<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Another Linux question in Operating System - Linux</title>
    <link>https://community.hpe.com/t5/operating-system-linux/another-linux-question/m-p/3712463#M21397</link>
    <description>All of the above answers are great.&lt;BR /&gt;&lt;BR /&gt;l would add SELinux for absolute best practices.</description>
    <pubDate>Thu, 19 Jan 2006 00:18:00 GMT</pubDate>
    <dc:creator>Al_56</dc:creator>
    <dc:date>2006-01-19T00:18:00Z</dc:date>
    <item>
      <title>Another Linux question</title>
      <link>https://community.hpe.com/t5/operating-system-linux/another-linux-question/m-p/3712459#M21393</link>
      <description>Thanks for the time and points will be assigned. &lt;BR /&gt;&lt;BR /&gt;Make security recommendation based on the following assumption. .... Combined web server and database server running Perl scripts in a production environment.</description>
      <pubDate>Wed, 18 Jan 2006 14:25:09 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/another-linux-question/m-p/3712459#M21393</guid>
      <dc:creator>Ragni Singh</dc:creator>
      <dc:date>2006-01-18T14:25:09Z</dc:date>
    </item>
    <item>
      <title>Re: Another Linux question</title>
      <link>https://community.hpe.com/t5/operating-system-linux/another-linux-question/m-p/3712460#M21394</link>
      <description>I think that first of all, you should separate your web server from the database server, specially if will be accessed from the Internet.&lt;BR /&gt;&lt;BR /&gt;Then, ensure that you are always up to date with web/perl software. Suscribe to security news.&lt;BR /&gt;&lt;BR /&gt;Use a strong firewall configuration. Ensure that the permissions for the files and folders are exactly what needed to run the application.&lt;BR /&gt;&lt;BR /&gt;Disable root access, enable SSH only and use AllowGroups ssh option to allow access to a limited number of persons.&lt;BR /&gt;&lt;BR /&gt;Do not install additional software if won't be used, like compilers, debuggers, samba, and other unused services.&lt;BR /&gt;&lt;BR /&gt;Configure tripwire. Enable logwatch and webalyzer.</description>
      <pubDate>Wed, 18 Jan 2006 15:06:17 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/another-linux-question/m-p/3712460#M21394</guid>
      <dc:creator>Ivan Ferreira</dc:creator>
      <dc:date>2006-01-18T15:06:17Z</dc:date>
    </item>
    <item>
      <title>Re: Another Linux question</title>
      <link>https://community.hpe.com/t5/operating-system-linux/another-linux-question/m-p/3712461#M21395</link>
      <description>Shalom Sanjit,&lt;BR /&gt;&lt;BR /&gt;Get Bastille, and run it on your server to lock down security. It requires perl and does a lot of the work for you.&lt;BR /&gt;&lt;BR /&gt;Don't use telnet or ftp. Use ssh/secure shell.&lt;BR /&gt;&lt;BR /&gt;You want a strong firewall between you and the public Internet.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Wed, 18 Jan 2006 16:50:44 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/another-linux-question/m-p/3712461#M21395</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2006-01-18T16:50:44Z</dc:date>
    </item>
    <item>
      <title>Re: Another Linux question</title>
      <link>https://community.hpe.com/t5/operating-system-linux/another-linux-question/m-p/3712462#M21396</link>
      <description>Basic rule of thumb:&lt;BR /&gt;&lt;BR /&gt;Block Everything.&lt;BR /&gt;&lt;BR /&gt;Then only let what you want in.&lt;BR /&gt;&lt;BR /&gt;That being said, if you're not going to be 100% in control of the content, make sure that everything is in jails.&lt;BR /&gt;&lt;BR /&gt;Run Apache in a CHRoot jail to ensure that it can't be bad if it gets eploited.&lt;BR /&gt;&lt;BR /&gt;If you're running CGI's, make sure you're using something like 'cgiwrapd' to run the CGI's as the owning users instead of root/apache.&lt;BR /&gt;&lt;BR /&gt;If you're running PHP, make sure it's running in safe mode (safe_mode = yes).&lt;BR /&gt;&lt;BR /&gt;Depending on what you're using the database server for (i.e. if it's only going to do web server data), make sure it only listens to the loop-back address, or via a Unix socket.&lt;BR /&gt;&lt;BR /&gt;some thoughts.. ;)</description>
