Re: [CentOS] Hardening

2009-12-29 Thread Fernando Hallberg
Hi,

I get the fedora srpm, installed, apply modify for centos and recompiled, for 
rkhunter, sectool.

ipset and ipset kmod i've made by hand to use ipset function with iptables, 
blocking dinamical blacklists with fail2ban and shorewall.

Att
fernando
On Tue, 29 Dec 2009 01:09:21 -0800
John R Pierce pie...@hogranch.com wrote:

 Agile Aspect wrote:
  Note, I couldn't find any source RPMs in svn.
 
  And I hasten to add, I would never delegate the task of building
  security software for my system to another person.

 
 so you compile your whole system from scratch, after audting all the code?
 
 how do you ever get anything done?
 
 
 
 
 ___
 CentOS mailing list
 CentOS@centos.org
 http://lists.centos.org/mailman/listinfo/centos


-- 
Fernando Hallberg ferna...@flexdigital.com.br
Flex Digital Soluções em Redes de Dados
http://www.flexdigital.com.br
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] Hardening

2009-12-29 Thread Fernando Hallberg
Agile,

http://flexbox.sf.net/centos/5/SRPMS

You can generate packet by specfile.

Att
Fernando

On Mon, 28 Dec 2009 18:45:29 -0800
Agile Aspect agile.asp...@gmail.com wrote:

 On Mon, Dec 28, 2009 at 4:44 PM, Fernando Hallberg
 ferna...@flexdigital.com.br wrote:
  Hi,
 
  Test my repositoriy http://flexbox.sf.net/
 
  I'm personalized sectool from fedora to centos, rkhunter, unhid, 
  chkrootkit, and more...
 
  And contribute ! Source RPMS and spec files are in the repository and svn.
 
 
 Note, I couldn't find any source RPMs in svn.
 
 And I hasten to add, I would never delegate the task of building
 security software for my system to another person.
 
 -- 
   Enjoy global warming while it lasts.
 ___
 CentOS mailing list
 CentOS@centos.org
 http://lists.centos.org/mailman/listinfo/centos


-- 
Fernando Hallberg ferna...@flexdigital.com.br
Flex Digital Soluções em Redes de Dados
http://www.flexdigital.com.br
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] Hardening

2009-12-28 Thread Fernando Hallberg
Hi,

Test my repositoriy http://flexbox.sf.net/

I'm personalized sectool from fedora to centos, rkhunter, unhid, chkrootkit, 
and more...

And contribute ! Source RPMS and spec files are in the repository and svn.

Sorry for my english.

Att
On Mon, 28 Dec 2009 11:53:27 -0800
ML mailingli...@mailnewsrss.com wrote:

 Hi Guys,
 
 I would like advice for best practices to secure my linux boxes. Know if I 
 have been hacked, know of security breaches, etc.
 
 Can anyone provide advice?
 
 -Jason
 ___
 CentOS mailing list
 CentOS@centos.org
 http://lists.centos.org/mailman/listinfo/centos


-- 
Fernando Hallberg ferna...@flexdigital.com.br
Flex Digital Soluções em Redes de Dados
http://www.flexdigital.com.br
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] NFS problem

2009-12-28 Thread Fernando Hallberg
Hi,

You only need rpcidmapd, portmap on the centos box

Edit the /etc/sysconfig/nfs

And use /export filesystem as the fsid=0 on the /etc/exportfs

Export all directories you need mounted on the /export with the -o bind on the 
mount command, and add refer=/dir on /etc/exportfs on the nfs4 server

you want to add the rpc and nfs mounts on the fstab too
rpc_pipefs  /var/lib/nfs/rpc_pipefs rpc_pipefs  defaults0   0
nfsd/proc/fs/nfsd   nfsddefaults0   0

Fernando

On Mon, 28 Dec 2009 16:59:30 -0600
Frank Cox thea...@sasktel.net wrote:

 
 On Mon, 2009-12-28 at 23:30 +0100, Timothy Murphy wrote:
  I'm trying to NFS-mount a CentOS directory on my Fedora laptop,
  but I find I can only do this is I turn off the firewall
  on the CentOS server.
  
  If instead I go to system-config-securitylevel-tui on the server,
  and allow NFS4, this does not do the trick.
  Nor does allowing port 2049.
  
