|
DataMuseum.dkPresents historical artifacts from the history of: DKUUG/EUUG Conference tapes |
This is an automatic "excavation" of a thematic subset of
See our Wiki for more about DKUUG/EUUG Conference tapes Excavated with: AutoArchaeologist - Free & Open Source Software. |
top - metrics - downloadIndex: T U
Length: 20651 (0x50ab) Types: TextFile Notes: Uncompressed file
└─⟦4f9d7c866⟧ Bits:30007245 EUUGD6: Sikkerheds distributionen └─⟦b8b8019d9⟧ »./papers/General_Unix/c.spurgeon-UTguide_to_unix_security.txt.Z« └─⟦this⟧
UTnet Guide to UNIX System Security Charles Spurgeon The Network Information Center of the University of Texas at Austin (UT NIC) Document version 2.0 Copyright (c) 1990. Permission to copy without fee all or part of this material is granted provided that the copies are not made or distributed for direct commer- cial advantage. Copies must show the University of Texas at Austin as the source, and include this notice. Introduction Every computer user and system administrator needs to be aware of three facts about security for computers attached to the campus network system: 1. - The moment a computer system is attached to the campus network it is vulnerable to system crack- ers, also called "hackers" in the news media. Call them what you will, the chances are good that a system cracker will try to break into your com- puter system once it is attached to the network. If they break into your system, they may install special software that will compromise the security of your system. 2. - Vendors ship their computer systems with major security holes. Typically a system comes from the factory configured as though it will never be attached to a public communications system. Until you configure your system to be secure, it will be vulnerable to attack by system crackers armed with lists of well known security holes for each vendor's system. 3. - You are on your own. It is up to you to ensure the security and integrity of your private files, and of the computer systems you may be responsible for. \f UTnet Guide to UNIX System Security Page 2 System administrators and general computer users alike need to know that computer crackers are increasing in number, and that the crackers are equipped with the latest information about security holes in computer systems. The rest of this document is a guide to resources that can help establish and maintain UNIX[1] system security. 1. Guide to Resources for System Security What follows is a list of resources that can help establish system security on host systems. The pub- licly available resources listed here are slanted toward the UNIX operating system, which reflects the fact that UNIX is widely used on campuses. Several items listed here are available at no charge as files that can be copied from a Computation Center computer. Instructions for retrieving these files are included at the end of this list. The primary guide to system security for your host is the documentation that came with the system. Each vendor's system is different, and the vendor must be relied upon for the most accurate description of how to establish security for their system. On the other hand, system security information can be scattered throughout the documentation, and vendors rarely include tutorial information that adequately describes the scope of the security task. The follow- ing documents can help make sure that you don't miss any important security issues as you configure your system. 1.1. System Security Documents o Improving the Security of Your UNIX System David A. Curry April 1990, Technical Report ITSTD-721-FR-90-21, from Information and Telecommunications Sciences and Technology Division, SRI International. 51 pps, including references and suggested reading list. Available on host emx.utexas.edu in the directory ~ftp/pub/netinfo/docs as unix-secure.txt, an ASCII text file, and unix-secure.ps, a PostScript file suitable for printing on an Apple LaserWriter or [1]UNIX is a registered trademark of AT&T. \f Page 3 UTnet Guide to UNIX System Security equivalent. An excellent guide to the subject of UNIX security. The issues are clearly explained, and many examples are included for improving security in UNIX systems in gen- eral and Sun systems in particular. Also included is a section on monitoring the security of a system over time, along with a section on publicly available software for improving security. From the Introduction: "The UNIX operating system, although now in widespread use in environments concerned about security, was not really designed with security in mind. This does not mean that UNIX does not provide any security mechan- isms; indeed, several very good ones are available. However, most `out of the box' installation procedures from companies such as Sun Microsystems still install the operating system in much the same way as it was installed 15 years ago: with little or no security enabled." "This document describes the security features provided by the UNIX operating system, and how they should be used. The discussion centers around version 4.x of SunOS, the version of UNIX sold by Sun Microsystems. Most of the information presented applies equally well to other UNIX systems. Although there is no way to make a computer completely secure against unauthorized use (other than to lock it in a room and turn it off), by following the instructions in this document you can make your system impregnable to the `casual' system cracker, and make it more difficult for the sophisti- cated cracker to penetrate." o UNIX System Administration Handbook Evi Nemeth, Garth Snyder, and Scott Seebass. Prentice Hall, Englewood Cliffs, NJ. 1989. 