      <pubDate>Wed, 18 Jan 2006 17:37:06 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/another-linux-question/m-p/3712462#M21396</guid>
      <dc:creator>Stuart Browne</dc:creator>
      <dc:date>2006-01-18T17:37:06Z</dc:date>
    </item>
    <item>
      <title>Re: Another Linux question</title>
      <link>https://community.hpe.com/t5/operating-system-linux/another-linux-question/m-p/3712463#M21397</link>
      <description>All of the above answers are great.&lt;BR /&gt;&lt;BR /&gt;l would add SELinux for absolute best practices.</description>
      <pubDate>Thu, 19 Jan 2006 00:18:00 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/another-linux-question/m-p/3712463#M21397</guid>
      <dc:creator>Al_56</dc:creator>
      <dc:date>2006-01-19T00:18:00Z</dc:date>
    </item>
    <item>
      <title>Re: Another Linux question</title>
      <link>https://community.hpe.com/t5/operating-system-linux/another-linux-question/m-p/3712464#M21398</link>
      <description>don't forget to run perl in 'tainted' mode.</description>
      <pubDate>Thu, 19 Jan 2006 03:09:34 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/another-linux-question/m-p/3712464#M21398</guid>
      <dc:creator>dirk dierickx</dc:creator>
      <dc:date>2006-01-19T03:09:34Z</dc:date>
    </item>
    <item>
      <title>Re: Another Linux question</title>
      <link>https://community.hpe.com/t5/operating-system-linux/another-linux-question/m-p/3712465#M21399</link>
      <description>When configuring your firewall, don't do what many people do and simply block inbound ports. Also block any *outbound* ports that you don't really need.&lt;BR /&gt;&lt;BR /&gt;If an attaker manages to access your system, a common progression for the cracker is to set up a call back system so that your server calls the cracker back providing a shell.&lt;BR /&gt;&lt;BR /&gt;If you block all unnecessary outbound ports, it makes it much harder for the cracker to do this.&lt;BR /&gt;&lt;BR /&gt;It doesn't prevent attacks, but it helps to minimise the vulnerabilities (talking from bitter experience!).&lt;BR /&gt;&lt;BR /&gt;Just my $0.02.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;&lt;BR /&gt;Andy Bruce</description>
      <pubDate>Thu, 19 Jan 2006 05:17:17 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/another-linux-question/m-p/3712465#M21399</guid>
      <dc:creator>Andrew Bruce</dc:creator>
      <dc:date>2006-01-19T05:17:17Z</dc:date>
    </item>
    <item>
      <title>Re: Another Linux question</title>
      <link>https://community.hpe.com/t5/operating-system-linux/another-linux-question/m-p/3712466#M21400</link>
      <description>Make sure the content is not writeable by&lt;BR /&gt;the user id apache is running as. &lt;BR /&gt;This is particularly important for the &lt;BR /&gt;perl code. &lt;BR /&gt;&lt;BR /&gt;As noted use taint mode for all perl.&lt;BR /&gt;&lt;BR /&gt;If the database is on the same server as&lt;BR /&gt;the web server, use sockets rather than IP&lt;BR /&gt;to connect if possible.&lt;BR /&gt;&lt;BR /&gt;Don't allow user input into dynamically&lt;BR /&gt;generated SQL.  Use bind parameters and&lt;BR /&gt;bind the user input to the query.&lt;BR /&gt;This should prevent SQL injection.&lt;BR /&gt;</description>
      <pubDate>Thu, 19 Jan 2006 17:48:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/another-linux-question/m-p/3712466#M21400</guid>
      <dc:creator>Bill Thorsteinson</dc:creator>
      <dc:date>2006-01-19T17:48:53Z</dc:date>
    </item>
  </channel>
</rss>

