Security :: Enable ACL In RHEL 5?
May 26, 2011I am using RHEL 5, how to enable ACl in /etc/fstab
View 2 RepliesI am using RHEL 5, how to enable ACl in /etc/fstab
View 2 Repliesstartx is not working. how to enable GUI in rhel 6
View 8 Replies View RelatedAnyway, according to the release notes, RHEL 6 has a PAE enabled kernel by default. Great... But that leaves me wondering why uname report SMP. Further, I'm provisioning some systems for QA use, and they're asking that PAE is disabled. My thinking is that since RHEL 6 requires PAE capability to install, there may be no way to disable it and the googling I've done seems to support this. tl;dr Why does a default kernel with PAE enabled report SMP on RHEL 6?
View 7 Replies View RelatedI just installed red hat enterprise 5 in my laptop and on desktop both. In desktop it is working fine but in laptop it is not showing the eth device. (I tried ifconfig only lo is there). I tried ifup eth0 still nothing happened. The network service in /etc/sysconfig/network-scripts/ifcfg-eth0 and in /etc/sysconfig/network are enable. I had ubuntu in my laptop before and I faced same problem with that too. Is there any problem with my laptop? I have my system on dual boot and in win7 networking is running fine. I am not able to connect to the internet only, other devices are working fine.
System conf: Sony vaio E series. 3 GB RAM, intel core i3 2.13 GHZ.
I have two problems. I installed a RHEL variant (scientific linux) on an already dual boot system with ubuntu and vista.
It replaced GRUB with (I think an older) GRUB version and to add to that I cannot see my ubuntu ditro anymore. is there a way of reinstalling the GRUB that came with ubuntu then adding the RHEL distro to it?
my second problem is that I cannot figure out how to enable wake on lan in scientific linux (RHEL). on ubuntu I would just write a small script and update all runlevels to run it at startup. what is the alternative on redhat?
We have installed RHEL 5.4 on our servers and everything is running fine. Now I have gone through various server hardening checklist and most of them suggest to enable SELinux. We have several services running on Linux box. Now my question is, do we have to make any chagnes to the existing configurations if we enable SELinux. Or we just enable SELinux and leave it as it is. Because I have had prior experiences where SElinux will stop many services and restrict access to many libraries when enabled.
View 1 Replies View RelatedI'm in the process of building a Linux server using spare desktop (HP dc 7700p PC with USB wireless adapter) and of course it will be used as the wireless security training exercise so I just wondering if Ubuntu or RHEL is suitable for me to learn ?BackTrack Linux is too hard to use and doesn't automatically detect the USB wireless network card usually.
View 1 Replies View RelatedTo comply with standards I need to change the root pw every so often. However, I really don't have a need to know the root password; as the only thing using root, is for ssh authenticating via ssh keys. What I want to do is automate the root password change monthly via a cron job, to a random value. Is there a way to do this without knowing the previous password?
View 14 Replies View RelatedI have a RHEL 5 Server dedicated to web hosting. HTTPD 2.2.x.x is running on it with PHP and MySQL. The machine is not a server system (hardware wise, a C2D 2.66 with 2GB RAM and 2 x NICs). I have a CIR Fiber link with a pool of live IPs. The machines including this web server is plugged into a switch which has all the live interfaces and is separate from the LAN switches. The problem i am facing is that, when ever this web server is plugged in, the traffic on live switch is choked. Internet slows down to a halt (as live interface of proxy is plugged in this switch. DNS stops resolving name due to time outs. Mail delivery is slowed and the mail ques pile ups. The moment i get this machine of the switch, all the traffic becomes normal. Therefore i have deduced that this is the faulty server. I do not know if this server is hacked and working as a bot or it is a mere hardware problem(faulty LAN Card).
View 3 Replies View RelatedI am running Red Hat Enterprise Linux AS release 4 (Nahant Update 7). The server was recently rebooted and wouldn't come up. After some investigation we found that the system would not boot because several files had been zero'd out (not deleted):
* All of these files had a date of March 11, 2010 with a time 03:46
* A zero byte file called /halt was also found with a date of 08:46
We could manually boot to the latest kernel, but none of the startup scripts would run. We analyzed the system looking for any file created on March 11 that were also 0 bytes. Once we had a list, we were able to determine that the system could be recovered without a full blown reinstallation of the OS.
We did a rescue boot from the installation CD, mounted the system volume privately, and edited the grub.conf file. We then brought up the network and copied the needed files from another RHEL v4.7 system. Rebooted the server and check the OS, databases, and apps.
My question is - Has anyone seen this behavior before? I seems like we may have been cracked or at the very least someone has cleared the files needed to recover the system smoothly.
I'm playing around with the RHEL 6 install so as to create a minimal install image to be used as a generic node for a cloud. I posted this in the security section as reducing the number of services etc seems like a security activity, i.e. reducing the running processes to minimize the attack surface.
Anyways, looking through linux from scratch etc, and the NSA hardening list I'm a bit overwhelmed. Anyone have hints on any good documentation saying what is really needed for a basic system with network/ip/arp/eb rules? The RHEL 6 minimal basic puts in a c/c++ compiler along with other things. that seems unnecessary to me for a basic minimal install.
Is it possible to configure the RHEL 5.5 syslog to accept SNMP traps? That is I want to use a central logging server to pick up other systems syslogs, and SNMP messages from systems that cannot use remote syslog functions.
