Re: Securing FC 4

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



<quote who="cromworshipper-fedorastuff@xxxxxxxxx">
>
>
> --- AragonX <aragonx@xxxxxxxxxx> wrote:
> [...]
>> I've gotten some very good information off of the security lists though.
>> Perhaps I should copy it here so that others could benefit?
>
> Yes, please.
>
> What was the weak point that allowed an intrusion on your machine?  I'd
> like
> to know what I should watch out for...

<copy from Tom Walsh's email to focus-linux@xxxxxxxxxxxxxxxxx>

Something that LIDS might not catch is a binary uploaded via a remote
file include in a poorly coded PHP script (phpBB comes to mind). We have
had several servers exploited using a combination of this method and an
out of date kernel. Typically the attacker will upload a binary that
exploits the kernel to get local root privs.

To stop most of this behavior, we have been using a combination of PHP
directives (open_basedir restrictions for web space: php_admin_value
open_basedir "/path/to/web/space/html:/tmp:/usr/share/php" in the
httpd.conf) and then mounting /tmp set with noexec and nosuid. As an
additional measure we have also made wget, fetch and a few other
binaries chmod 700 to prevent access by the web server user.

As an aside, I have pretty good results with the linux vserver
(http://www.linux-vserver.org) patch set to provide virtual server
instances of any linux distro I want. I will run a Debian root server
with RedHat instances as vservers. It allows me to segment the server
and limit exposure between the different services I run. I actually had
a root exploit on a vserver a while back, and I was able to recover the
server in about 30 minutes. I just took the vserver offline... ran a rpm
checksum comparison against checksums saved in the root server... and I
determined which binaries were compromised. I replaced them, and then
brought the server back online. I was quite pleased with results. As an
added benefit the vservers are portable between physical machines so
long as the root server has the patch set applied. However I have not
used the patch set with LIDS so I do not know if they are compatible or
not. We generally use vservers for resellers who want to use control
panel software on the server (Plesk works almost flawlessly in this
particular instance).

I hope that helps you.

Take care,

Tom Walsh
http://www.expresswebsystems.com/

This is exactly what happened to me.  A flaw in I believe Squirrelmail
enabled a program to be uploaded to the /tmp directory and executed.

I've adjusted my LIDS policy to prevent execute from that directory.  I'm
going to see if I can remove root's access to it without breaking
anything.  lol



[Index of Archives]     [Current Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [Yosemite Photos]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux