Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 11 Mar 96 07:00:17 -0800
From:      Cy Schubert - BCSC Open Systems Group <cschuber@uumail.gov.bc.ca>
To:        sreid@edmbbs.iceonline.com
Cc:        security@FreeBSD.ORG
Subject:   Re: How secure is FreeBSD 2.1 right after install? 
Message-ID:  <199603111500.HAA03943@passer.osg.gov.bc.ca>
In-Reply-To: Your message of "Sun, 10 Mar 96 17:04:26 EST." <9603101704.D6300AZ@edmbbs.iceonline.com> 

next in thread | previous in thread | raw e-mail | index | archive | help
> 
> Is there anything I need to do to secure my system after a fresh install
> >from the Walnut Creek CD?
> 
> I've already disabled the r*, finger and telnet services in inetd.conf.
> I don't expect I'll need them. Is there anything else I need to worry
> about?
> 
> Our local ethernet will start with two FreeBSD machines and a Cisco
> router, connected to the internet. One of the FreeBSD machines will be a
> web server (probably running Apache) and the other will be for web page
> development under X Windows.
> 
> I'm concerned that X might be a potential security hole, since it uses
> TCP port 6000 to accept connections from clients... Can I close off
> remote access to the X server without having to install a firewall? I
> won't need to access the X server from the LAN. Can X be set to ignore
> the TCP port?
> 
> I'm interested in anything that might be a security problem.
> 

Here are some basic steps I would start with:

1.  Install TCP/Wrapper and block all of your TCP services run out of inetd.

2.  Recompile the kernel to make use of the IP Firewall code, then block
    TCP ports 7, 9, 13, 19, 37, 53, 67, 88, 111, 161, 162, 177, 512, 513, 514,
    520, 2049, 1, 11, 15, 43, 95, 123, 144, 515, 651, 2000, 6000-6100, ypserv
    yppasswdd, ypbind, mountd, and nfs.  I would also block UDP ports 7, 9,
    13, 19, 37, 53, 67, 88, 111, 161, 162, 177, 512, 513, 514, 520, 2049,
    ypserv, yppasswd, ypbind, mountd, nfs, and port 1023.

    You could also block TCP services run out of inetd as well, however
    TCP/Wrapper does a better job of reporting and does some "PARANOID"
    checks against the DNS that filtering will not do.  If you're really
    paranoid you could block those ports.

    On the other hand you would probably be better off blocking these ports
    at your router.  If you're really paranoid you could do both.  Many of
    the commercial firewalls consist of two routers and a bastion host
    (firewall machine).

    If you allow dial-in connections much of this may be of no use since many
    hackers also phreak telephone lines.

3.  Install Tripwire.

4.  Run CRACK and COPS or Tiger on a weekly basis.

5.  Route all auth.* messages to another machine and report on all anomolies.

6.  Replace Sendmail 8.6.12 with Sendmail 8.7.4 and install smrsh.

7.  If you don't expect to receive mail from the Internet on your FreeBSD
    boxes run Sendmail out of inetd and cron, then wrap it with TCP/Wrapper.
    If you don't need to receive mail at all don't even run sendmail out of
    inetd, just let sendmail queue messages from cron.

This is what comres to mind at the moment.  There's a lot more you could do
if you want to spend the time at it.


Regards,                       Phone:  (604)389-3827
Cy Schubert                    OV/VM:  BCSC02(CSCHUBER)
Open Systems Support          BITNET:  CSCHUBER@BCSC02.BITNET
BC Systems Corp.            Internet:  cschuber@uumail.gov.bc.ca
                                       cschuber@bcsc02.gov.bc.ca

		"Quit spooling around, JES do it."




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199603111500.HAA03943>