View 3 Replies View RelatedI have in /etc/selinux/config:
Code:
SELINUX=enforcing
SELINUXTYPE=mls
Do I have MLS enabled? I can't use Selinux commands. I thought MLS is sort of package to Selinux. I fallowed this:
Code:
[code].....
My newly installed Fedora-14 (64-bit) has SELinux disabled. I can't find any way to enable it. I tried to set it manually in /etc/selinux/config to enforcing or permissive but nothing happens after reboot. In GUI configuration tool it is set to disabled and grayed out so that there is no way to enable it there. Is there another way to enable SELinux?
View 11 Replies View RelatedHow can I enable passphrase along with the password for login via ssh ? In that whenever I login from server A to server B via ssh, it should ask me for a password and then passphrase to allow me access.
OR
Can we have multiple passwords to login via ssh ?My basic need is to have 2 levels of password.
I recently installed Deluge 1.2.0 from the following PPA:[URL]I using this on two different Linux computers. One is running Linux Mint 8 and the other is running Ubuntu Netbook Remix 9.10. The first time on either computer when I enable WebUI in the Deluge GUI it works fine. However if I ever disable it in plugins section I am subsequently unable to re-enable it (doesn't appear in the side panel again). Rebooting or reinstalling Deluge seems to have no effect.Is this a bug or am I doing something wrong?
View 3 Replies View RelatedWe have enabled DOT1x security (8021x) in our wired network for testing purpose. but to get enable that facility our account should be a domain account so that it will get certifiy from the certificate server through RADIUS server. But in Fedora We are unable to get certified from the certificate server how ever if we are loging in through Root user or any local user in fedora we are able to get IP and able to work in net as well as connected to domain. but after loging off we are unable to login to domain account. I need to login throuhg Domain Account by using DOT1X security.
View 1 Replies View Related1.) I am wondering how to enable the lock to an encrypted partition which has been unlocked, using luks? On boot, I am been asked automatically for the pass phrase to unlock my partitions. After doing a back up, I want lock the encrypted partition again, but I don't know the command?! I umounted the partition but after mounting it again, I was not asked for the pass phrase but had access to my data.
2.) How secure is the default fedora version of luks? Is truecrypt better?
How to enable ipv6 in snort. I read that it must compilate with --enable-ipv6 but still don't know how?
View 2 Replies View Relatedhow to enable direct login of root via ssh?I find and info that i just need to update /etc/ssh/sshd_config, but i couldn't see that file in the location.
View 14 Replies View RelatedI need to allow ICMP ping for one host only. I found out how to enable it to all hosts (ICMP Filtering, check ping) but I would like to reduce the scope to one host. I know I can add rules in the user_post script but I can't find the correct iptables command ...
View 4 Replies View RelatedI am trying to learn how a buffer overflow works, but I need to have an executable stack for it to work. How do i enable this for an individual program? I am using Arch linux and X86_64 btw
View 3 Replies View RelatedAnyone can tell me how to enable and config auditd in linux kernel 2.6.9-5.EL. I have only found command auditd and auditctl in server that run kernel 2.6.9-5.EL. I ran auditd & and can saw auditd ran in my server. But I couldn't do anything with auditctl, no status, no rules, nothing :| . I tried to find audit.rules or auditd.conf but that nothing I can find.
View 1 Replies View RelatedI am using Fedora 14. By default Security Enhanced Linux is enabled in Fedora 14. Now is there any way to disable it by command line and then again enable it through command line.
View 3 Replies View RelatedI was wondering how to activate encryption on my home folder, like sugested when creating the first user? in 10.04Also, is it any good to use?It's a work computer with sometimes private documents (cv, docs, etc) and i would like to be sure no one can access it, even as root.
View 3 Replies View RelatedI have a server that I can only access via SSH (it's located far away) and I would like to secure it by blocking all ports except the ones that I need (which are HTTP and SSH). I still want to be able to make outgoing connections to enable software updates and other things.This is my iptables -L -n :
Code:
Chain INPUT (policy ACCEPT)
target prot opt source destination
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
DROP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpts:1:21
DROP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpts:23:79
DROP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpts:81:65535
code....
In my opinion, this should block all incoming packets except the ones on port 80 and 22, but allow responses to outgoing connections. But a wget http://google.com does not work, it can't establish the connection.
Maybe this is not the best style for iptables rules, but I want to be absolutely sure to not accidently lock myself out from SSH, so I chose not to configure a "block-everything rule".
Does this configuration not enable incoming packets from connections initiated from inside?
is possible to edited the default RHEL CD to have it automatically install RHEL based off of a kickstart file that I will store locally on the CD. My plan would be to put a cd in a server and have the OS automatically being installed.
View 3 Replies View RelatedWe are planning to migrate our LINUX server from RHEL 3to RHEL 5. What are the configuration difference between RHEL 3 to RHEL 5 for webserver installations?
View 1 Replies View RelatedI have 4 partitions in my system, out of which two(sda1, sda2) have windows on them. I have installed RHEL 4 32 - bit on sda3 and after that , installed installed RHEL 64-bit on to a partition sda 5. Now i am unable to boot into RHEL 32-bit. The error i am getting is Error 13: Invalid or unsupported executable format.
View 1 Replies View Relatedcan not ping from host (RHEL 6) to RHEL 5 in (virtual)? I have stopped iptables on both machines. But still not able to ping from host machine to virtual.
View 1 Replies View Related