0% found this document useful (0 votes)
63 views12 pages

Presenting Bastille Linux: Jon Lasser University of Maryland, Baltimore County (UMBC) Jon@umbc - Edu

Bastille Linux is a security hardening tool that aims to simplify and automate the process of securing Linux systems. It was created in response to the growing number of insecure Linux installations and break-ins in the late 1990s. Bastille Linux runs as a script to harden systems by disabling unnecessary services, patching vulnerabilities, and locking down access and permissions based on best practices. It is designed to be fully compatible with Red Hat Linux and is now in its 1.1 alpha version, featuring improved modularity, extensibility to other distributions, and undo functionality.

Uploaded by

Luis Manuel
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
63 views12 pages

Presenting Bastille Linux: Jon Lasser University of Maryland, Baltimore County (UMBC) Jon@umbc - Edu

Bastille Linux is a security hardening tool that aims to simplify and automate the process of securing Linux systems. It was created in response to the growing number of insecure Linux installations and break-ins in the late 1990s. Bastille Linux runs as a script to harden systems by disabling unnecessary services, patching vulnerabilities, and locking down access and permissions based on best practices. It is designed to be fully compatible with Red Hat Linux and is now in its 1.1 alpha version, featuring improved modularity, extensibility to other distributions, and undo functionality.

Uploaded by

Luis Manuel
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

Presenting Bastille Linux

Jon Lasser University of Maryland, Baltimore County (UMBC) [email protected]

2000-May-27

Overview
A Brief History of Bastille Linux Philosophy Step-By-Step Overview Lessons Learned

The "Linux Problem", Ca. Q3 98


Linux spreading rapidly in universities, but no centralized control
Inexperienced administrators Wide-open systems Infrequent security updates . . . and therefore frequent break-ins

The "Linux Problem"


Its hard to do the right thing:

Linux is easy to install

... but hard to administer (securely!)

What UMBC Linux Got Wrong


Our most serious failure was social, not technical:
Despite the very large number of Linux users, especially at universities, we did not seek to share with others performing similar work. Had we shared our plans and results with other schools, we would have duplicated less work and been able to accomplish more.

Sans 99 Conference, project proposed


improve university security harden defaults discourge dangerous and obsolete tools simplify customization of install to be based on Red Hat 6.0.

Why Red Hat 6?


Market share Easy for beginners to install Fairly open by default Some Distributions Have Hardening Software
SuSe Mandrake 7

...and Away From Bastille Linux?


little happened immediately Admins are busy folk project had a distant payoff Red Hat 6.0 is more secure out-of-box, so pressure off. Difficult to make Red Hats devel model work over the net
Monolithic, too Slow at Internet Speeds Network and server reliability is still an issue Its too hard to keep up with Red Hat!

A Change of Direction...
Instead of a Distribution, a Hardening script:
Full Compatibility Community Support Less work to update for new releases Adaptable to other distributions Avoid export concerns by simply installing crypto via ftp from Europe

Releases To Date (1)


1.0
The Conference Release 1.0.1 Brown Paper Bag Release 1.0.2 Additional Bugfixes

Releases To Date (2)


1.0.3
Red Hat 6.1 support Included automation examples 1.0.4 TUI Defaults for all choices No more single-user mode Mandrake 6.x support Bugfixes 1.0.4pl1 TUI fix.

The Future: Bastille Linux 1.1


New Back End:
Can be run multiple times Doesnt need to run against clean system More extensible to other distributions Undo Functionality Test-Only Function

Bastille Linux 1.1 is now in alpha testing stage.

Philosophy of Bastille Linux (1)


A Living, Executable "Best Practices" Document Based on Community Resources:
SANS Securing Linux Step-By-Step Kurt Seifrieds Linux Administrators Security Guide Leveraged Existing Code Jay Beales Solaris Hardening Scripts

Philosophy of Bastille Linux (2)


Grounded in Open-Source Methodology:

Many eyes (audit) Many minds (experience) Many arguments (community)

How Can We Stop Crackers?


What Bastille Linux Does
Apply vendor-produced patches Disable unnecessary services Secure default configurations Set up a firewall

What Bastille Linux Doesnt Do (Yet)


Automated techniques to scan for crackers Automated protection from certain attacks (StackGuard)

Basic Features Walkthrough (1)


Completely Modular Install RPM Updates
Dynamic list from our server As secure as commercial vendors

SUID and Permissions Audits


Permissions audit based on SANS document, with changes SUID audit granular, Permissions audit not (yet!)

Basic Features Walkthrough (2)


Account Security
Use md5 password hashing Use shadow passwords

Create Second Admin Account


Like root, with different name Root logins become a sign of intrusion Controversial, but useful for some Remember, all Bastille Linux functionality is optional!

Install SSH Disable Dangerous R* Utilities


rlogin, rsh, rcp, etc. Create empty .rhosts file for each user, root owned, mode 0400, empty Mode 0400 empty /etc/hosts.equiv Use ssh, scp, etc. instead

Password Aging (Optional)

Basic Features Walkthrough (3)


Protect Bootloader
Require password for single-user mode Reduce prompt delay Alter permissions to prevent users reading (necessary for passworded mode)

Restrict Console Reboots (Control-Alt-Delete) Remote Access Restrictions


Extra logging for portscans Security risks of telnet and FTP discussed TCP Wrapper host-specific configuration "Authorized Users Only" banners

For Servers, Disable Compilers


A pinch more security, though admittedly not much

Prevent remote root logins

Basic Features Walkthrough (4)


Limit console logins to administrators Denial-of-Service Protections
Per-user limits No core files Limit users file size

Additional Logging
Direct to virtual consoles 7 and 8 Remote loghost Separate local kernel and system logs Separate local user login log Process Accounting

Basic Features Walkthrough (5)


Sendmail Configuration
Fix most known holes Turn off daemon mode Turn off VRFY/EXPN (anti-spam/recon) Red Hat 6 already restricts relaying

Restrict Cron Access Disable Unnecessary Daemons

Basic Features Walkthrough (6)


Chrooted DNS server
Set this up, even if BIND not running, in case its enabled later Deactivate DNS server by default

Apache Configuration
Deactivate, or bind to localhost only Dont follow symbolic links Disable server-side includes Disable CGI scripts

FTP Configuration
Disable user privileges Disable anonymous access

Features Walkthrough: Firewall


Aimed at experts (Created interactively, good defaults) Trusted, Public, and Internal interfaces TCP, UDP, ICMP audit logging Different services on different interface classes TCP, UDP, ICMP blocking Block source spoofed packets IP Masquerading

Features: Automation
Set up one machine, use the same configuration on hundreds or thousands of boxes Several default setups:
Firewall Mail server Web server Workstation

The End
Please mail questions or comments to [email protected]
The Bastille Linux homepage is http://bastille-linux.sourceforge.net/

To subscribe to the announcement mailing list, send mail to [email protected]

To subscribe to the discussion list, please send mail to [email protected]

You might also like