Re: securing beyond the handbook

2006-05-10 Thread David Stanford

Jim,

I'm currently reading Mastering FreeBSD and OpenBSD Security, and thus far
it is proving to be a fantastic book covering many advanced security topics
specifically related to BSD. I suggested you order a copy from
Amazon<http://www.amazon.com/gp/product/0596006268/qid=1147325988/sr=1-1/ref=sr_1_1/102-5661269-0811354?s=books&v=glance&n=283155>;
it's well worth the time...

-David

On 5/10/06, Jim Stapleton <[EMAIL PROTECTED]> wrote:


Rephrase:

I have 5 static IPs
currently 1 is being used to "power" the NAT for all the machines
inside the network, the other 4 are empty.

I'm getting one of those 4 remaining, and having it point directly to
my BSD machine.



On 5/10/06, fbsd <[EMAIL PROTECTED]> wrote:
> There is no difference between a dynamic and static ip
> address from the point of the firewall.
>
> If you felt secure before, then getting a static ip
> address will have no effect on that.
>
> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] Behalf Of Jim
> Stapleton
> Sent: Wednesday, May 10, 2006 9:18 AM
> To: freebsd-questions@freebsd.org
> Subject: securing beyond the handbook
>
>
> I'm about to get a static IP and direct outside access for my BSD
> box
> (before it was hidden behind a firewall/NAT). I was comfortable with
> the level of security I've had, but with the whole "open to the
> outside world" setup I'll have, what would you suggest for securing
> it?
>
> I'll be running:
> Apache
> PHP
> MySQL
> SSH/SFTP
> OpenRPG (only occasionally, from a special nonpriv account)
>
> Any suggestions, any of these that you know are such huge security
> holes that you would absolutely demand something else be run?
>
> Any other security suggestions?
>
> Thanks,
> -Jim
> ___
> freebsd-questions@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-questions
> To unsubscribe, send any mail to
> "[EMAIL PROTECTED]"
>
>
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "
[EMAIL PROTECTED]"


___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: securing beyond the handbook

2006-05-10 Thread Jim Stapleton

Rephrase:

I have 5 static IPs
currently 1 is being used to "power" the NAT for all the machines
inside the network, the other 4 are empty.

I'm getting one of those 4 remaining, and having it point directly to
my BSD machine.



On 5/10/06, fbsd <[EMAIL PROTECTED]> wrote:

There is no difference between a dynamic and static ip
address from the point of the firewall.

If you felt secure before, then getting a static ip
address will have no effect on that.

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Jim
Stapleton
Sent: Wednesday, May 10, 2006 9:18 AM
To: freebsd-questions@freebsd.org
Subject: securing beyond the handbook


I'm about to get a static IP and direct outside access for my BSD
box
(before it was hidden behind a firewall/NAT). I was comfortable with
the level of security I've had, but with the whole "open to the
outside world" setup I'll have, what would you suggest for securing
it?

I'll be running:
Apache
PHP
MySQL
SSH/SFTP
OpenRPG (only occasionally, from a special nonpriv account)

Any suggestions, any of these that you know are such huge security
holes that you would absolutely demand something else be run?

Any other security suggestions?

Thanks,
-Jim
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to
"[EMAIL PROTECTED]"



___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


RE: securing beyond the handbook

2006-05-10 Thread fbsd
There is no difference between a dynamic and static ip
address from the point of the firewall.

If you felt secure before, then getting a static ip
address will have no effect on that.

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Jim
Stapleton
Sent: Wednesday, May 10, 2006 9:18 AM
To: freebsd-questions@freebsd.org
Subject: securing beyond the handbook


I'm about to get a static IP and direct outside access for my BSD
box
(before it was hidden behind a firewall/NAT). I was comfortable with
the level of security I've had, but with the whole "open to the
outside world" setup I'll have, what would you suggest for securing
it?

I'll be running:
Apache
PHP
MySQL
SSH/SFTP
OpenRPG (only occasionally, from a special nonpriv account)

Any suggestions, any of these that you know are such huge security
holes that you would absolutely demand something else be run?

Any other security suggestions?

Thanks,
-Jim
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to
"[EMAIL PROTECTED]"

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: securing beyond the handbook.

2006-05-10 Thread David Robillard

Date: Wed, 10 May 2006 09:17:30 -0400
From: "Jim Stapleton" <[EMAIL PROTECTED]>
Subject: securing beyond the handbook
To: freebsd-questions@freebsd.org
Message-ID:
<[EMAIL PROTECTED]>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed

I'm about to get a static IP and direct outside access for my BSD box
(before it was hidden behind a firewall/NAT). I was comfortable with
the level of security I've had, but with the whole "open to the
outside world" setup I'll have, what would you suggest for securing
it?

I'll be running:
Apache
PHP
MySQL
SSH/SFTP
OpenRPG (only occasionally, from a special nonpriv account)

Any suggestions, any of these that you know are such huge security
holes that you would absolutely demand something else be run?

Any other security suggestions?


Hi Jim,

I would strongly suggest running your internet accessible applications
from inside a jail. Check some man pages for jail information:
jail(8), jls(8) and jexec(8). The nice thing about jails is that once
everything is installed and running, you can strip it of any files
which is not used by your applications (such as compilers for
example). Therefore, if someone breaks in, he is limited in his
capabilites. Plus he does not gain your real root password (assuming
you are not using the same passwords in your jail of course ;)

Configure sshd(8) to allow only a certain set of trusted users via
AllowUsers configuration. Prohibit direct root login via
"PermitRootLogin no" and consider using public keys with a strong
passphrase instead of a simple password for login. If you have a
Kerberos server, use it.

Next, check your network architecture. Give your jail the public IP or
NAT it in your firewall to a DMZ section of your network. Make sure
your internet accessible applications are not inside your LAN. Be
certain to never let internet connections have direct access to
machines inside the LAN.

Also, consider running host intrusion detection. Such as Osiris,
Samhain or Tripwire. You can find them all in the FreeBSD ports.
Talking of ports, make sure you install security/portaudit to keep
track of you port's security.

Subscribe to the FreeBSD security mailing list and take action when an
advisory is sent.

Use mod_security with your Apache server. http://www.modsecurity.org/ 
Actually, remove all unused Apache module from your httpd.conf(5).


Run your MySQL database on another host (or another jail) which is in
a seperate Database DMZ which can only be accessed by certain well
defined hosts.

Use tcp_wrappers to secure you connections. Use sudo(8) instead of root.

Finally, check out some really good books on various security related issues:

Mastering FreeBSD and OpenBSD security from O'Reilly.
Apache Security from O'Reilly.
Essential PHP Security from O'Reilly.
Host Integrity Monitoring using Osiris and Samhain from Syngress.
FreeBSD security & hardening guide: http://www.syslog.org/Content-5-4.phtml

Oh, and don't forget to backup regularly. It's also part of your security.

Have fun!

David


Thanks,
-Jim


--
David Robillard
UNIX systems administrator, CISSP
Montréal: +1 514 966 0122
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


securing beyond the handbook

2006-05-10 Thread Jim Stapleton

I'm about to get a static IP and direct outside access for my BSD box
(before it was hidden behind a firewall/NAT). I was comfortable with
the level of security I've had, but with the whole "open to the
outside world" setup I'll have, what would you suggest for securing
it?

I'll be running:
Apache
PHP
MySQL
SSH/SFTP
OpenRPG (only occasionally, from a special nonpriv account)

Any suggestions, any of these that you know are such huge security
holes that you would absolutely demand something else be run?

Any other security suggestions?

Thanks,
-Jim
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"