593 pps. with index and bibliography. ISBN 0-13-933441-6. $32.00 Your vendor's documentation is the final word for sys- tem administration on your system, but the material can be scattered throughout the documentation, and there is usually little explanation as to why certain system administration tasks need to be done, or how the entire set of system administration tasks fit together. Ade- quate system administration is essential to preserving the integrity of data and programs, which is why this excellent guide to the entire set of UNIX system administration tasks is listed. \f UTnet Guide to UNIX System Security Page 4 From the Preface: "Without guidance, it's easy for a new administrator to lose sight of ultimate goals in a sea of documentation or to inadvertently skip over one or more critical areas through failure to realize that they are impor- tant. That is where this book fits in. While we can't claim that everything you need to know is included, we can guarantee that after reading it you will know pretty much what UNIX administration involves and how to go about it." o UNIX System Security Patrick H. Wood and Stephen G. Kochan Hayden Books, Indianapolis, Indiana, 1985. 299 pps. with index. ISBN 08104-6267-2 $34.95. A comprehensive look at UNIX system security from the point of view of AT&T UNIX System V. The book is divided into three main sections, Security for Users, Security for Programmers, and Security for Administra- tors. Several appendices contain example security pro- grams and even include a copy of the SUID patent. From the Introduction: "The key word when it comes to computer security is awareness. Awareness is needed by administrators in understanding how to make and keep their system secure, how to educate users on security, how to perform periodic security audits, and how to set security stan- dards and enforce them. Awareness is also needed by users in understanding how file permissions work so that other users can't read or destroy their files, how to send files through the network so that they can't be read by others, how to write secure programs, how to choose good passwords and keep them secret, and the importance of not leaving terminals unattended. Aware- ness is needed by the users' and administrators' management in understanding the need for a company-wide security policy and in allowing their employees to spend time implementing this policy." o Computer Viruses and Related Threats: A Management Guide John P. Wack, Lisa J. Carnahan. NIST Special Publication 500-166 Available on host emx.utexas.edu in directory ~ftp/pub/netinfo/docs as nist-secure-guide.txt, an ASCII text file. \f Page 5 UTnet Guide to UNIX System Security A guide to computer viruses prevention from a system management point of view. The guide contains sugges- tions for formulating policies for software management and user education to minimize the risk of computer viruses in both multi-user and personal computers. From the Introduction: "This document provides guidance for technical managers for the reduction of risk to their computer systems and networks from attack by computer viruses, unauthorized users, and related threats. The guidance discusses the combined use of policies, procedures, and controls to address security vulnerabilities that can leave systems open to attack. The aim of this document is not to provide solutions to the wide range of specific prob- lems or vulnerabilities, rather it is to help technical managers administer their systems and networks such that manifestations of viruses and related threats can be initially prevented, detected, and contained." 2. System Security Software Bug fixes to close security holes in system software are handled by the vendor for your system. Sun Microsystems has made some bug fixes available on the Internet, and this effort is described in the document listed above entitled, "Improving the Security of Your UNIX System," by David Curry. There are also several packages for improving system software described in the Curry document. Two of these packages are available as source code on host emx.utexas.edu. This software is made available locally as a convenience to system administrators with the necessary skills. No support is available for this software, and no guarantees are made as to its suita- bility for any purpose. Use at your own risk. o npasswd The npasswd program is available via anonymous FTP as described below, from host emx.utexas.edu. The program is stored as a set of shell archive (shar) files in directory ~ftp/pub/npasswd. The program may also be retrieved as a compressed tape archive (tar) file. The npasswd program, developed by Clyde Hoover at the University of Texas Computation Center, is designed to be a replacement for the standard UNIX passwd program. The npasswd program makes passwords more secure by \f UTnet Guide to UNIX System Security Page 6 refusing to allow users to select passwords that can be too easily breached by a system cracker. From the source code: "Npasswd is a pretty-much-plug-compatible replacement for passwd(1). This version incorporates a password checking system that disallows simple-minded pass- words." o COPS The COPS package is available as a set of shell archive (shar) files in UNIX "compress" format, on host emx.utexas.edu. The files may be retrieved from the ~ftp/pub/netinfo/src/cops directory via anonymous FTP as described below. The COPS pack- age is also available from host ftp.uu.net as described in the David Curry document, above. The COPS package is a collection of shell scripts and C programs that will run on most UNIX systems. The pack- age is a tool for system administrators that checks for many common security problems in UNIX systems. From the documentation: "COPS is a security tool that is useful to system administrators, system programmers, or for anyone who would like to learn about UNIX security. It does not restrict a system's environment