thread Brent Clark
Jean-Paul Lacquement wrote: Hi, I plan to secure my Debian stable (or testing if you say it's better) server. I already did the followings: - installed chkrootkit - installed fail2ban (for ssh and proftpd) - allow only one user (not root) via /etc/ssh/sshd_config, only ssh v2 The followings

Re: securing server

2008-05-07 Thread Arture Le Coiffeur
On Wednesday, 2008-05-07 at 12:47:37 +0200, Steve wrote: > Le 07-05-2008, à 17:34:08 +0800, Abdul Bijur Vallarkodath ([EMAIL PROTECTED]) > a écrit : > >just my two pence. > and my two centimes. > >* Change the ports of most ports like ssh, ftp, smtp, imap etc. from the > >default o

Re: securing server

2008-05-07 Thread Jean-Paul Lacquement
> > I already did the followings: > > - installed chkrootkit > > - installed fail2ban (for ssh and proftpd) > > Beware of DOS. > > > > - allow only one user (not root) via /etc/ssh/sshd_config, only ssh v2 > > If you have multiple administrators, you should not do that. I am the only one. >

Re: securing server

2008-05-07 Thread Steve
Le 07-05-2008, à 17:34:08 +0800, Abdul Bijur Vallarkodath ([EMAIL PROTECTED]) a écrit : >just my two pence. and my two centimes. >* Change the ports of most ports like ssh, ftp, smtp, imap etc. from the >default ones to some other ones. >From my poor understanding of security rela

Re: securing server

2008-05-07 Thread martin f krafft
also sprach weakish <[EMAIL PROTECTED]> [2008.05.07.1028 +0100]: > Use update-rc.d or sysv-rc-conf to disable unwanted daemons disable by making them all K00 links > logcheck hardly a security measure. > use integrit/aide/tripwire only useful with read-only media > You may consider chroot.

Re: securing server

2008-05-07 Thread Bernd Eckenfels
In article <[EMAIL PROTECTED]> you wrote: > I already did the followings: > - installed chkrootkit > - installed fail2ban (for ssh and proftpd) Beware of DOS. > - allow only one user (not root) via /etc/ssh/sshd_config, only ssh v2 If you have multiple administrators, you should not do that. >

Re: securing server

2008-05-07 Thread Abdul Bijur Vallarkodath
just my two pence. * Change the ports of most ports like ssh, ftp, smtp, imap etc. from the default ones to some other ones. It would be nice if you could mention what are you trying to shut out and against what are u trying to secure. Thanks, Abdul On 5/7/08, Jean-Paul Lacquement <[EMAIL PROT

Re: securing server

2008-05-07 Thread Jean-Paul Lacquement
Yes, I already have a look at those links. I asked this list because this web page may not cover every threats. Many thanks. Jean-Paul 2008/5/7 Yves-Alexis Perez <[EMAIL PROTECTED]>: > On Wed, May 07, 2008 at 09:09:02AM +, Jean-Paul Lacquement wrote: > > Hi, > > > > I plan to secure my Deb

Re: securing server

2008-05-07 Thread weakish
Just too many things. For example, Use update-rc.d or sysv-rc-conf to disable unwanted daemons Edit /etc/security/limits.conf logcheck use integrit/aide/tripwire configrue firewall (via shorewall or iptables directly) etc. You may consider chroot. It's a good idea to read through securin

Re: securing server

2008-05-07 Thread Yves-Alexis Perez
On Wed, May 07, 2008 at 09:09:02AM +, Jean-Paul Lacquement wrote: > Hi, > > I plan to secure my Debian stable (or testing if you say it's better) server. […] > Would you please list me which packages to install and which rules to apply ? http://www.debian.org/doc/manuals/securing-debian-howto