  What do I need to allow?
 
 Here is my note regarding how to make this work:
 
 Create the file /etc/sysconfig/nfs and add the following contents:
 
 STATD_PORT=4001
 LOCKD_TCPPORT=4002
 LOCKD_UDPPORT=4002
 MOUNTD_PORT=4003
 
  Append the following to the file /etc/services:
 
 rquotad 4004/tcp # rpc.rquotad tcp port
 rquotad 4004/udp # rpc.rquotad udp port
 
  Restart the nfs services
 
 From there, open these ports - 111:tcp, 111:udp, 2049:tcp, 2049:udp,
 4001:tcp, 4001:udp, 4002:tcp, 4002:udp, 4003:tcp, 4003:udp, 4004:tcp,
 4004:udp
 
 
 -- 
 MELVILLE THEATRE ~ Melville Sask ~ http://www.melvilletheatre.com
 
 ___
 CentOS mailing list
 CentOS@centos.org
 http://lists.centos.org/mailman/listinfo/centos


-- 
Fernando Hallberg ferna...@flexdigital.com.br
Flex Digital Soluções em Redes de Dados
http://www.flexdigital.com.br
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] questions relate to sar

2009-12-25 Thread Fernando Hallberg

chkconfig sysstat on
service sysstat start



On Fri, 25 Dec 2009 07:48:21 -0800
John R Pierce pie...@hogranch.com wrote:

 mcclnx mcc wrote:
  We have CENTOS 5.3 on DELL server.  I tried to use sar -b or sar -u and 
  it only show report starting on 12:00 A.M.
 
  my questions are:
 
  1. for sar -u or sar -b how can I generate two or three days ago report?
 
  2. how to generate daily report from sa2  peocess?

 
 I suggest reading the man pages on sar, and associated functions.
 
 sar -f /var/log/sa/sa22 would process the data for the 22nd, see what
 files you have available in /var/log/sa/ ... my system seems to be
 keeping 18 days worth.
 
 sa2 is used to create the daily reporrt files described above. If you
 want to create a daily report in a specific format, you'll probably want
 to write your own script that you invoke from crontab
 ___
 CentOS mailing list
 CentOS@centos.org
 http://lists.centos.org/mailman/listinfo/centos


-- 
Fernando Hallberg ferna...@flexdigital.com.br
Flex Digital Soluções em Redes de Dados
http://www.flexdigital.com.br
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] attack

2009-12-24 Thread Fernando Hallberg
Hi,

I'm have a repo with many security tools.. if you can test... i'm upload a few 
packages from fedora, other sources, and created by me..

http://flexbox.sourceforge.net/centos/5/i386/flexbox-release-1-1.noarch.rpm

Try to install sectool, and verify your system..

You can try to use fail2ban for list maillog, and blacklists ips...

I'm using fail2ban+shorewall+ipset

Fernando.

On Thu, 24 Dec 2009 14:48:30 +
Manu Verhaegen mav...@telenet.be wrote:

 Hi,
 
 i ame checking this
 
 thanks,
   Manu
 
 
 -Oorspronkelijk bericht-
 Van: centos-boun...@centos.org [mailto:centos-boun...@centos.org] Namens Kai 
 Schaetzl
 Verzonden: donderdag 24 december 2009 15:32
 Aan: centos@centos.org
 Onderwerp: Re: [CentOS] attack
 
 Obviously, if you are running several vhosts and plesk you likely have 
 other logs to check. Also, one can usually see the origin of the mail 
 injection in the maillog (e.g. complaints about setting to an unsafe 
 sender) or in the outgoing messages. At runtime you can see the connects 
 with full URLs on the apache status page.
 
 Kai
 
 -- 
 Kai Schätzl, Berlin, Germany
 Get your web at Conactive Internet Services: http://www.conactive.com
 
 
 
 ___
 CentOS mailing list
 CentOS@centos.org
 http://lists.centos.org/mailman/listinfo/centos
 
 
 
 ___
 CentOS mailing list
 CentOS@centos.org
 http://lists.centos.org/mailman/listinfo/centos


-- 
Fernando Hallberg ferna...@flexdigital.com.br
Flex Digital Soluções em Redes de Dados
http://www.flexdigital.com.br
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos