[ previous ] [ Contents ] [ 1 ] [ 2 ] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ next ]
One of the hardest things about writing security documents is that every case is unique. Two things you have to pay attention to are the threat environment and the security needs of the individual site, host, or network. For instance, the security needs of a home user are completely different from a network in a bank. While the primary threat a home user needs to face is the script kiddie type of cracker, a bank network has to worry about directed attacks. Additionally, the bank has to protect their customer's data with arithmetic precision. In short, every user has to consider the trade-off between usability and security/paranoia.
Note that this manual only covers issues relating to software. The best software in the world can't protect you if someone can physically access the machine. You can place it under your desk, or you can place it in a hardened bunker with an army in front of it. Nevertheless the desktop computer can be much more secure (from a software point of view) than a physically protected one if the desktop is configured properly and the software on the protected machine is full of security holes. Obviously, you must consider both issues.
This document just gives an overview of what you can do to increase the security of your Debian GNU/Linux system. If you have read other documents regarding Linux security, you will find that there are common issues which might overlap with this document. However, this document does not try to be the ultimate source of information you will be using, it only tries to adapt this same information so that it is meaningful to a Debian GNU/Linux system. Different distributions do some things in different ways (startup of daemons is one example); here, you will find material which is appropriate for Debian's procedures and tools.
The current maintainer of this document is Javier Fernández-Sanguino Peña
. Please
forward him any comments, additions or suggestions, and they will be considered
for inclusion in future releases of this manual.
This manual was started as a HOWTO by Alexander Reelsen
. After it was published
on the Internet, Javier
Fernández-Sanguino Peña
incorporated it into the Debian Documentation Project
. A
number of people have contributed to this manual (all contributions are listed
in the changelog) but the following deserve special mention since they have
provided significant contributions (full sections, chapters or appendices):
Stefano Canepa
Era Eriksson
Carlo Perassi
Alexandre Ratti
Jaime Robles
Yotam Rubin
Frederic Schutz
Pedro Zorzenon Neto
Oohara Yuuma
Davor Ocelic
You can download or view the latest version of the Securing Debian Manual from
the Debian
Documentation Project
. If you are reading a copy from another site,
please check the primary copy in case it provides new information. If you are
reading a translation, please review the version the translation refers to to
the latest version available. If you find that the version is behind please
consider using the original copy or review the Changelog/History, Section 1.6 to see what has changed.
If you want a full copy of the manual you can either download the text
version
or the PDF
version
from the Debian Documentation Project's site. These
versions might be more useful if you intend to copy the document over to a
portable device for offline reading or you want to print it out. Be
forewarned, the manual is over two hundred pages long and some of the code
fragments, due to the formatting tools used, are not wrapped in the PDF version
and might be printed incomplete.
The document is also provided in text, html and PDF formats in the harden-doc
package.
Notice, however, that the package maybe not be completely up to date with the
document provided on the Debian site (but you can always use the source package
to build an updated version yourself).
You can also check out the changes introduced in the document by reviewing its
version control logs through its CVS
server
.
Now to the official part. At the moment I (Alexander Reelsen) wrote most paragraphs of this manual, but in my opinion this should not stay the case. I grew up and live with free software, it is part of my everyday use and I guess yours, too. I encourage everybody to send me feedback, hints, additions or any other suggestions you might have.
If you think, you can maintain a certain section or paragraph better, then write to the document maintainer and you are welcome to do it. Especially if you find a section marked as FIXME, that means the authors did not have the time yet or the needed knowledge about the topic. Drop them a mail immediately.
The topic of this manual makes it quite clear that it is important to keep it up to date, and you can do your part. Please contribute.
The installation of Debian GNU/Linux is not very difficult and you should have been able to install it. If you already have some knowledge about Linux or other Unices and you are a bit familiar with basic security, it will be easier to understand this manual, as this document cannot explain every little detail of a feature (otherwise this would have been a book instead of a manual). If you are not that familiar, however, you might want to take a look at Be aware of general security problems, Section 2.2 for where to find more in-depth information.
This section describes all the things that need to be fixed in this manual. Some paragraphs include FIXME or TODO tags describing what content is missing (or what kind of work needs to be done). The purpose of this section is to describe all the things that could be included in the future in the manual, or enhancements that need to be done (or would be interesting to add).
If you feel you can provide help in contributing content fixing any element of this list (or the inline annotations), contact the main author (Authors, Section 1.1).
Expand the incident response information, maybe add some ideas derived from Red
Hat's Security Guide's chapter
on incident response
.
Write about remote monitoring tools (to check for system availability) such as
monit
, daemontools
and mon
. See
http://linux.oreillynet.com/pub/a/linux/2002/05/09/sysadminguide.html
.
