<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://aznot.com/index.php?action=history&amp;feed=atom&amp;title=Linux%2FSecurity</id>
	<title>Linux/Security - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://aznot.com/index.php?action=history&amp;feed=atom&amp;title=Linux%2FSecurity"/>
	<link rel="alternate" type="text/html" href="https://aznot.com/index.php?title=Linux/Security&amp;action=history"/>
	<updated>2026-05-08T16:34:05Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.41.0</generator>
	<entry>
		<id>https://aznot.com/index.php?title=Linux/Security&amp;diff=3465&amp;oldid=prev</id>
		<title>Kenneth: /* Minimal Install - Anaconda Kickstart */</title>
		<link rel="alternate" type="text/html" href="https://aznot.com/index.php?title=Linux/Security&amp;diff=3465&amp;oldid=prev"/>
		<updated>2016-06-04T07:39:05Z</updated>

		<summary type="html">&lt;p&gt;&lt;span dir=&quot;auto&quot;&gt;&lt;span class=&quot;autocomment&quot;&gt;Minimal Install - Anaconda Kickstart&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==Summary==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Minimal Secure Install==&lt;br /&gt;
Install CentOS 5 (minimal install):&lt;br /&gt;
 # boot to CD 1&lt;br /&gt;
 linux text&lt;br /&gt;
 # do minimal install (deselect ALL package options)&lt;br /&gt;
&lt;br /&gt;
Disable SELinux&lt;br /&gt;
 # DISABLE SELINUX - not as secure, but much easier to work with&lt;br /&gt;
 system-config-securitylevel-tui&lt;br /&gt;
 reboot&lt;br /&gt;
&lt;br /&gt;
Remove Extra Packages:&lt;br /&gt;
 # Packages with no dependencies...&lt;br /&gt;
 yum -y remove Deployment_Guide-en-US autofs conman finger gpm nfs-utils nfs-utils* pcmciautils xorg*&lt;br /&gt;
 # ADDITIONAL: cpuspeed&lt;br /&gt;
 # Packages with dependencies...&lt;br /&gt;
 yum -y remove atk bluez-* cairo ccid cups* desktop-file-utils libX11&lt;br /&gt;
 # ADDITIONAL:  fontconfig freetype portmap&lt;br /&gt;
 # This remove the following depenencies:&lt;br /&gt;
 #   GConf2 coolkey gtk2 htmlview libXcursor libXext libXfixes libXft libXi libXinerama libXrandr&lt;br /&gt;
 #   libXrender libXres libXt libXxf86vm libnotify libwnck mesa-libGL notification-daemon pango&lt;br /&gt;
 #   paps pinfo redhat-lsb redhat-menus startup-notification yp-tools ypbind&lt;br /&gt;
&lt;br /&gt;
 # DISABLE EXTRA SERVICES&lt;br /&gt;
 # No longer needed as removal of packages takes care of most of these&lt;br /&gt;
 # for service in apmd autofs bluetooth cpuspeed cups gpm netfs nfslock portmap rpcgssd rpcidmapd ; do chkconfig $service off ; done&lt;br /&gt;
 # except for apmd cpuspeed&lt;br /&gt;
&lt;br /&gt;
 # SETUP NTPD&lt;br /&gt;
 # Use time-a.nist.gov instead of time.nist.gov&lt;br /&gt;
 yum -y install ntp ; ntpdate -t 10 time-a.nist.gov ; hwclock -w ; chkconfig ntpd on ; service ntpd start&lt;br /&gt;
&lt;br /&gt;
 # SETUP ALIASES&lt;br /&gt;
 echo -e &amp;quot;root:\t\tkenneth@oeey.com&amp;quot; &amp;gt;&amp;gt; /etc/aliases&lt;br /&gt;
 newaliases&lt;br /&gt;
&lt;br /&gt;
 # DISABLE ROOT SSH LOGIN&lt;br /&gt;
 adduser kenneth&lt;br /&gt;
 passwd kenneth&lt;br /&gt;
 visudo&lt;br /&gt;
   # %wheel        ALL=(ALL)       ALL&lt;br /&gt;
   %wheel        ALL=(ALL)       ALL&lt;br /&gt;
 vi /etc/group&lt;br /&gt;
   wheel:x:10:root,kenneth&lt;br /&gt;
 vi /etc/ssh/sshd_config&lt;br /&gt;
   #PermitRootLogin yes&lt;br /&gt;
   PermitRootLogin no&lt;br /&gt;
 service sshd restart&lt;br /&gt;
&lt;br /&gt;
 # To Configure firewall&lt;br /&gt;
 system-config-securitylevel-tui&lt;br /&gt;
&lt;br /&gt;
 # DO SYSTEM UPDATE AND REBOOT&lt;br /&gt;
 yum -y update ; reboot&lt;br /&gt;
&lt;br /&gt;
==Security Tools==&lt;br /&gt;
*[http://sectools.org/tools2003.html Top 75 Security Tools]&lt;br /&gt;
*[http://sectools.org/tools2000.html Top 50 Security Tools]&lt;br /&gt;
*[http://sectools.org/ Top 100 Network Security Tools]&lt;br /&gt;
&lt;br /&gt;
==Ports==&lt;br /&gt;
Linux TCP Ports:&lt;br /&gt;
 TCP   22	SSH (sshd)&lt;br /&gt;
 TCP   25	SMTP (sendmail/postfix)&lt;br /&gt;
 TCP   80	HTTP (httpd)&lt;br /&gt;
 TCP  110	POP3 (courier/dovcot)&lt;br /&gt;
 TCP  143	IMAP (courier)&lt;br /&gt;
 TCP  389	LDAP&lt;br /&gt;
 TCP  443	HTTPS (httpd)&lt;br /&gt;
 TCP  465	SMTPS (stunnel-&amp;gt;sendmail)&lt;br /&gt;
 TCP  636	LDAP/SSL (stunnel-&amp;gt;LDAP)&lt;br /&gt;
 TCP  993	IMAPS (stunnel-&amp;gt;courier)&lt;br /&gt;
 TCP  995	POP3S (stunnel-&amp;gt;courier)&lt;br /&gt;
&lt;br /&gt;
Linux UDP Ports:&lt;br /&gt;
 UDP   53	DNS (named)&lt;br /&gt;
 UDP  123	NTP (ntpd)&lt;br /&gt;
&lt;br /&gt;
Windows Ports:&lt;br /&gt;
 TCP 3389	Remote Desktop (Windows)&lt;br /&gt;
&lt;br /&gt;
==Minimal Install - Anaconda Kickstart==&lt;br /&gt;
anaconda-ks.cfg:&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&lt;br /&gt;
# Kickstart file automatically generated by anaconda.&lt;br /&gt;
&lt;br /&gt;
install&lt;br /&gt;
cdrom&lt;br /&gt;
lang en_US.UTF-8&lt;br /&gt;
keyboard us&lt;br /&gt;
network --device eth0 --bootproto static --ip 10.0.0.41 --netmask 255.255.255.0 --gateway 10.0.0.1 --nameserver 10.0.0.1 --hostname gatekeeper.oeey.com&lt;br /&gt;
network --device eth1 --bootproto dhcp --hostname gatekeeper.oeey.com&lt;br /&gt;
rootpw --iscrypted $1$Np12nOAS$Nkxxxxxx7i.&lt;br /&gt;
firewall --enabled --port=22:tcp&lt;br /&gt;
authconfig --enableshadow --enablemd5&lt;br /&gt;
selinux --enforcing&lt;br /&gt;
timezone --utc America/Boise&lt;br /&gt;
bootloader --location=mbr --driveorder=sda&lt;br /&gt;
# The following is the partition information you requested&lt;br /&gt;
# Note that any partitions you deleted are not expressed&lt;br /&gt;
# here so unless you clear all partitions first, this is&lt;br /&gt;
# not guaranteed to work&lt;br /&gt;
#clearpart --all --drives=sda&lt;br /&gt;
#part /boot --fstype ext3 --size=101 --asprimary&lt;br /&gt;
#part swap --size=3968 --asprimary&lt;br /&gt;
#part / --fstype ext3 --size=1 --grow --asprimary&lt;br /&gt;
&lt;br /&gt;
%packages&lt;br /&gt;
@base&lt;br /&gt;
@core&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Remove Extra Services==&lt;br /&gt;
#Block ping requests:&lt;br /&gt;
#*enable firewall&lt;br /&gt;
#*$IPTABLES -A INPUT -p ICMP –icmp-type timestamp-request -i $EXTIFACE -j DROP&lt;br /&gt;
#Secure SSH:&lt;br /&gt;
#*vi /etc/ssh/sshd_config&lt;br /&gt;
#*Protocol 2&lt;br /&gt;
#*ListenAddress 0.0.0.0&lt;br /&gt;
#*PermitRootLogin no&lt;br /&gt;
#Disable extra services:&lt;br /&gt;
#*netfs&lt;br /&gt;
#*nfslock&lt;br /&gt;
#*portmap&lt;br /&gt;
#*rpcgssd&lt;br /&gt;
#*rpcidmapd&lt;br /&gt;
#*acpid (Power Management Related)&lt;br /&gt;
#*apmd (Power Management Related)&lt;br /&gt;
#*cups&lt;br /&gt;
#*isdn (Only used if you have an ISDN card in the machine)&lt;br /&gt;
#*pcmcia (Most likely you either don’t have or will not use a pcmcia device in the machine)&lt;br /&gt;
#*bluetooth&lt;br /&gt;
#*autofs&lt;br /&gt;
#*xfs&lt;br /&gt;
#*gpm&lt;br /&gt;
&lt;br /&gt;
 for service in netfs nfslock portmap rpcgssd rpcidmapd acpid apmd cups isdn pcmcia bluetooth autofs xfs gpm ; do chkconfig $service off ; done&lt;br /&gt;
&lt;br /&gt;
Current list of enabled services:&lt;br /&gt;
 [kenneth@dev ~]$ sudo /sbin/chkconfig --list | grep 3:on&lt;br /&gt;
 acpid           0:off   1:off   2:off   3:on    4:on    5:on    6:off&lt;br /&gt;
 anacron         0:off   1:off   2:on    3:on    4:on    5:on    6:off&lt;br /&gt;
 apmd            0:off   1:off   2:on    3:on    4:on    5:on    6:off&lt;br /&gt;
 atd             0:off   1:off   2:off   3:on    4:on    5:on    6:off&lt;br /&gt;
 autofs          0:off   1:off   2:off   3:on    4:on    5:on    6:off&lt;br /&gt;
 cpuspeed        0:off   1:on    2:on    3:on    4:on    5:on    6:off&lt;br /&gt;
 crond           0:off   1:off   2:on    3:on    4:on    5:on    6:off&lt;br /&gt;
 firstboot       0:off   1:off   2:off   3:on    4:off   5:on    6:off&lt;br /&gt;
 gpm             0:off   1:off   2:on    3:on    4:on    5:on    6:off&lt;br /&gt;
 haldaemon       0:off   1:off   2:off   3:on    4:on    5:on    6:off&lt;br /&gt;
 hidd            0:off   1:off   2:on    3:on    4:on    5:on    6:off&lt;br /&gt;
 ip6tables       0:off   1:off   2:on    3:on    4:on    5:on    6:off&lt;br /&gt;
 iptables        0:off   1:off   2:on    3:on    4:on    5:on    6:off&lt;br /&gt;
 irqbalance      0:off   1:off   2:on    3:on    4:on    5:on    6:off&lt;br /&gt;
 jexec           0:on    1:on    2:on    3:on    4:on    5:on    6:on&lt;br /&gt;
 kudzu           0:off   1:off   2:off   3:on    4:on    5:on    6:off&lt;br /&gt;
 mcstrans        0:off   1:off   2:on    3:on    4:on    5:on    6:off&lt;br /&gt;
 mdmonitor       0:off   1:off   2:on    3:on    4:on    5:on    6:off&lt;br /&gt;
 messagebus      0:off   1:off   2:off   3:on    4:on    5:on    6:off&lt;br /&gt;
 mysqld          0:off   1:off   2:on    3:on    4:on    5:on    6:off&lt;br /&gt;
 network         0:off   1:off   2:on    3:on    4:on    5:on    6:off&lt;br /&gt;
 ntpd            0:off   1:off   2:on    3:on    4:on    5:on    6:off&lt;br /&gt;
 pcscd           0:off   1:off   2:on    3:on    4:on    5:on    6:off&lt;br /&gt;
 readahead_early 0:off   1:off   2:on    3:on    4:on    5:on    6:off&lt;br /&gt;
 restorecond     0:off   1:off   2:on    3:on    4:on    5:on    6:off&lt;br /&gt;
 sendmail        0:off   1:off   2:on    3:on    4:on    5:on    6:off&lt;br /&gt;
 smartd          0:off   1:off   2:on    3:on    4:on    5:on    6:off&lt;br /&gt;
 sshd            0:off   1:off   2:on    3:on    4:on    5:on    6:off&lt;br /&gt;
 syslog          0:off   1:off   2:on    3:on    4:on    5:on    6:off&lt;br /&gt;
 yum-updatesd    0:off   1:off   2:off   3:on    4:on    5:on    6:off&lt;br /&gt;
&lt;br /&gt;
 getent protocols 50&lt;br /&gt;
 # find which service has been allocated the port 5353 (in UDP) by IANA.&lt;br /&gt;
 getent services 5353&lt;br /&gt;
&lt;br /&gt;
Additional items to remove: [http://www.hornfordassociates.com/resources/how-to-library/centos-set-up.html]&lt;br /&gt;
 yum remove Deployment_Guide-en-US&lt;br /&gt;
 yum remove finger gaim cups-libs cups bluez-libs desktop-file-utils&lt;br /&gt;
&lt;br /&gt;
This removed also:&lt;br /&gt;
 bluez-utils GConf2 cups-libs libnotify desktop-file-utils bluez-libs&lt;br /&gt;
 htmlview paps finger redhat-lsb cups libwnck notification-daemon&lt;br /&gt;
 redhat-menus pinfo gtk2 bluez-gnome&lt;br /&gt;
&lt;br /&gt;
Some other options:&lt;br /&gt;
 yum remove apmd acpid cpuspeed&lt;br /&gt;
 yum remove atk autofs cairo ccid conman fontconfig freetype libX11 pcmciautils&lt;br /&gt;
 yum remove xorg*&lt;br /&gt;
&lt;br /&gt;
==Disabling Root Logins==&lt;br /&gt;
[http://www.redhat.com/docs/manuals/linux/RHL-9-Manual/security-guide/s1-wstation-privileges.html Disallowing Root Access]&lt;br /&gt;
&lt;br /&gt;
Prevent access to the root shell and logs the attempt.  Edit the /etc/passwd file and change the shell from /bin/bash to /sbin/nologin.&lt;br /&gt;
&lt;br /&gt;
Prevent access to the root account via the console or the network. An empty /etc/securetty file prevents root login on any devices attached to the computer.&lt;br /&gt;
 echo &amp;gt; /etc/securetty&lt;br /&gt;
&lt;br /&gt;
Prevent root access via the OpenSSH suit of tools.  Edit the /etc/ssh/sshd_config file and set the PermitRootLogin parameter to no.&lt;br /&gt;
&lt;br /&gt;
Prevent root access to network services that are PAM aware.  Edit the file for the target service in the /etc/pam.d/ directory. Make sure the pam_listfile.so is required for authentication.&lt;br /&gt;
&lt;br /&gt;
==Windows Password Security==&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&amp;quot;Interestingly, if you run windows (shudder) and want to see just how secure your passwords are, have a look at Ophcrack. Scary stuff!&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
http://ophcrack.sourceforge.net/&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
This thing will find any 14 character alphanumeric password in a matter of minutes!&amp;quot; [http://www.centos.org/modules/newbb/viewtopic.php?topic_id=7115&amp;amp;forum=14] &amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Security Watches==&lt;br /&gt;
*[http://news.netcraft.com/archives/2006/06/16/paypal_security_flaw_allows_identity_theft.html PayPal Security Flaw allows Identity Theft]&lt;br /&gt;
*[http://www.theregister.co.uk/2002/08/12/ssl_defeated_in_ie/ SSL defeated in IE and Konqueror]&lt;br /&gt;
&lt;br /&gt;
==NMAP==&lt;br /&gt;
See [[nmap]]&lt;br /&gt;
&lt;br /&gt;
==Auditor Security Collection==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Auditor_Security_Collection Wiki Auditor Security Collection]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&amp;quot;The Auditor security collection is a LiveCD based on Knoppix.&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt; Auditor was planned and developed with the targets of user-friendliness and an optimal toolset. For example, the menu structure is organised into the typical phases of a security check: footprinting, analysis, scanning, wireless scanning, brute-forcing, and cracking.&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt; Auditor Security Collection is now known as BackTrack.&amp;quot;[http://en.wikipedia.org/wiki/Auditor_Security_Collection] &amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*[http://freshmeat.net/projects/auditor/ Freshmeat: Auditor security collection]&lt;br /&gt;
*[http://www.linux.com/articles/48225 Auditor: The security tool collection]&lt;br /&gt;
&lt;br /&gt;
==BackTrack==&lt;br /&gt;
[http://www.remote-exploit.org/backtrack.html BackTrack]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&amp;quot;BackTrack is the most Top rated linux live distribution focused on penetration testing. With no installation whatsoever, the analysis platform is started directly from the CD-Rom and is fully accessible within minutes. [http://www.remote-exploit.org/backtrack.html] &amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&amp;quot;BackTrack is a Linux distribution distributed as a LiveDistro that results from the merger of WHAX and Auditor-based Auditor Security Collection.&amp;quot; [http://en.wikipedia.org/wiki/BackTrack] &amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*[http://en.wikipedia.org/wiki/BackTrack Wiki: BackTrack]&lt;br /&gt;
&lt;br /&gt;
== DenyHosts ==&lt;br /&gt;
&lt;br /&gt;
DenyHosts - http://denyhosts.sourceforge.net/&lt;br /&gt;
&lt;br /&gt;
&amp;quot;DenyHosts is a script intended to be run by Linux system administrators to help thwart SSH server attacks (also known as dictionary based attacks and brute force attacks).&lt;br /&gt;
&lt;br /&gt;
If you&amp;#039;ve ever looked at your ssh log (/var/log/secure on Redhat, /var/log/auth.log on Mandrake, etc...) you may be alarmed to see how many hackers attempted to gain access to your server. Hopefully, none of them were successful (but then again, how would you know?). Wouldn&amp;#039;t it be better to automatically prevent that attacker from continuing to gain entry into your system?&lt;br /&gt;
&lt;br /&gt;
DenyHosts attempts to address the above&amp;quot;&lt;br /&gt;
&lt;br /&gt;
NOTE: DenyHosts is a Python script!  :-)&lt;br /&gt;
&lt;br /&gt;
-&lt;br /&gt;
&lt;br /&gt;
[http://www.linux-mag.com/cache/7729/1.html Got Security? You’re in Denial | Linux Magazine]:&lt;br /&gt;
:&amp;quot;Do you think your systems are secure? Install DenyHosts and you’ll realize that you were in denial. &amp;quot;&lt;br /&gt;
&lt;br /&gt;
:&amp;quot;Exposing a system to the Internet means that you’ll soon (within hours) experience login attempts from random locations, from people you don’t know and from those with unclear motivations. DenyHosts is an SSH security tool in the form of a python script that helps prevent brute force and dictionary-based attacks against your systems. On my home system, I have at least one such attempt added to my /etc/hosts.deny  file per day. I use DenyHosts to maintain that stealth watch over my insignificant system here in my dusty little corner of the Internet that I call home.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== DenyHosts Installation ===&lt;br /&gt;
&lt;br /&gt;
Installation:&lt;br /&gt;
 yum install --enablerepo=rpmforge denyhosts&lt;br /&gt;
&lt;br /&gt;
Start service:&lt;br /&gt;
 service denyhosts start&lt;br /&gt;
  starting DenyHosts:    /usr/bin/env python /usr/bin/denyhosts.py --daemon --config=/etc/denyhosts/denyhosts.cfg&lt;br /&gt;
&lt;br /&gt;
Config:&lt;br /&gt;
 /etc/denyhosts/denyhosts.cfg&lt;br /&gt;
&lt;br /&gt;
-- Manual Installation --&lt;br /&gt;
&lt;br /&gt;
 apt-get install python python2.3-dev python2.3&lt;br /&gt;
&lt;br /&gt;
 cd /tmp&lt;br /&gt;
 wget http://mesh.dl.sourceforge.net/sourceforge/denyhosts/DenyHosts-2.0.tar.gz&lt;br /&gt;
 tar xvfz DenyHosts-2.0.tar.gz&lt;br /&gt;
 cd DenyHosts-2.0&lt;br /&gt;
 python setup.py install&lt;br /&gt;
&lt;br /&gt;
 cd /usr/share/denyhosts&lt;br /&gt;
 cp denyhosts.cfg-dist denyhosts.cfg&lt;br /&gt;
&lt;br /&gt;
Preventing SSH Dictionary Attacks With DenyHosts | HowtoForge - Linux Howtos and Tutorials - http://www.howtoforge.com/preventing_ssh_dictionary_attacks_with_denyhosts&lt;br /&gt;
&lt;br /&gt;
== Tutorials ==&lt;br /&gt;
&lt;br /&gt;
=== [http://crashrecovery.org/hardening.html The R Zone: Hardening a Linux Server in 10 Minutes] ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Wed Mar  1 16:14:18 CET 2006 (as copied from :&lt;br /&gt;
http://rudd-o.com/archives/2006/02/27/hardening-a-linux-server-in-10-minutes/ )&lt;br /&gt;
&lt;br /&gt;
Did you know that a freshly installed Linux server can be hardened in &lt;br /&gt;
less than 10 minutes? Heres how!&lt;br /&gt;
&lt;br /&gt;
Print these instructions out, and keep them posted on a wall in your &lt;br /&gt;
office or home. Before plugging a freshly installed network server, &lt;br /&gt;
simply remember to follow these instructions. Make these instructions &lt;br /&gt;
second nature to you.&lt;br /&gt;
&lt;br /&gt;
Youll need a bit of experience with the Linux command-line environment, &lt;br /&gt;
as the following commands are usually issued in a terminal. You will &lt;br /&gt;
need root access on your server as well. By the way, the following &lt;br /&gt;
instructions apply to any LSB-compliant Linux distribution, but Ill use &lt;br /&gt;
Fedora Core as an example.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*Step 1: turn all unneeded services off&lt;br /&gt;
*Step 2: limit access to running services using iptables&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== [http://www.ibm.com/developerworks/linux/edu/l-dw-linux-harden-server-i.html IBM - Hardening the Linux server] ===&lt;br /&gt;
:&amp;quot;Servers—whether used for testing or production—are primary targets for attackers. By taking the proper steps, you can turn a vulnerable box into a hardened server and help thwart outside attackers. Learn how to secure SSH sessions, configure firewall rules, and set up intrusion detection to alert you to any possible attacks on your GNU/Linux® server. Once you&amp;#039;ve gained a solid foundation in the basics of securing your server, you can build on this knowledge to further harden your systems.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
*CentOS 4 Security Assessment [http://tech.scottp.net/index.php/2005/11/22/centos-4-security-assessment/]:&lt;br /&gt;
