TUCoPS :: Unix :: General :: unix_c~1.txt


TUCoPS :: Unix :: General :: unix_c~1.txt

CERT Unix Configuration Guidelines

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
October 2, 1997
Version 1.2
ftp://info.cert.org/pub/tech_tips/UNIX_configuration_guidelines
 CERT(*) Coordination Center
 UNIX Configuration Guidelines
 This document describes common UNIX system configuration problems that have
 been exploited by intruders and recommends practices that can be used to
 help deter several types of break-ins. We encourage system administrators
 to review all sections of this document and modify their systems to fix
 potential weaknesses.
 In addition to the information in this document, we provide three companion
 documents that may help you:
	 ftp://info.cert.org/pub/tech_tips/intruder_detection_checklist
	 - contains suggestions for determining if your system may have
	 been compromised
	 ftp://info.cert.org/pub/tech_tips/root_compromise
	 - contains suggested steps for recovering from a root compromise on
	 a UNIX system
	 ftp://info.cert.org/pub/tech_tips/security_tools
	 - contains descriptions of tools that can be used to help secure a
	 system and deter break-ins
 Also, please see our CERT advisory 01-README file and CERT vendor-initiated
 bulletin 01-README file, which contain brief descriptions of all past CERT
 advisories and vendor-initiated bulletins. These files are available from
	 ftp://info.cert.org/pub/cert_advisories/01-README
	 ftp://info.cert.org/pub/cert_bulletins/01-README
 We encourage you to get all advisories that pertain to your system(s),
 and to install the patches or workarounds described in the advisories.
 We also encourage you to check with your vendor(s) regularly for any
 updates or new patches that relate to your systems.
 -------------------------------------------------------------------------------
 Common UNIX System Configuration Problems That Are Exploited
 1. Weak passwords
 Intruders often use finger or ruser to discover account names and
 then try to guess passwords. Encourage your users to choose passwords
 that are difficult to guess (for example, words that are not in any
 dictionary of any language; no proper nouns, including names of "famous"
 real or fictitious characters; no acronyms that are commonly used by
 computer professionals; no simple variations of first or last names.)
 Furthermore, inform your users not to leave any cleartext
 username/password information in files on any system.
 A good heuristic for choosing a password is to choose an
 easy-to-remember phrase, such as "By The Dawn's Early Light", and use
 the first letters to form a password. Add some punctuation or mix
 case letters as well. For the phrase above, one example password
 might be: bt}DeL{. (DO NOT use this sample phrase for your password.)
 If intruders can get a password file, they usually move or copy it to
 another machine and run password-guessing programs on it. These programs
 involve large dictionary searches, and they run quickly even on slow
 machines. Most systems that do not put any controls on the type of
 passwords used probably have at least one password that can be easily
 guessed.
 If you believe that your password file may have been taken, change
 all the passwords on the system. At the very least, you should change
 all system passwords because an intruder may concentrate on those and
 may be able to guess even a reasonably "good" password. Intruders
 often use compromised accounts to attempt to gain privileged access
 on vulnerable systems, so we encourage you to follow the steps in
	 ftp://info.cert.org/pub/tech_tips/intruder_detection_checklist
	 ftp://info.cert.org/pub/tech_tips/root_compromise
 For further information about protecting your system from password-
 based attacks, see
	 ftp://info.cert.org/pub/tech_tips/passwd_file_protection
 2. Accounts without passwords or default passwords
 Intruders exploit system default passwords that have not been changed
 since installation, including accounts with vendor-supplied default
 passwords. Be sure to change all default passwords when the software
 is installed. Also, be aware that product upgrades can quietly change
 account passwords to a new default. It is best to change the passwords
 of default accounts after applying updates.
 Scan your password file for extra UID 0 accounts, accounts with no
 password, or new entries in the password file. Do not allow any
 accounts without passwords. Remove entries for unused accounts from
 the password file. To disable an account, change the password field
 in the /etc/passwd file to an asterisk '*' and change the login shell
 to /bin/false to ensure that an intruder cannot login to the account
 from a trusted system on the network.
 3. Reusable passwords
 Even excellent passwords are not safe. They can be captured by programs
 such as packet sniffers if the passwords are sent across networks in
 cleartext (whether on a subnet, a local network, or the Internet).
 We recommend using one-time passwords, especially for authenticated
 access from external networks and for access to sensitive resources
 like name servers and routers. For more information, see Appendix B of
 the following advisory:
 ftp://info.cert.org/pub/cert_advisories/CA-94:01.network.monitoring.attacks
 4. Use of TFTP (Trivial File Transfer Protocol) to obtain password files
 To test your system for this vulnerability, connect to your system
 using tftp and try
	 get /etc/motd
 If you can do this, anyone else on the network can probably get your
 password file. To avoid the problem, disable tftpd. If you must have
 tftpd, ensure that it is configured with restricted access. For further
 information, see
 ftp://info.cert.org/pub/cert_advisories/CA-91:18.Active.Internet.tftp.Attacks
 As mentioned in Section 1 above, if you believe your password file
 may have been taken, the safest course is to change all passwords in
 the system.
 5. Vulnerabilities in sendmail
 There have been a number of vulnerabilities identified over the years
 in sendmail(8). To the best of our knowledge, the current version of
 sendmail addresses those known vulnerabilities.
 To determine which version of sendmail is running, use telnet to connect
 to the SMTP port (25) on your system:
	 telnet <your hostname> 25
 We encourage you to keep up to date with the latest version of sendmail
 from your vendor, and ensure that it is up to date with security patches
 or workarounds detailed in CERT advisories and bulletins. For
 information about the latest version of sendmail, see
	 ftp://info.cert.org/pub/latest_sw_versions/sendmail
 In addition, we encourage you to use the following tools, both of which
 are distributed with the latest versions of sendmail:
 (a) smrsh, the sendmail restricted shell, controls the way that
	 incoming mail messages can interact with your operating system.
	 For instance, when configured correctly, smrsh can prevent an
	 intruder from using pipes to execute arbitrary commands on your
	 system.
 (b) mail.local can be used to control the way in which the /bin/mail
	 program is used on your system. This tool is described in CERT
	 advisory CA-95:02.
	ftp://info.cert.org/pub/cert_advisories/CA-95:02.binmail.vulnerabilities
 If you are not running a recent version of sendmail, the above tools
 may also be obtained individually from a number of sources, including
	 ftp://info.cert.org/pub/tools/mail.local/
	 ftp://info.cert.org/pub/tools/smrsh/
 Warning: If you are running such an old version of sendmail that you
		must install these tools separately, intruders will continue to
		be able to exploit vulnerabilities that were fixed in later
		versions of sendmail. We urge you to upgrade to the current
		version of sendmail mail and then run the tools, which are
		included with the distribution.
 6. Misconfigured anonymous FTP
 In addition to making sure that you are running the most recent
 version of ftpd, check your anonymous FTP configuration. It is
 important to follow the instructions provided with the operating
 system to properly configure the files and directories available
 through anonymous FTP (for example, file and directory permissions,
 ownership and group). Note that you should not use your system's
 standard password file or group file as the password file or group
 file for FTP. The anonymous FTP root directory and its two
 subdirectories, etc and bin, should not be owned by ftp. For more
 information about configuring anonymous FTP, see
	 ftp://info.cert.org/pub/tech_tips/anonymous_ftp_config
 7. Inappropriate network configuration file entries
 Several vendors supply /etc/hosts.equiv files with a '+' (plus sign)
 entry. The '+' entry should be removed from this file because it
 means that your system will trust all other systems. Other files that
 should not contain a '+' entry include all .rhosts files on the
 system. These files should not be world-writable.
 If your /usr/lib/X11/xdm/Xsession file includes an 'xhost' command
 with a '+' entry, such as
	 /usr/bin/X11/xhost +
 remove that line. (Note that the 'xhost' command may be in a
 different directory tree on your system.) If such a line remains
 intact, anyone on the network can talk to the X server and