Consider writing a section on how to build Debian-based network appliances
(with information such as the base system, equivs
and FAI).
Check if http://www.giac.org/practical/gsec/Chris_Koutras_GSEC.pdf
has relevant info not yet covered here.
Add information on how to set up a laptop with Debian http://www.giac.org/practical/gcux/Stephanie_Thomas_GCUX.pdf
.
Add information on how to set up a firewall using Debian GNU/Linux. The section regarding firewalling is oriented currently towards a single system (not protecting others...) also talk on how to test the setup.
Add information on setting up a proxy firewall with Debian GNU/Linux stating
specifically which packages provide proxy services (like xfwp
,
ftp-proxy
, redir
, smtpd
,
dnrd
, jftpgw
, oops
, pdnsd
,
perdition
, transproxy
, tsocks
). Should
point to the manual for any other info. Note that zorp
is now
available as a Debian package and is a proxy firewall (they also
provide Debian packages upstream).
Information on service configuration with file-rc.
Check all the reference URLs and remove/fix those no longer available.
Add information on available replacements (in Debian) for common servers which are useful for limited functionality. Examples:
local lpr with cups (package)?
remote lrp with lpr
bind with dnrd/maradns
apache with dhttpd/thttpd/wn (tux?)
exim/sendmail with ssmtpd/smtpd/postfix
squid with tinyproxy
ftpd with oftpd/vsftp
...
More information regarding security-related kernel patches in Debian, including the ones shown above and specific information on how to enable these patches in a Debian system.
Linux Intrusion Detection (kernel-patch-2.4-lids
)
Linux Trustees (in package trustees
)
linux-patch-openswan
Details of turning off unnecessary network services (besides
inetd
), it is partly in the hardening procedure but could be
broadened a bit.
Information regarding password rotation which is closely related to policy.
Policy, and educating users about policy.
More about tcpwrappers, and wrappers in general?
hosts.equiv
and other major security holes.
Issues with file sharing servers such as Samba and NFS?
suidmanager/dpkg-statoverrides.
lpr and lprng.
Switching off the GNOME IP things.
Talk about pam_chroot (see http://lists.debian.org/debian-security/2002/debian-security-200205/msg00011.html
)
and its usefulness to limit users. Introduce information related to http://online.securityfocus.com/infocus/1575
.
pdmenu
, for example is available in Debian (whereas flash is not).
Talk about chrooting services, some more info on http://www.linuxfocus.org/English/January2002/article225.shtml
,
http://www.nuclearelephant.com/papers/chroot.html
,
and http://www.linuxsecurity.com/feature_stories/feature_story-99.html
.
Talk about programs to make chroot jails. compartment
and
chrootuid
are waiting in incoming. Some others (makejail, jailer)
could also be introduced.
More information regarding log analysis software (i.e. logcheck and logcolorise).
'advanced' routing (traffic policing is security related).
limiting ssh
access to running certain commands.
using dpkg-statoverride.
secure ways to share a CD burner among users.
secure ways of providing networked sound in addition to network display capabilities (so that X clients' sounds are played on the X server's sound hardware).
securing web browsers.
setting up ftp over ssh
.
using crypto loopback file systems.
encrypting the entire file system.
steganographic tools.
setting up a PKA for an organization.
using LDAP to manage users. There is a HOWTO of ldap+kerberos for Debian at
http://www.bayour.com
written
by Turbo Fredrikson.
How to remove information of reduced utility in production systems such as
/usr/share/doc
, /usr/share/man
(yes, security by
obscurity).
More information on lcap based on the packages README file (well, not there
yet, see Bug
#169465
) and from the article from LWN: Kernel development
.
Add Colin's article on how to setup a chroot environment for a full sid system
(http://people.debian.org/~walters/chroot.html
)
Add information on running multiple snort
sensors in a given
system (check bug reports sent to snort
).
Add information on setting up a honeypot (honeyd
).
Describe situation wrt to FreeSwan (orphaned) and OpenSwan. VPN section needs to be rewritten.
Add a specific section about databases, current installation defaults and how to secure access.
Add a section about the usefulness of virtual servers (Xen et al)
Explain how to use some integrity checkers (AIDE, integrit or samhain). The basics are simple and could even explain some configuration improvements.
Changes by Javier Fernández-Sanguino Peña.
Change URLs pointing to Bastille Linux since the domain has been purchased by a
cybersquatter
.
Changes by Javier Fernández-Sanguino Peña.
Update the information related to security updates. Drop the text talking about Tiger and include information on the update-notifier and adept tools (for Desktops) as well as debsecan. Also include some pointers to other tools available.
Divide the firewall applications based on target users and add fireflier to the Desktop firewall applications list.
Remove references to libsafe, it's not in the archive any loger (was removed january 2006)
Fix the location of syslog's configuration, thanks to John Talbut.
