Re: Firewall - Limit Geographic Area

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Thanks, I appreciate your time.

Larry Nobs

----- Original Message ----- 
From: "Kent Borg" <kentborg-rhl@xxxxxxxx>
To: <redhat-list@xxxxxxxxxx>
Sent: Thursday, October 16, 2003 4:35 PM
Subject: Re: Firewall - Limit Geographic Area


> On Thu, Oct 16, 2003 at 12:37:23PM -0500, lrnobs wrote:
> > Remember that I am a beginner at this and am trying to learn about
> > all the weapons that are available to protect my little site.
> 
> Security.  A lot of people have a lot of good advice about security,
> but much of it is unrealistic.
> 
> Attempting to be reasonable, here is my current recipe for security:
> 
>   - Redhat's default install is quite secure (and at least a zillion
>     times more secure than a Microsoft Windows machine can be).
> 
>   - Redhat's distribution is *only* secure if you keep up to date with
>     their bug fixes.  Redhat is conservative about what they release
>     as a fix, so you want apply them all.  And apply these fixes
>     promptly!  RHN makes it easy.  (Consider buying one of their
>     Enterprise products, they have much longer life span during which
>     Redhat will supply updates.)
> 
>   - You do not have to understand everything that Redhat has done in
>     their configuration (this is because they have done a decent job),
>     but you *do* have to understand everything you do that deviates
>     from Redhat's configuration, or you *will* introduce security
>     holes.  This means you can start out not being a know-it-all, and
>     learn more as you get in deeper.  (But you should learn enough
>     right away to understand what I talk about here.)
> 
>   - Get another Linux computer, possibly a notebook, and use it as a
>     safer place to learn, a place which won't disrupt your business.
>     Keep it secure too.
> 
>   - Do not let the passwords for your server get in the hands of
>     hardware you don't control.  This means:
> 
>       - do not reuse passwords between your server and, say, random
>         websites on the internet (it is OK to write passwords down if
>         it makes it possible to not reuse passwords, just don't write
>         down in a stupid place, such as putting your ATM pin on your
>         ATM card);
> 
>       - use good passwords, this means make them long, which Linux
>         allows, try to have their components be things you didn't
>         choose (that way no one could guess what you would
>         choose--people are very bad at being random), what I do is
>         *randomly* choose three english language words, connect them
>         with hyphens, and use that (if you would like I can supply
>         more information on exactly how I do any why it is secure);
> 
>       - do not let your server passwords into hardware you don't
>         control (not at Kinkos, not at airport Kiosks, not over
>         unencrypted links such as telnet, unencrypted pop, etc.,
>         instead login at your server or through your own laptop, use
>         ssh, encrypted pop, etc.);
> 
>       - don't ssh into a computer you don't control and then ssh into
>         your server, that is like typing on a Kinkos keyboard).
> 
>   - If you think you have been broken into, assume the compromised
>     computer is out to get you and will report everything it can back
>     to the Bad Guys.  Get necessary pure data (not software!) backed
>     up on floppy or CD, get evidence of what happened if you can, then
>     rebuild from first principles.  Reformat, use original media,
>     apply all fixes, do fresh downloads of any extras you collected,
>     etc.
> 
>   - Do not operate as root except when you have to.  Fire up X as you,
>     and type the extra password when you do any adminstration.
> 
>   - Be leery of fancy things being done for you as a user.  Use the
>     simpler e-mail program over the fancy one with all the bells and
>     whistles.  Turn off features that smack of things being done for
>     you automatically, those features are more likely to be subverted.
>     Worry about Javascript in your web browser, it has been associated
>     with lots of bugs and security holes in the past, consider keeping
>     it turned off except when you need it for a trusted site that
>     requires it, then turn it off again.  Decide whether you really
>     need to install Flash or other web plugins.  Open Office is a cool
>     software suite, but it has a powerful macro feature, be worried
>     about what documents you hand it--where did they come from?, one
>     of these days there will be a macro virus or worm that uses that
>     avenue, be cautious and you could well avoid that bug, I plan to.
> 
>   - Do not strip your server down so far that you can't readily use it
>     anymore.  To do that well you will need to know more than a newbie
>     does, you will likely introduce more vulnerabilities than you
>     remove.
> 
>   - Do not depend on a firewall for security.  Firewalls are
>     complicated to set up because they require a significant
>     understanding of networking, and you could easily get it wrong.
>     Make your system secure without a firewall.  Only then add a
>     firewall, and only as an *extra* protection.
> 
>   - As you learn more, consider ways you might make Redhat's
>     installation more secure.  For example, probably use Postfix
>     (which was designed to be secure, and Redhat installs it for you)
>     instead of sendmail (which is old and groady), maybe install and
>     use Maradns (which was written to be secure) instead of bind
>     (which is also groady).
> 
>   - Do not blindly trust anyone, stop and think.  This includes not
>     trusting any advice I give you--stop and think about what I say,
>     check out my assertions of fact (such as whether Redhat's default
>     install is reasonably secure, whether their updates are
>     conservative, whether Postfix and Maradns have good security
>     reputations, etc.  www.google.com/linux is your friend).
> 
> Warning: some will disagree with what I write here.  Listen to them,
> see if what they say makes sense.  Think.
> 
> 
> 
> -kb, the Kent who is waiting for the fan to get dirty.
> 
> 
> P.S.  Non-security advice: Keep a log of everything you do to your
> server.  It will not only be useful as a reference, but it will slow
> you down in how you mangle your server by forcing you to take those
> notes.
> 
> 
> -- 
> redhat-list mailing list
> unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe
> https://www.redhat.com/mailman/listinfo/redhat-list
> 
> 



-- 
redhat-list mailing list
unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe
https://www.redhat.com/mailman/listinfo/redhat-list

[Index of Archives]     [CentOS]     [Kernel Development]     [PAM]     [Fedora Users]     [Red Hat Development]     [Big List of Linux Books]     [Linux Admin]     [Gimp]     [Asterisk PBX]     [Yosemite News]     [Red Hat Crash Utility]


  Powered by Linux