- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - Linux
- >
- Re: Another Linux question
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-18-2006 06:25 AM
01-18-2006 06:25 AM
Make security recommendation based on the following assumption. .... Combined web server and database server running Perl scripts in a production environment.
Solved! Go to Solution.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-18-2006 07:06 AM
01-18-2006 07:06 AM
SolutionThen, ensure that you are always up to date with web/perl software. Suscribe to security news.
Use a strong firewall configuration. Ensure that the permissions for the files and folders are exactly what needed to run the application.
Disable root access, enable SSH only and use AllowGroups ssh option to allow access to a limited number of persons.
Do not install additional software if won't be used, like compilers, debuggers, samba, and other unused services.
Configure tripwire. Enable logwatch and webalyzer.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-18-2006 08:50 AM
01-18-2006 08:50 AM
Re: Another Linux question
Get Bastille, and run it on your server to lock down security. It requires perl and does a lot of the work for you.
Don't use telnet or ftp. Use ssh/secure shell.
You want a strong firewall between you and the public Internet.
SEP
Owner of ISN Corporation
http://isnamerica.com
http://hpuxconsulting.com
Sponsor: http://hpux.ws
Twitter: http://twitter.com/hpuxlinux
Founder http://newdatacloud.com
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-18-2006 09:37 AM
01-18-2006 09:37 AM
Re: Another Linux question
Block Everything.
Then only let what you want in.
That being said, if you're not going to be 100% in control of the content, make sure that everything is in jails.
Run Apache in a CHRoot jail to ensure that it can't be bad if it gets eploited.
If you're running CGI's, make sure you're using something like 'cgiwrapd' to run the CGI's as the owning users instead of root/apache.
If you're running PHP, make sure it's running in safe mode (safe_mode = yes).
Depending on what you're using the database server for (i.e. if it's only going to do web server data), make sure it only listens to the loop-back address, or via a Unix socket.
some thoughts.. ;)
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-18-2006 04:18 PM
01-18-2006 04:18 PM
Re: Another Linux question
l would add SELinux for absolute best practices.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-18-2006 07:09 PM
01-18-2006 07:09 PM
Re: Another Linux question
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-18-2006 09:17 PM
01-18-2006 09:17 PM
Re: Another Linux question
If an attaker manages to access your system, a common progression for the cracker is to set up a call back system so that your server calls the cracker back providing a shell.
If you block all unnecessary outbound ports, it makes it much harder for the cracker to do this.
It doesn't prevent attacks, but it helps to minimise the vulnerabilities (talking from bitter experience!).
Just my $0.02.
Regards,
Andy Bruce
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-19-2006 09:48 AM
01-19-2006 09:48 AM
Re: Another Linux question
the user id apache is running as.
This is particularly important for the
perl code.
As noted use taint mode for all perl.
If the database is on the same server as
the web server, use sockets rather than IP
to connect if possible.
Don't allow user input into dynamically
generated SQL. Use bind parameters and
bind the user input to the query.
This should prevent SQL injection.