Title: IT430 Information Assurance
1IT430 Information Assurance
- Lesson 9 Linux and Unix Security
2Some of the Security Ps
- People
- Passwords
- Permissions
- Patching
- Ports / Protocols
- Policies
3What is Unix / Linux
- Open Source Operating Systems
- Linux is loosely Based on Unix
- Easier to Learn on than Unix
- Used to be Totally Command Line based
- Now a Lot of Graphical Interfaces
4Why Study Unix Security
- DoD Command and Control
- High End Databases
- Super-Computers
- Primary Servers on Many Networks
- Senior Leaders do not Understand Unixforget Unix
Security!
5Typical Unix / Linux Directory Structure
(Root Directory)
adm
bin
dev
etc
usr
var
passwd
shadow
log
group
Standard programs and utilities (stands for
Binary)
Logins and Encrypted Passwords
List of Groups (for Group Permissions)
Standard Log Files
6Unix/ Linux File / Directory Permissions
- Three Permissions
- Read
- Write
- Execute
- Three Types of Access
- Owner
- Group
- Everyone
7Unix / Linux File Permissions
6
4
7
rwxrw-r--
1 1 1
1 1 0
1 0 0
Owner can Read, Write and Execute
Everyone can Read, but not Write nor Execute
Group can Read, Write but Not Execute
8Unix / Linux Flavors
- Unix
- HP
- SUN OS and Solaris
- AIX
- BSD
- Linux
- Red Hat (Licensed Version)
- Fedora (Free Version)
9Verify Directory Content
- Compare a Known Good Configuration
- Look for Hidden Files
10Patching
- Specific Versions for Each Unix / Linux Version
- No Central Location for Patches
- Much of the Process Can be Automated
- Verify all Machines Have Been Patched (Dont
Assume Automation Works 100)
11Minimize Unnecessary Services
- Lots of Unnecessary Services
- Know What You Need (and keep a list)
- When in Doubt Stop One Service at a Time and
See if You Break Something - Given a Choice Use Secure (Encrypted) Services
versus Clear Text
12Logging
- Understand Who Has Read/Write Permissions for
Logging - Understand How to Read the Logs
- Analyze the Logs!
- Assume the Bad Guy May Try to Change Logs to
Cover Tracks
13System Access / User Accounts
- Passwords
- Old Unix versions only Allow 8 Character
Passwords - 12-13 character password, non-dictionary words,
non-names recommended by NSA - Verify that no Additional UserID 0 Access
Exists (Other than Root)
14Unix Trusts
- Designed so that you dont have to authenticate
among systems - SAMBA file and print services sharing with
Windows
15References
- NSA Security Guides
- www.nsa.gov/snac
- DISA STIGs