Search This Blog

Wednesday, December 10, 2014

How to Prepare Linux (Ubuntu) for Daily Activities

step 1
Create and Configure User Account
*suggest users to make complicated password at least 8 characters  
*enable shadow to avoid storing password in text mod
*do not use chsh command to modify /bin/false (it will prevent hacker to control system by default account for login)
*make sure that there is no account using ID nol and prevent login access remotely without password (configure file .rhost or /etc/host.equiv)

step 2
Secure Root Access
*login without root
*use root access for administration only
*edit /etc/security and add # in the beginning of rows
*disable telnet
*edit /etc/ssh/sshd_config to prevent SSH login
*set umask root to 077 (read, write, execute just for root) or 022 (for user)

step 3
Secure Physical Access
*open BIOS then create password
*set boot from harddisk only to prevent bootable disk

step 4
Disable or Turn Off Unnecessary Services
*use command ls -l/etc/rc.d/rc3.d/S* or -l/etc/rc.d/rc5.d/S* to view startup script
*use chkconfig to choose or disable service at startup
*exp : chkconfig -levels 2345 off
* edit /etc/xinetd or /etc/xinetd.conf then add # to disable service

step 5
Control Network Access
*edit /etc/hosts.allow to be ALL: LOCAL to allow local login
*edit /etc/hosts.deny to be ALL: to refuse remote connection
*add some ports to restrict or allow remote access
*use iptables to configure allowed some data packets
*check FTP service (disable or enable)

step 6
Configure Auditing and System Log
*check /etc/syslog.conf to control log files
*use freshmeat syslog-ng application
*use logwatch and swatch application

step 7
Configure File Security
*only root can access CRON
*root must be the owner of /etc/fstab, /etc/passwrd, /etc/group, /etc/shadow and ensure permission access to the files is 644 unless access to shadow should be 400

step 8
Prepare Damages Recovery 
*create boot disk for recovery after configuration or use Mkboodisk utility
*use tar command to backup (exp : tar -cvf )
*read this (http://www.tldp.org/howto/linux-complete-backup-and-recovery-howto)

step 9
Do System Maintenance
*join group to get information about patch or update

step 10
Preparing Linux to the Internet
*make sure the connection is secure before connecting to the internet

step 11
Installation
*select the required application during installation (exp : samba, mail, etc)

step 12
Firewall Software Installation and Configuration
*use firewall to filter network traffic (exp : netfilter for mandriva)

step 13
File /etc/hosts.deny and /etc/hosts.allow Configuration

step 14
Turn Off or Delete Unnecessary Services
*use chkconfig to reduce the consumption of cpu cycles

step 15
Secure The Necessary/Required Services 
*exp : configure ssh access (/etc/ssh/sshd_config)

step 16
Set Kernel Network Option  
*edit or configure /etc/syscti.conf (network information logs)

step 17
Connect PC to The Router
*use router to restrict or limit connection


step 18
Update

step 19
upgrade

step 20
Other Applications/Softwares
*use Batille-Linux to "strengthen" linux
*use Tripware to monitor system modifications

References
http://e-newsletters.internet.com/linuxtodaysecurity.html
http://freshmeat.net - http://freshmeat.net/projects/syslog-ng
http://swatch.sourceforge.net
http://www.cert.org
http://www.debian.org
http://www.ibiblio.org/pub/linux
http://www.lindows.com
http://www.linuxberg.com
http://www.linuxsecurity.com
http://www.redhat.com
http://www.sans.org
http://www.securityfocus.com
http://www2.logwatch.org:8080

"curiosity is motivation"
"letz share coz i only ask for information"

No comments:

Post a Comment

Related Posts Plugin for WordPress, Blogger...