*Securing CentOS Linux installations by disabling unneeded services [http://prefetch.net/blog/index.php/2006/12/27/securing-centos-installations-by-disabling-unneeded-services/]&lt;br /&gt;
*[http://koltsoff.com/pub/securing-centos/]&lt;br /&gt;
*[http://www.net-security.org/article.php?id=109]&lt;br /&gt;
*[http://www.tldp.org/LDP/solrhe/Securing-Optimizing-Linux-RH-Edition-v1.3/index.html Securing and Optimizing Linux (HTML eBook)]&lt;br /&gt;
*[http://www.puschitz.com/SecuringLinux.shtml Securing and Hardening Red Hat Linux Production Systems]&lt;br /&gt;
**Good article to read!&lt;br /&gt;
*[http://www.openna.com/pdfs/Securing-Optimizing-Linux-The-Ultimate-Solution-v2.0.pdf Securing &amp;amp; Optimizing Linux: The Ultimate Solution (PDF eBook)]&lt;br /&gt;
*[http://www.openna.com/pdfs/Securing-Optimizing-Linux-RH-Edition-v1.3.pdf Securing &amp;amp; Optimizing Linux: Red Hat Edition (PDF eBook)]&lt;br /&gt;
*[http://www.anchorite.org/blog/2006/11/13/minimal-services-on-centos-44-mini-howto/ Minimal Services on CentOS 4.4 Mini-HowTo]&lt;br /&gt;
**Includes an extensive list of services to disable.&lt;br /&gt;
*[http://wdl.lug.ro/documentation/passwords_guide.pdf My guide to a secure password by Marc Mercer]&lt;br /&gt;
*[http://www.openna.com/products/books.php OpenNA Security Books]&lt;br /&gt;
*[http://www.openna.com/documentations/documentations.php OpenNA Documentation]&lt;br /&gt;
**Several good articles to read&lt;br /&gt;
&lt;br /&gt;
== http://www.faqs.org/docs/gazette/tips.html Linux Security Tips By Kapil Sharma ==&lt;br /&gt;
&lt;br /&gt;
&amp;quot;In this article I will explain  how to make your Linux box secure by taking  basic security measures. This article will enable anybody to tighten the security of a redhat Linux box.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Summary:&lt;br /&gt;
* BIOS Security - password protect&lt;br /&gt;
* LILO Security - password protect&lt;br /&gt;
* Disable all special accounts - delete unused accounts&lt;br /&gt;
* Choose a Right password - set password definitions&lt;br /&gt;
* Enable shadow password support - /usr/sbin/authconfig, pwconv, grpconv&lt;br /&gt;
* The root account - timeout&lt;br /&gt;
* Disable all console-equivalent access for regular users&lt;br /&gt;
* Disable &amp;amp; uninstall all unused services - inetd&lt;br /&gt;
* TCP_WRAPPERS - disallow all by default&lt;br /&gt;
* Don&amp;#039;t let system issue file to be displayed - telnetd&lt;br /&gt;
* Change the &amp;quot;/etc/host.conf&amp;quot; file&lt;br /&gt;
* Immunize the &amp;quot;/etc/services&amp;quot; file - immutable&lt;br /&gt;
* Disallow root login from different consoles - /etc/securetty&lt;br /&gt;
* Blocking anyone to su to root - pam, wheel account&lt;br /&gt;
* Shell logging - history size&lt;br /&gt;
* Disable the Control-Alt-Delete keyboard shutdown command - /etc/inittab&lt;br /&gt;
* Fix the permissions under &amp;quot;/etc/rc.d/init.d&amp;quot; directory for script files - chmod 700&lt;br /&gt;
* Hide your system information - /etc/issue&lt;br /&gt;
* Disable unused SUID/SGID programs - find with chmod&lt;br /&gt;
&lt;br /&gt;
== keywords ==&lt;br /&gt;
&lt;br /&gt;
linux security&lt;br /&gt;
&lt;br /&gt;
[[Category:Linux]]&lt;/div&gt;</summary>
		<author><name>Kenneth</name></author>
	</entry>
</feed>