On Dec 27, 2007 11:10 AM, Daniel B. Thurman <dant@xxxxxxxxx> wrote: > > I have finally got my F8 setup and running so now I am reviewing the > security issues that needs to be taken into account. > > I have looked into trying many things to protect and harden my systems, > but I thought I'd ask members what they are doing/using to defend their > systems against attacks and unwanted intrusions? Would it be neat > if there was an automatic non-human defender to do it for you while you > sleep? Dream on. > > I would like to focus on securing Fedora. I have tried snort w/Base etc., > Tripwire, Fam, nmap, Iptable techniques, and so on. > > Does anyone have any advice, links to great sites focused on security > and how to secure your linux box against intrusions and attacks? > > Thanks! > > > No virus found in this outgoing message. > Checked by AVG Free Edition. > Version: 7.5.516 / Virus Database: 269.17.9/1198 - Release Date: 12/26/2007 5:26 PM > > > -- > fedora-list mailing list > fedora-list@xxxxxxxxxx > To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list > Hi Daniel B. Thurman! It is late so topics only for tonight: 1. Turn off services you do not use. 2. Make your computer "silent" to all but those who use it - e.g. turn off ping - e.g. use a door knock protocol on a non-standard port for ssh to access ssh (give no reply to those who knock on the normal port and respond to only your special "knock" on your non-standard port), 3. Have a constant background scan done for virus, root kit, e-mail, changes in critical files, port scan, log files (logwatch), and audits for suspicious activity. This can and should be "niced" to not interfere with normal operations. 4. Google "pen testing". C/o osstmm. 5. Honeypots! 6. Backup your "used" areas often and in a number of different ways. I use flash drives, CDs, and other portions of the local or remote hard drives. I also tend to put an occasional file in an obscure e-mail account. Be ready to "wipe and re-load" efficiently. I have played with the idea of using "ghosted" "snapshots" for this purpose but have only taken that to the idea level. Tar is becoming a friend. 7. Do planned "wipe and re-loads" several times a year. For that matter, if you simply save your used areas and then wipe and load the new version of your distro when it comes out that is probably enough. Be ready to restore to where you were if you need to. Ok, I lied - the one link I will give you has some very good ones at the end. Note the crazy quotes and the interesting message box near the end: http://en.wikipedia.org/wiki/Computer_security Enjoy! Tod