Changes by Javier Fernández-Sanguino Peña. Thanks go to Francesco Poli for his extensive review of the document.
Remove most references to the woody release as it is no longer available (in the archive) and security support for it is no longer available.
Describe how to restrict users so that they can only do file transfers.
Added a note regarding the debian-private declasiffication decission.
Updated link of incident handling guides.
Added a note saying that development tools (compilers, etc.) are not installed now in the default 'etch' installation.
Fix references to the master security server.
Add pointers to additional APT-secure documentation
Improve the description of APT signatures
Comment out some things which are not yet final related to the mirror's official public keys.
Fixed name of the Debian Testing Security Team.
Remove reference to sarge in an example.
Update the antivirus section, clamav is now available on the release. Also mention the f-prot installer
Removes all references to freeswan as it is obsolete
Describe issues related to ruleset changes to the firewall if done remotely and provide some tips (in footnotes)
Update the information related to the IDS installation, mention BASE and the need to setup a logging database.
Rewrite the "running bind as a non-root user" section as this no longer applies to Bind9. Also remove the reference to the init.d script since the changes need to be done through /etc/default.
Remove the obsolete way to setup iptables rulesets as woody is no longer supported.
Revert the advice regarding LOG_UNKFAIL_ENAB it should be set to 'no' (as per default).
Added more information related to updating the system with desktop tools (including update-notifier) and describe aptitude usage to update the system. Also note that dselect is deprecated.
Updated the contents of the FAQ and remove redundant paragraphs.
Review and update the section related to forensic analysis of malware.
Remove or fix some dead links.
Fix many typos and gramatical errors reported by Francesco Poli.
Changes by Javier Fernández-Sanguino Peña
Provide examples using apt-cache's rdepends as suggested by Ozer Sarilar.
Fix location of Squid's user's manual because of its relocation as notified by Oskar Pearson (its maintainer).
Fix information regarding umask, it's logins.defs (and not limits.conf) where this can be configured for all login connections. Also state what is Debian's default and what would be a more restrictive value for both users and root. Thanks to Reinhard Tartler for spotting the bug.
Changes by Javier Fernández-Sanguino Peña
Add information on how to track security vulnerabilities and add references to the Debian Testing Security Tracker.
Add more information on the security support for testing.
Fix a large number of typos with a patch provided by Simon Brandmair.
Added section on how to disable root prompt on initramfs provided by Max Attems.
Remove references to queso.
Note that testing is now security-supported in the introduction.
Changes by Javier Fernández-Sanguino Peña
Rewrote the information on how to setup ssh chroots to clarify the different options available, thank to Bruce Park for bringing up the different mistakes in this appendix.
Fix lsof call as suggested by Christophe Sahut.
Include patches for typo fixes from Uwe Hermann.
Fix typo in reference spotted by Moritz Naumann.
Changes by Javier Fernández-Sanguino Peña
Add a section on Debian Developer's best practices for security.
Ammended firewall script with comments from WhiteGhost.
Changes by Javier Fernández-Sanguino Peña
Included a patch from Thomas Sjögren which describes that noexec works as expected with "new" kernels, adds information regarding tempfile handling, and some new pointers to external documentation.
Add a pointer to Dan Farmer's and Wietse Venema's forensic discovery web site, as suggested by Freek Dijkstra, and expanded a little bit the forensic analysis section with more pointers.
Fixed URL of Italy's CERT, thanks to Christoph Auer.
Reuse Joey Hess' information at the wiki on secure apt and introduce it in the infrastructure section.
Review sections referring to old versions (woody or potato)
Fix some cosmetic issues with patch from Simon Brandmair.
Included patches from Carlo Perassi: acl patches are obsolete, openwall patches are obsolete too, removed fixme notes about 2.2 and 2.4 series kernels, hap is obsolete (and not present in WNPP), remove references to Immunix (StackGuard is now in Novell's hands), and fix a FIXME about the use of bsign or elfsign.
Updated references to SElinux web pages to point to the Wiki (currently the most up to date source of information)
Include file tags and make a more consistent use of "MD5 sum" with a patch from Jens Seidel.
Patch from Joost van Baal improving the information on the firewall section (pointing to the wiki instead of listing all firewall packages available) (Closes: #339865)
Review the FAQ section on vulnerability stats, thanks to Carlos Galisteo de Cabo for pointing out that it was out of date.
Use the quote from the Social Contract 1.1 instead of 1.0 as suggested by Francesco Poli.
Changes by Javier Fernández-Sanguino Peña
Note on the SSH section that the chroot will not work if using the nodev option in the partition and point to the latest ssh packages with the chroot patch, thanks to Lutz Broedel for pointing these issues out.
