HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual S 4.95 Minimal operating system

S 4.95 Minimal operating system

Initiation responsibility: Head of IT Section, IT Security Management

Implementation responsibility: Administrators

Computers in a security-critical environment should be designed so as to present as few targets for attack as possible. As today's operating systems provide many network services as standard, a well thought-out server service (such as an SSL-based Web server) is not sufficient for the operation of a secure server. It is also necessary to safeguard the operating system, because otherwise the security functions of the server service could be evaded via a weak point in the operating system. The characteristic feature of what is referred to as a minimal operating system is that ideally it does not provide any form of network service. A potential attacker will therefore be unable to exploit a weak point in a network service belonging to the operating system. Even if an attacker does gain access to the computer via a weak point, he will be further impeded by the minimal system. The fewer programs an attacker finds on a target computer, the more difficult it is for him to locate and exploit further weak points on that computer. Furthermore this also greatly facilitates maintenance of the server, because the patches or service packs for utility programs no longer have to be loaded if the programs are not there.

The following sections describe the configuration of an operating system using the example of an Internet server, because in this case the security requirements imposed on the operating system are generally very high.

An Internet server usually has only one task: making a certain number of services (such as the readiness to receive e-mails) available to other computers in a stable manner. The underlying operating system should not provide any other services. The following procedure should therefore be observed when installing an Internet server:

  1. Basic installation of the operating system
  1. Deactivation of unnecessary programs
3. Configuration of the network parameters 4. Deactivation of unnecessary network services 5. Installation of security programs 6. Configuration and checking of network services 7. Deletion of programs that are no longer required

A minimal operating system should of course not be an end in itself. It goes without saying that, for an Internet server, the server service itself still has to be installed. It depends on the particular installation whether this is done at the end of the above list or between points 6 and 7, for example, or even immediately after point 1. It becomes problematical if the installation fails because of the absence of operating system packages, because in that case the missing packages have to be located and reinstalled manually. It would be better if the vendor of the server service specified the operating system dependencies, so that the minimal system could be brought into line with these from the outset.

Even a computer configured with a minimal system is not entirely protected against attacks. The most probable cause of a successful attack is no doubt the server service, but also the minimal system itself is still open to attack, in particular the TCP/IP stack, which has to forward the network packets to the application. Almost all attacks against the TCP/IP stack that have so far come to light, however, have only affected availability, with the computers concerned being caused to crash; this means that infiltration of computers has not yet been observed. In order to reduce even this risk yet further, S 4.98 Restricting communication to a minimum with packet filters should also be implemented.


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
July 1999
home