Thank you for your detailed reply, I especially like #4!  No worries, I
had no plans to chmod /etc...

The kids are 14 to 19years-- and I try not to underestimate them-- I'm
practically still a kid myself, and I know <b>many</b> personally at other
schools that have gained priveleges that they shouldn't have; for every
ten kids that makes a wannabe threat there's usually a quiet 11th that can
actually do it :-)

The open open office perusal of files outside their home dir still scares
me though...  I really am a paranoid, controlling person.  Maybe Freud was
right...

[EMAIL PROTECTED] writes:
>> Does anyone out there have some advice they could share with me on
>> security?  My first real exposure to linux was this summer when we
>decided
>> to go all out and run all our school's dorm computers as LTSP
>stations... 
>> 
>> Specifically my concern is this:  On all our the PCs (yes, I'm paranoid,
>> and yes it's been justified many times over :) in our system i have used
>> registry hacks to hide the C: drive, disable command prompts, etc...
>This
>> year especially we have actually had THREATS from students to try and
>hack
>> our servers.  The gall!  
>...
>I guess maybe what I'm asking is what can I chmod 770 (?) to lock it down;
>the less they can read of my config files the better... I don't want to do
>something however like chmod 770 /etc and then have my system not startup!
>...
>
>*** Well first off don't blanket chmod 770 anything unless you know
>exactly what you're doing (which files will be affected). Chmod 770 /etc
>will break your system instantly (files like passwd, group, and a whole
>bunch more need to be readable by everyone). So I would forget about the
>chmod thing on /etc.  Security is an ongoing thing and a system is only as
>secure as the system admin makes it. So it's a good idea to start reading
>up on security. Also it's a good thing to join a couple of security
>mailing lists so that you are informed of the latest vulnerability that
>needs to be fixed. How old are the kids? I find 'threats' of hacking and
>kids who call themselves hackers are nothing more than script kiddies or
>wannabees - there's only a rare few that truly would understand. Windows
>is insecure by default and if that's all the kids were exposed to in the
>past then they will find Linux more difficult to mess with. AnyWays here's
>a couple of suggestions. I would research them thoroughly:
>
>- TripWire (or similiar). Lets you know which files on the system have
>been changed.
>
>- chkrootkit. Run this program periodically to see if your system has been
>compromised.
>
>- Mark /home, /tmp partition "noexec"...If you have a /var/tmp directory
>then I would symbolic link /var/tmp to /home/var_tmp. "noxec" can be
>by-passed but you have to know how.
>
>- Recompile your kernel with BSD STYLE ACCOUNTING enabled. This will
>record every command/executable a user runs. You can query the entire
>database for particular commands or query all commands by a user - Very
>useful.
>
>
>
>
>



________________________________________
David M. Leuser, II
Assistant Network Administrator
New Hampton School
(603) 744-3182 x121
[EMAIL PROTECTED]
________________________________________
"Picture the root account as a magic hat that gives you lots of power,
with which you can, by waving your hands, create or destroy entire cities.
Because it is easy to wave your hands in a destructive manner, it is not a
good idea to wear the magic hat when it is not needed, despite the
wonderful feeling. " -- Gnome User's Guide



-------------------------------------------------------
This sf.net email is sponsored by:ThinkGeek
Welcome to geek heaven.
http://thinkgeek.com/sf
_____________________________________________________________________
Ltsp-discuss mailing list.   To un-subscribe, or change prefs, goto:
      https://lists.sourceforge.net/lists/listinfo/ltsp-discuss
For additional LTSP help,   try #ltsp channel on irc.openprojects.net

Reply via email to