Fix typo spotted by Marcos Roberto Greiner (md5sum should be sha1sum in code snippet)
Included Jens Seidel's patch fixing a number of package names and typos.
Slightly update of the tools section, removed tools no longer available and added some new ones.
Rewrite parts of the section related to where to find this document and what formats are available (the website does provide a PDF version). Also note that copies on other sites and translations might be obsolete (many of the Google hits for the manual in other sites are actually out of date).
Changes by Javier Fernández-Sanguino Peña
Improved the after installation security enhancements related to kernel configuration for network level protection with a sysctl.conf file provided by Will Moy.
Improved the gdm section, thanks to Simon Brandmair.
Typo fixes from Frédéric Bothamy and Simon Brandmair.
Improvements in the after installation sections related to how to generate the MD5 (or SHA-1) sums of binaries for periodic review.
Updated the after installation sections regarding checksecurity configuration (was out of date).
Changes by Javier Fernández-Sanguino Peña
Added a code snippet to use grep-available to generate the list of packages depending on Perl. As requested in #302470.
Rewrite of the section on network services (which ones are installed and how to disable them)
Added more information to the honeypot deployment section mentioning useful Debian packages.
Changes by Javier Fernández-Sanguino Peña
Expanded the PAM configuration limits section.
Added information on how to use pam_chroot for openssh (based on pam_chroot's README)
Fixed some minor issues reported by Dan Jacobson.
Updated the kernel patches information partially based on a patch from Carlo Perassi and also by adding deprecation notes and new kernel patches available (adamantix)
Included patch from Simon Brandmair that fixes a sentence related to login failures in terminal.
Added Mozilla/Thunderbird to the valid GPG agents as suggested by Kapolnai Richard.
Expanded the section on security updates mentioning library and kernel updates and how to detect when services need to be restarted.
Rewrote the firewall section, moved the information that applies to woody down and expand the other sections including some information on how to manually set the firewall (with a sample script) and how to test the firewall configuration.
Added some information preparing for the 3.1 release.
Added more detailed information on kernel upgrades, specifically targeted at those that used the old installation system.
Added a small section on the experimental apt 0.6 release which provides package signing checks. Moved old content to the section and also added a pointer to changes made in aptitude.
Typo fixes spotted by Frédéric Bothamy
Changes by Javier Fernández-Sanguino Peña
Added clarification to ro /usr with patch from Joost van Baal
Apply patch from Jens Seidel fixing many typos.
FreeSWAN is dead, long live OpenSWAN.
Added information on restricting access to RPC services (when they cannot be disabled) also included patch provided by Aarre Laakso.
Update aj's apt-check-sigs script.
Apply patch Carlo Perassi fixing URLs.
Apply patch from Davor Ocelic fixing many errors, typos, urls, grammar and FIXMEs. Also adds some additional information to some sections.
Rewrote the section on user auditing, highlight the usage of script which does not have some of the issues associated to shell history.
Changes by Javier Fernández-Sanguino Peña
Rewrote the user-auditing information and include examples on how to use script.
Changes by Javier Fernández-Sanguino Peña
Added information on references in DSAs and CVE-Compatibility.
Added information on apt 0.6 (apt-secure merge in experimental)
Fixed location of Chroot daemons HOWTO as suggested by Shuying Wang.
Changed APACHECTL line in the Apache chroot example (even if its not used at all) as suggested by Leonard Norrgard.
Added a footnote regarding hardlink attacks if partitions are not setup properly.
Added some missing steps in order to run bind as named as provided by Jeffrey Prosa.
Added notes about Nessus and Snort out-of-dateness in woody and availability of backported packages.
Added a chapter regarding periodic integrity test checks.
Clarified the status of testing regarding security updates. (Debian bug 233955)
Added more information regarding expected contents in securetty (since it's kernel specific).
Added pointer to snoopylogger (Debian bug 179409)
Added reference to guarddog (Debian bug 170710)
apt-ftparchive
is in apt-utils
, not in
apt
(thanks to Emmanuel Chantreau for pointing this out)
Removed jvirus from AV list.
Changes by Javier Fernández-Sanguino Peña
Fixed URL as suggested by Frank Lichtenheld.
Fixed PermitRootLogin typo as suggested by Stefan Lindenau.
Changes by Javier Fernández-Sanguino Peña
Added those that have made the most significant contributions to this manual (please mail me if you think you should be in the list and are not).
Added some blurb about FIXME/TODOs
Moved the information on security updates to the beginning of the section as suggested by Elliott Mitchell.
Added grsecurity to the list of kernel-patches for security but added a footnote on the current issues with it as suggested by Elliott Mitchell.
Removed loops (echo to 'all') in the kernel's network security script as suggested by Elliott Mitchell.
Added more (up-to-date) information in the antivirus section.
Rewrote the buffer overflow protection section and added more information on patches to the compiler to enable this kind of protection.
Changes by Javier Fernández-Sanguino Peña
Removed (and then re-added) appendix on chrooting Apache. The appendix is now dual-licensed.
Changes by Javier Fernández-Sanguino Peña
Fixed typos spotted by Leonard Norrgard.
Added a section on how to contact CERT for incident handling (#after-compromise
)
More information on setting up a Squid proxy.
Added a pointer and removed a FIXME thanks to Helge H. F.
Fixed a typo (save_inactive) spotted by Philippe Faes.
Fixed several typos spotted by Jaime Robles.
Changes by Javier Fernández-Sanguino Peña
Following Maciej Stachura's suggestions I've expanded the section on limiting users.
Fixed typo spotted by Wolfgang Nolte.
Fixed links with patch contributed by Ruben Leote Mendes.
Added a link to David Wheeler's excellent document on the footnote about counting security vulnerabilities.
Changes made by Frédéric Schütz.
rewrote entirely the section of ext2 attributes (lsattr/chattr)
Changes by Javier Fernández-Sanguino Peña and Frédéric Schütz.
Merge section 9.3 ("useful kernel patches") into section 4.13 ("Adding kernel patches"), and added some content.
Added a few more TODOs
Added information on how to manually check for updates and also about cron-apt. That way Tiger is not perceived as the only way to do automatic update checks.
Slightly rewrite of the section on executing a security updates due to Jean-Marc Ranger comments.
Added a note on Debian's installation (which will suggest the user to execute a security update right after installation)
Changes by Javier Fernández-Sanguino Peña (me).
Added a patch contributed by Frédéric Schütz.
Added a few more references on capabilities thanks to Frédéric.
Slight changes in the bind section adding a reference to BIND's 9 online documentation and proper references in the first area (Hi Pedro!)
Fixed the changelog date - new year :-)
Added a reference to Colin's articles for the TODOs.
Removed reference to old ssh+chroot patches.
More patches from Carlo Perassi.
Typo fixes (recursive in Bind is recursion), pointed out by Maik Holtkamp.
Changes by Javier Fernández-Sanguino Peña (me).
Reorganized the information on chroot (merged two sections, it didn't make much sense to have them separated)
Added the notes on chrooting Apache provided by Alexandre Ratti.
Applied patches contributed by Guillermo Jover.
Changes by Javier Fernández-Sanguino Peña (me).
Applied patches from Carlo Perassi, fixes include: re-wrapping the lines, URL fixes, and fixed some FIXMEs
Updated the contents of the Debian security team FAQ.
Added a link to the Debian security team FAQ and the Debian Developer's reference, the duplicated sections might (just might) be removed in the future.
Fixed the hand-made auditing section with comments from Michal Zielinski.
Added links to wordlists (contributed by Carlo Perassi)
Fixed some typos (still many around).
Fixed TDP links as suggested by John Summerfield.
Changes by Javier Fernández-Sanguino Peña (me). Note: I still have a lot of pending changes in my mailbox (which is currently about 5 Mbs in size).
Some typo fixes contributed by Tuyen Dinh, Bartek Golenko and Daniel K. Gebhart.
Note regarding /dev/kmem rootkits contributed by Laurent Bonnaud
Fixed typos and FIXMEs contributed by Carlo Perassi.
Changes by Chris Tillman, [email protected].
Changed around to improve grammar/spelling.
s/host.deny/hosts.deny/ (1 place)
Applied Larry Holish's patch (quite big, fixes a lot of FIXMEs)
Changes by Javier Fernández-Sanguino Peña (me).
Fixed minor typos submitted by Thiemo Nagel.
Added a footnote suggested by Thiemo Nagel.
Fixed an URL link.
Changes by Javier Fernández-Sanguino Peña (me). There were many things waiting on my inbox (as far back as February) to be included, so I'm going to tag this the back from honeymoon release :)
Applied a patch contributed by Philipe Gaspar regarding the Squid which also kills a FIXME.
Yet another FAQ item regarding service banners taken from the debian-security mailing list (thread "Telnet information" started 26th July 2002).
Added a note regarding use of CVE cross references in the How much time does the Debian security team... FAQ item.
Added a new section regarding ARP attacks contributed by Arnaud "Arhuman" Assad.
New FAQ item regarding dmesg and console login by the kernel.
Small tidbits of information to the signature-checking issues in packages (it seems to not have gotten past beta release).
New FAQ item regarding vulnerability assessment tools false positives.
Added new sections to the chapter that contains information on package signatures and reorganized it as a new Debian Security Infrastructure chapter.
New FAQ item regarding Debian vs. other Linux distributions.
New section on mail user agents with GPG/PGP functionality in the security tools chapter.
Clarified how to enable MD5 passwords in woody, added a pointer to PAM as well as a note regarding the max definition in PAM.
Added a new appendix on how to create chroot environments (after fiddling a bit with makejail and fixing, as well, some of its bugs), integrated duplicate information in all the appendix.
Added some more information regarding SSH
chrooting and its impact
on secure file transfers. Some information has been retrieved from the
debian-security mailing list (June 2002 thread: secure file
transfers).
New sections on how to do automatic updates on Debian systems as well as the caveats of using testing or unstable regarding security updates.
New section regarding keeping up to date with security patches in the Before compromise section as well as a new section about the debian-security-announce mailing list.
Added information on how to automatically generate strong passwords.
New section regarding login of idle users.
Reorganized the securing mail server section based on the Secure/hardened/minimal Debian (or "Why is the base system the way it is?") thread on the debian-security mailing list (May 2002).
Reorganized the section on kernel network parameters, with information provided in the debian-security mailing list (May 2002, syn flood attacked? thread) and added a new FAQ item as well.
New section on how to check users passwords and which packages to install for this.
New section on PPTP encryption with Microsoft clients discussed in the debian-security mailing list (April 2002).
Added a new section describing what problems are there when binding any given service to a specific IP address, this information was written based on the Bugtraq mailing list in the thread: Linux kernel 2.4 "weak end host" issue (previously discussed on debian-security as "arp problem") (started on May 9th 2002 by Felix von Leitner).
Added information on ssh
protocol version 2.
Added two subsections related to Apache secure configuration (the things specific to Debian, that is).
Added a new FAQ related to raw sockets, one related to /root, an item related to users' groups and another one related to log and configuration files permissions.
Added a pointer to a bug in libpam-cracklib that might still be open... (need to check)
Added more information regarding forensics analysis (pending more information
on packet inspection tools such as tcpflow
).
Changed the "what should I do regarding compromise" into a bullet list and included some more stuff.
Added some information on how to set up the Xscreensaver to lock the screen automatically after the configured timeout.
Added a note related to the utilities you should not install in the system. Included a note regarding Perl and why it cannot be easily removed in Debian. The idea came after reading Intersect's documents regarding Linux hardening.
Added information on lvm and journalling file systems, ext3 recommended. The information there might be too generic, however.
Added a link to the online text version (check).
Added some more stuff to the information on firewalling the local system, triggered by a comment made by Hubert Chan in the mailing list.
Added more information on PAM limits and pointers to Kurt Seifried's documents (related to a post by him to Bugtraq on April 4th 2002 answering a person that had ``discovered'' a vulnerability in Debian GNU/Linux related to resource starvation).
As suggested by Julián Muñoz, provided more information on the default Debian umask and what a user can access if he has been given a shell in the system (scary, huh?)
Included a note in the BIOS password section due to a comment from Andreas Wohlfeld.
Included patches provided by Alfred E. Heggestad fixing many of the typos still present in the document.
Added a pointer to the changelog in the Credits section since most people who contribute are listed here (and not there).
Added a few more notes to the chattr section and a new section after installation talking about system snapshots. Both ideas were contributed by Kurt Pomeroy.
Added a new section after installation just to remind users to change the boot-up sequence.
Added some more TODO items provided by Korn Andras.
Added a pointer to the NIST's guidelines on how to secure DNS provided by Daniel Quinlan.
Added a small paragraph regarding Debian's SSL certificates infrastructure.
Added Daniel Quinlan's suggestions regarding ssh
authentication
and exim's relay configuration.
Added more information regarding securing bind including changes suggested by Daniel Quinlan and an appendix with a script to make some of the changes commented on in that section.
Added a pointer to another item regarding Bind chrooting (needs to be merged).
Added a one liner contributed by Cristian Ionescu-Idbohrn to retrieve packages with tcpwrappers support.
Added a little bit more info on Debian's default PAM setup.
Included a FAQ question about using PAM to provide services without shell accounts.
Moved two FAQ items to another section and added a new FAQ regarding attack detection (and compromised systems).
Included information on how to set up a bridge firewall (including a sample Appendix). Thanks to Francois Bayart who sent this to me in March.
Added a FAQ regarding the syslogd's MARK heartbeat from a question answered by Noah Meyerhans and Alain Tesio in December 2001.
Included information on buffer overflow protection as well as some information on kernel patches.
Added more information (and reorganized) the firewall section. Updated the information regarding the iptables package and the firewall generators available.
Reorganized the information regarding log checking, moved logcheck information from host intrusion detection to that section.
Added some information on how to prepare a static package for bind for chrooting (untested).
Added a FAQ item regarding some specific servers/services (could be expanded with some of the recommendations from the debian-security list).