 potentially insert commands into windows or read console keystrokes.
 8. Inappropriate 'secure' settings in /etc/ttys and /etc/ttytab
 Check the file /etc/ttys or /etc/ttytab (depending on the release of
 UNIX being used). The ONLY terminal that should be set to 'secure'
 should be the console.
 9. Inappropriate entries in /etc/aliases (or /usr/lib/aliases)
 Examine the /etc/aliases (or /usr/lib/aliases) mail alias file for
 inappropriate entries. Some alias files include an alias named
 'uudecode' or just 'decode.' If this alias exists on your system and
 you are not explicitly using it, then you should remove it.
 10. Inappropriate file and directory protections
 Check your system documentation to establish the correct file and
 directory protections and ownership for system files and directories.
 In particular, check the '/' (root) and '/etc' directories, and all
 system and network configuration files. Examine file and directory
 protections before and after installing software or running
 verification utilities. These procedures can cause file and directory
 protections to change.
 11. Old versions of system software
 Older versions of operating systems often have security vulnerabilities
 that are well known to intruders. To minimize your vulnerability to
 attacks, keep the version of your operating system up to date and apply
 security patches appropriate to your system(s) as soon as they become
 available.
 For information about software upgrades that fix security problems,
 their sources, and their MD5 checksums, see
	 ftp://info.cert.org/pub/latest_sw_versions/
 12. Use of setuid shell scripts
 Setuid shell scripts (especially setuid root) can pose potential
 security problems, a fact that has been well documented in many UNIX
 system administration texts. Do not create or allow setuid shell
 scripts, especially setuid root.
 13. Inappropriate export settings
 Use the showmount(8) utility to check that the configuration of the
 /etc/exports files on your hosts are correct.
 - Wherever possible, file systems should be exported read-only.
 - Do not self-reference an NFS server in its own exports file. That is,
	 the exports file should not export an NFS server to itself nor to
	 any netgroups that include the NFS server.
 - Do not allow the exports file to contain a "localhost" entry.
 - Export file systems only to hosts that require them.
 - Export only to fully qualified hostnames.
 - Ensure that export lists do not exceed 256 characters (after the
	 aliases have been expanded) or that all security patches relating
	 to this problem have been applied.
 The CERT Coordination Center is aware that intruders are using tools
 that exploit a number of NFS vulnerabilities. This can result in a
 root compromise, depending on the vulnerability being exploited. We
 encourage you to limit your exposure to these attacks by implementing
 the security measures outlined in CERT advisory CA-94:15. For this and
 other information about the NFS vulnerability, see
	 ftp://info.cert.org/pub/cert_advisories/CA-94:15.NFS.Vulnerabilities
 14. Vulnerable protocols and services
 You may want to consider filtering certain TCP/IP services at your
 firewall or router. For some related suggestions, please refer to
 "Packet Filtering For Firewall Systems," available from
	 ftp://info.cert.org/pub/tech_tips/packet_filtering
 Other Suggestions
 For a list of additional suggestions on removing common and known
 security vulnerabilities under the UNIX Operating System, see the "UNIX
 Computer Security Checklist" developed by the Australian Computer
 Emergency Response Team (AUSCERT). A copy of the AUSCERT checklist can
 be found in
	 ftp://info.cert.org/pub/tech_tips/AUSCERT_checklist1.1
 For a list of some recommended books and articles on computer security
 topics, see the CERT(sm) Coordination Center FAQ, available from
	 http://www.cert.org/cert.faqintro.html
	 ftp://info.cert.org/pub/cert_faq
- ------------------------------------------------------------------------------
Copyright 1996 Carnegie Mellon University. Conditions for use, disclaimers,
and sponsorship information can be found in
http://www.cert.org/legal_stuff.html and ftp://ftp.cert.org/pub/legal_stuff .
If you do not have FTP or web access, send mail to cert@cert.org with
"copyright" in the subject line.
CERT is registered in the U.S. Patent and Trademark Office.
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv
iQA/AwUBOBTCdlr9kb5qlZHQEQJKgACeMA+YXXiZzkWbYSzDNGIf+gv5Z6gAoO9x
DVixzNxCqUXn1y8b7PxSoJ7P
=iRAO
-----END PGP SIGNATURE-----

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2025 AOH

AltStyle によって変換されたページ (->オリジナル) /