Security Guide
iv
4.3.2. Creating User Passwords Within an Organization ...................................... 26
4.4. Administrative Controls ....................................................................................... 28
4.4.1. Allowing Root Access .............................................................................. 29
4.4.2. Disallowing Root Access .......................................................................... 29
4.4.3. Limiting Root Access ............................................................................... 32
4.5. Available Network Services ................................................................................. 33
4.5.1. Risks To Services .................................................................................... 34
4.5.2. Identifying and Configuring Services ......................................................... 34
4.5.3. Insecure Services .................................................................................... 35
4.6. Personal Firewalls .............................................................................................. 36
4.7. Security Enhanced Communication Tools ............................................................ 37
5. Server Security 39
5.1. Securing Services With TCP Wrappers and xinetd ............................................ 39
5.1.1. Enhancing Security With TCP Wrappers ................................................... 39
5.1.2. Enhancing Security With xinetd ............................................................. 41
5.2. Securing Portmap ............................................................................................... 42
5.2.1. Protect portmap With TCP Wrappers ...................................................... 42
5.2.2. Protect portmap With IPTables ............................................................... 42
5.3. Securing NIS ...................................................................................................... 43
5.3.1. Carefully Plan the Network ....................................................................... 43
5.3.2. Use a Password-like NIS Domain Name and Hostname ............................. 43
5.3.3. Edit the /var/yp/securenets File ........................................................ 44
5.3.4. Assign Static Ports and Use IPTables Rules .............................................. 44
5.3.5. Use Kerberos Authentication .................................................................... 45
5.4. Securing NFS .................................................................................................... 45
5.4.1. Carefully Plan the Network ....................................................................... 45
5.4.2. Beware of Syntax Errors .......................................................................... 45
5.4.3. Do Not Use the no_root_squash Option ................................................ 46
5.5. Securing the Apache HTTP Server ...................................................................... 46
5.5.1. FollowSymLinks ................................................................................... 46
5.5.2. The Indexes Directive ............................................................................ 46
5.5.3. The UserDir Directive ............................................................................ 46
5.5.4. Do Not Remove the IncludesNoExec Directive ....................................... 47
5.5.5. Restrict Permissions for Executable Directories ......................................... 47
5.6. Securing FTP ..................................................................................................... 47
5.6.1. FTP Greeting Banner ............................................................................... 47
5.6.2. Anonymous Access ................................................................................. 48
5.6.3. User Accounts ......................................................................................... 49
5.6.4. Use TCP Wrappers To Control Access ..................................................... 49
5.7. Securing Sendmail ............................................................................................. 49
5.7.1. Limiting a Denial of Service Attack ............................................................ 50
5.7.2. NFS and Sendmail .................................................................................. 50
5.7.3. Mail-only Users ........................................................................................ 50
5.8. Verifying Which Ports Are Listening ..................................................................... 50
6. Virtual Private Networks 53
6.1. VPNs and Red Hat Enterprise Linux .................................................................... 53
6.2. IPsec ................................................................................................................. 53
6.3. IPsec Installation ................................................................................................ 54
6.4. IPsec Host-to-Host Configuration ......................................................................... 54
6.5. IPsec Network-to-Network configuration ............................................................... 58