Added some information on RPC services (and when it's necessary).
Added some more information on capabilities (and what lcap does). Is there any good documentation on this? I haven't found any documentation on my 2.4 kernel.
Fixed some typos.
Changes by Javier Fernández-Sanguino Peña.
Rewritten part of the BIOS section.
Changes by Javier Fernández-Sanguino Peña.
Wrapped most file locations with the file tag.
Fixed typo noticed by Edi Stojicevi.
Slightly changed the remote audit tools section.
Added some todo items.
Added more information regarding printers and cups config file (taken from a thread on debian-security).
Added a patch submitted by Jesus Climent regarding access of valid system users to Proftpd when configured as anonymous server.
Small change on partition schemes for the special case of mail servers.
Added Hacking Linux Exposed to the books section.
Fixed directory typo noticed by Eduardo Pérez Ureta.
Fixed /etc/ssh typo in checklist noticed by Edi Stojicevi.
Changes by Javier Fernández-Sanguino Peña.
Fixed location of dpkg conffile.
Remove Alexander from contact information.
Added alternate mail address.
Fixed Alexander mail address (even if commented out).
Fixed location of release keys (thanks to Pedro Zorzenon for pointing this out).
Changes by Javier Fernández-Sanguino Peña.
Fixed typos, thanks to Jamin W. Collins.
Added a reference to apt-extracttemplate manpage (documents the APT::ExtractTemplate config).
Added section about restricted SSH. Information based on that posted by Mark Janssen, Christian G. Warden and Emmanuel Lacour on the debian-security mailing list.
Added information on antivirus software.
Added a FAQ: su logs due to the cron running as root.
Changes by Javier Fernández-Sanguino Peña.
Changed FIXME from lshell thanks to Oohara Yuuma.
Added package to sXid and removed comment since it *is* available.
Fixed a number of typos discovered by Oohara Yuuma.
ACID is now available in Debian (in the acidlab package) thanks to Oohara Yuuma for noticing.
Fixed LinuxSecurity links (thanks to Dave Wreski for telling).
Changes by Javier Fernández-Sanguino Peña. I wanted to change to 2.0 when all the FIXMEs were fixed but I ran out of 1.9X numbers :(
Converted the HOWTO into a Manual (now I can properly say RTFM)
Added more information regarding tcp wrappers and Debian (now many services are
compiled with support for them so it's no longer an inetd
issue).
Clarified the information on disabling services to make it more consistent (rpc info still referred to update-rc.d)
Added small note on lprng.
Added some more info on compromised servers (still very rough)
Fixed typos reported by Mark Bucciarelli.
Added some more steps in password recovery to cover the cases when the admin has set paranoid-mode=on.
Added some information to set paranoid-mode=on when login in console.
New paragraph to introduce service configuration.
Reorganized the After installation section so it is more broken up into several issues and it's easier to read.
Wrote information on how to set up firewalls with the standard Debian 3.0 setup (iptables package).
Small paragraph explaining why installing connected to the Internet is not a good idea and how to avoid this using Debian tools.
Small paragraph on timely patching referencing to IEEE paper.
Appendix on how to set up a Debian snort box, based on what Vladimir sent to the debian-security mailing list (September 3rd 2001)
Information on how logcheck is set up in Debian and how it can be used to set up HIDS.
Information on user accounting and profile analysis.
Included apt.conf configuration for read-only /usr copied from Olaf Meeuwissen's post to the debian-security mailing list
New section on VPN with some pointers and the packages available in Debian (needs content on how to set up the VPNs and Debian-specific issues), based on Jaroslaw Tabor's and Samuli Suonpaa's post to debian-security.
Small note regarding some programs to automatically build chroot jails
New FAQ item regarding identd based on a discussion in the debian-security mailing list (February 2002, started by Johannes Weiss).
New FAQ item regarding inetd
based on a discussion in the
debian-security mailing list (February 2002).
Introduced note on rcconf in the "disabling services" section.
Varied the approach regarding LKM, thanks to Philipe Gaspar
Added pointers to CERT documents and Counterpane resources
Changes by Javier Fernández-Sanguino Peña.
Added a new FAQ item regarding time to fix security vulnerabilities.
Reorganized FAQ sections.
Started writing a section regarding firewalling in Debian GNU/Linux (could be broadened a bit)
Fixed typos sent by Matt Kraai
Fixed DNS information
Added information on whisker and nbtscan to the auditing section.
Fixed some wrong URLs
Changes by Javier Fernández-Sanguino Peña.
Added a new section regarding auditing using Debian GNU/Linux.
Added info regarding finger daemon taken from the security mailing list.
Changes by Javier Fernández-Sanguino Peña.
Fixed link for Linux Trustees
Fixed typos (patches from Oohara Yuuma and Pedro Zorzenon)
Changes by Javier Fernández-Sanguino Peña.
Reorganized service installation and removal and added some new notes.
Added some notes regarding using integrity checkers as intrusion detection tools.
Added a chapter regarding package signatures.
Changes by Javier Fernández-Sanguino Peña.
Added notes regarding Squid security sent by Philipe Gaspar.
Fixed rootkit links thanks to Philipe Gaspar.
Changes by Javier Fernández-Sanguino Peña.
Added some notes regarding Apache and Lpr/lpng.
Added some information regarding noexec and read-only partitions.
Rewrote how users can help in Debian security issues (FAQ item).
Changes by Javier Fernández-Sanguino Peña.
Fixed location of mail program.
Added some new items to the FAQ.
Changes by Javier Fernández-Sanguino Peña.
Added a small section on how Debian handles security
Clarified MD5 passwords (thanks to `rocky')
Added some more information regarding harden-X from Stephen van Egmond
Added some new items to the FAQ
Changes by Javier Fernández-Sanguino Peña.
Added some forensics information sent by Yotam Rubin.
Added information on how to build a honeynet using Debian GNU/Linux.
Added some more TODOS.
Fixed more typos (thanks Yotam!)
Changes by Javier Fernández-Sanguino Peña.
Added patch to fix misspellings and some new information (contributed by Yotam Rubin)
Added references to other online (and offline) documentation both in a section (see Be aware of general security problems, Section 2.2) by itself and inline in some sections.
Added some information on configuring Bind options to restrict access to the DNS server.
Added information on how to automatically harden a Debian system (regarding the harden package and bastille).
Removed some done TODOs and added some new ones.
Changes by Javier Fernández-Sanguino Peña.
Added the default user/group list provided by Joey Hess to the debian-security mailing list.
Added information on LKM root-kits (Loadable Kernel Modules (LKM), Section 10.4.1) contributed by Philipe Gaspar.
Added information on Proftp contributed by Emmanuel Lacour.
Recovered the checklist Appendix from Era Eriksson.
Added some new TODO items and removed other fixed ones.
Manually included Era's patches since they were not all included in the previous version.
Changes by Era Eriksson.
Typo fixes and wording changes
Changes by Javier Fernández-Sanguino Peña.
Minor changes to tags in order to keep on removing the tt tags and substitute prgn/package tags for them.
Changes by Javier Fernández-Sanguino Peña.
Added pointer to document as published in the DDP (should supersede the original in the near future)
Started a mini-FAQ (should be expanded) with some questions recovered from my mailbox.
Added general information to consider while securing.
Added a paragraph regarding local (incoming) mail delivery.
Added some pointers to more information.
Added information regarding the printing service.
Added a security hardening checklist.
Reorganized NIS and RPC information.
Added some notes taken while reading this document on my new Visor :)
Fixed some badly formatted lines.
Fixed some typos.
Added a Genius/Paranoia idea contributed by Gaby Schilders.
Changes by Josip Rodin and Javier Fernández-Sanguino Peña.
Added paragraphs related to BIND and some FIXMEs.
Small setuid check paragraph
Various minor cleanups
Found out how to use sgml2txt -f for the txt version
Added a security update after installation paragraph
Added a proftpd paragraph
This time really wrote something about XDM, sorry for last time
Lots of grammar corrections by James Treacy, new XDM paragraph
Typo fixes, miscellaneous additions
Initial release
Alexander Reelsen wrote the original document.
Javier Fernández-Sanguino added more info to the original doc.
Robert van der Meulen provided the quota paragraphs and many good ideas.
Ethan Benson corrected the PAM paragraph and had some good ideas.
Dariusz Puchalak contributed some information to several chapters.
Gaby Schilders contributed a nice Genius/Paranoia idea.
Era Eriksson smoothed out the language in a lot of places and contributed the checklist appendix.
Philipe Gaspar wrote the LKM information.
Yotam Rubin contributed fixes for many typos as well as information regarding bind versions and MD5 passwords.
Francois Bayart provided the appendix describing how to set up a bridge firewall.
Joey Hess wrote the section describing how Secure Apt works on the Debian Wiki
.
Martin F. Krafft wrote some information on his blog regarding fingerprint verification which was also reused for the Secure Apt section.
Francesco Poli did an extensive review of the manual and provided quite a lot of bug reports and typo fixes which improved and helped update the document.
All the people who made suggestions for improvements that (eventually) were included here (see Changelog/History, Section 1.6).
(Alexander) All the folks who encouraged me to write this HOWTO (which was later turned into a manual).
The whole Debian project.
[ previous ] [ Contents ] [ 1 ] [ 2 ] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ next ]
Securing Debian Manual
[email protected]