by placing constraints on activity; it is a purely diagnostic tool that checks and reports on the current status of a given UNIX machine. Written in Bourne shell, generic commands (awk, sed, etc.) and some C, the system is basically a shell script that runs several small security programs. Theoretically (at least), it attempts to find the fol- lowing problems (among others) on a generic UNIX sys- tem, and then mails or saves the results, if indeed any problems do exist: --Checks /dev/*mem and all devs listed in "/etc/fstab" for world read/writability. --Checks special/important directories and files for "bad" (world writable, whatever) modes. (/etc/passwd, /bin, etc.) --Checks against /etc/passwd for crummy passwords (user selectable, it can be as vigorous or as lax as you wish.) --Checks /etc/passwd for non-unique uids, invalid fields, non-numeric user ids, etc. Also includes a password checker. --Checks /etc/group for non-unique groups, invalid fields, non-numeric group ids, etc. --Checks all users' home directories and their \f Page 7 UTnet Guide to UNIX System Security .login/.cshrc/.rhosts/.profile/etc. files --Checks all commands and paths listed in /etc/rc* and crontabs for world writability. --Checks for bad root paths, world exportable NFS systems, some other misc stuff. --Includes the Kuang expert system. Written by Robert Baldwin, this basically checks to see if a given user (by default root) is compromisible, given that certain rules are true. Kind of hard to explain in a sentence, but worth the price of admission. --Checks the system for changes in SUID status. This is the one (the only) program that should be run as superuser, because it runs a "find" on all SUID programs from the / directory, and then uses that as a reference file for future runs." 3. Retrieving Files From emx.utexas.edu Several of the items listed above are available as files that can be retrieved from the Computation Center host system emx.utexas.edu. 3.1. Copying Files From An emx Account If you have an account on emx, then you can login to emx and simply copy the files from the publicly avail- able directories listed above, using the UNIX copy com- mand "cp." 3.2. Electronic Mail If you don't have an account on emx, but have access to electronic mail on a network connected system, you may retrieve netinfo documents from emx. This is done by sending electronic mail to the mail-based server located on emx. The electronic mail-based netinfo server will send you copies of the documents available in the netinfo files on emx. The source code is not available through the netinfo server. The mail-based server is a simple program that reads commands from messages sent to it, and responds by sending back the information requested. For instance, the fastest way to get more information about the server would be to send electronic mail to netinfo@emx.utexas.edu, with the word help in the subject line or the body of the message. The netinfo server will respond with a list of the commands that it supports. \f UTnet Guide to UNIX System Security Page 8 You can obtain a list of all the documents available in the docs directory on emx.utexas.edu by sending the command send index docs in the subject line or the body of an electronic mail message. Remember that the netinfo server is a simple program. Do not send any other verbiage in the message and do not use quotation marks around the commands you send. Finally, don't repeat the same command in a sin- gle message. In other words, if you put the command, "send index docs" in the subject line of your message (which is fine as far as the netinfo mailer is con- cerned) don't put the same command in the body of the same message. 3.3. Anonymous FTP You can retrieve all of the documents in the netinfo directories through a mechanism known as "anonymous FTP." FTP stands for file transfer program, which is an application program based on TCP/IP protocols. The FTP program makes it possible to retrieve files from any host that has a network connection and is running the FTP software. The anonymous FTP mechanism makes it possible for anyone to retrieve files from certain spe- cial directories on a remote system, whether or not they have a login account on that system. To open an anonymous connection simply type, ftp emx.utexas.edu and hit the return key. The FTP program will connect to the emx system and issue a login prompt. At the login prompt type, anonymous and hit the return key. The FTP program will prompt for a password. At the password prompt type your user- name and machine name. Actually any password may be used, but typing your username and machine name is a courtesy to the administrators of the remote host. \f Page 9 UTnet Guide to UNIX System Security After opening an anonymous FTP connection to emx, you can "cd" to the directory containing the files you want. At that point, you can simply retrieve the specific files you are interested in. Example: Here's an example of using the FTP program to log into host emx.utexas.edu: % ftp emx Connected to emx.utexas.edu. 220 emx FTP server (Version 4.161 Wed Apr 5 12:57:18 CDT 1989) ready. Name (your-host:your-name): anonymous <-type "anonymous" here 331 Guest login ok, send ident as password. Password: <-type name and host, no echo from emx 230 Guest login ok, access restrictions apply. ftp> cd pub <-change directory to "pub" 250 CWD command successful. ftp> cd netinfo 250 CWD command successful. ftp> cd docs 250 CWD command successful. ftp> get unix-secure.ps <-request PostScript version of unix-secure doc 200 PORT command successful. 150 Opening data connection for unix-secure.ps (ascii mode) (274267 bytes). 226 Transfer complete. local: unix-secure.ps remote: unix-secure.ps 295115 bytes received in 8.1 seconds (36 Kbytes/s) ftp> quit 221 Goodbye.