HostedDB - Dedicated UNIX Servers

-->
Securing Debian HOWTO: Before the compromise Next Previous Contents

5. Before the compromise

5.1 Follow Debian security updates

As soon as new security bugs are revealed in packages, debian maintainers and upstream authors generally patch them within days or even hours. After the bug is fixed, a new package is provided on http://security.debian.org. Put the following line in your sources.list and you will get security updates automatically, whenever you update your system.

deb http://security.debian.org/debian-security stable/updates main contrib non-free

Most people, who don't live in a country which prohibits importing or using strong cryptography, should add this line as well:

deb http://security.debian.org/debian-non-US stable/non-US main contrib non-free

If you want, you can add the deb-src lines to apt as well. See the apt manpage for further details.

5.2 Exchange software

You should try to avoid any network service which sends and receives passwords in cleartext over a net like FTP/Telnet/NIS/RPC. The author recommends the use of ssh instead of telnet and ftp to everybody.

Also you should not use NIS, the Network Information Service, if it is possible, because it allows password sharing. This can be highly insecure if your setup is broken.

Last, but not least, disable RPC wherever possible. Many security holes for this service are known and can be easily exploited. On the other hand NFS services are quite important in some networks, so find a balance of security and usability in a network. Most of the DDoS (distributed denial of service) attacks use rpc exploits to get into the system and act as a so called agent/handler.

Disabling portmap is quite simple. There are different methods. The simplest one is to remove every symlink relating to portmap in /etc/rc${runlevel}.d/. You could as well chmod 644 /etc/init.d/portmap, but that gives an error message when booting. You can also strip off the "start-stop-daemon" part in /etc/init.d/portmap shell script. Keep in mind that migrating from telnet to ssh, but using other cleartext protocols does not increase your security in ANY way! Best would be to remove ftp, telnet, pop, imap, http and to supersede them with their respective crypted services.

Most of these above listed hints apply to every Unix system.

5.3 Useful kernel patches

Some kernel patches exist, which significantly enhance system security. Here are a few of them:

5.4 Genius/Paranoia Ideas, what you could do

This is probably the most unstable and funny section, since I hope that some of the "duh. that sounds crazy"-ideas might be realized. Following here you will find some - well, it depends on the point of view whether you say they are genius, paranoid, crazy or secure - ideas to increase your security rapidly but you will not come unscathed out of it.


Next Previous Contents