Linux Patch Management: Keeping Linux Systems Up To Date

The following are some of the key points from the certification objectives in Chapter 15.

Using tcp_wrappers to Secure Services

❑  

Red Hat Enterprise Linux comes with a package known as tcp_wrappers. This package, which is enabled by default, allows you to limit access to various services.

❑  

You configure the access rules for tcp_wrappers through the /etc/hosts.allow and /etc/hosts.deny configuration files.

❑  

Clients listed in /etc/hosts.allow are allowed access; clients listed in /etc/hosts.deny are denied access.

❑  

Services can also be configured in /etc/hosts.allow and /etc/hosts.deny. Remember to use the actual executable name of the daemon, normally in /usr/sbin, such as in.tftpd.

Firewalls and Packet Filtering Using netfilter

❑  

Firewalls can secure an internal network as a packet filter that controls the information that comes in, goes out, and is forwarded through the internal network.

❑  

The current firewall configuration utility is iptables.

❑  

The iptables directives are sets of rules, chained together, that are compared and then applied to each network packet.

❑  

Each rule sets conditions required to match the rule and then specifies the action taken if the packet matches the rule.

❑  

Use the service iptables save command to save any chains that you configure in the /etc/sysconfig/iptables configuration file.

Network Address Translation

❑  

NAT modifies the header in packets coming from a LAN. It replaces the source address with the public address of the firewall computer, with a random port number.

❑  

Linux supports a variation of NAT called IP masquerading.

❑  

IP masquerading allows you to provide Internet access to multiple computers with a single officially assigned IP address.

❑  

To enable IP forwarding immediately, type the echo 1 > /proc/sys/net/ipv4/ip_forward command. To enable it upon reboot, set net.ipv4.ip_forward = 0 in /etc/sysctl.conf.

Security Enhanced Linux

❑  

Security Enhanced Linux (SELinux) provides a different level of security. Basic settings are shown in the /etc/sysconfig/selinux file.

❑  

If you're just experimenting with SELinux, configure it in permissive mode.

❑  

SELinux is relatively easy to configure with the SELinux Management Tool.

❑  

Any changes you make with the SELinux Management Tool are reflected in boolean settings in the /selinux/booleans/ directory.

❑  

The Setroubleshoot Browser can help you decipher related errors.

Категории