Security :: ISC Praises Momentous Step Forward In Securing The Domain Name System?
Jul 17, 2010
Quote:
ISC joined other key participants of the internet technical community in celebrating the achievement of a significant milestone for the Domain Name System today as the root zone was digitally signed for the first time. This marked the deployment of the DNS Security Extensions (DNSSEC) at the top level of the DNS hierarchy and ushers the way forward for further roll-out of DNSSEC in the top level domains and DNS Service Providers.
View 3 Replies
ADVERTISEMENT
Jun 25, 2010
I have a mail server that accepts to relay from system in the trusted network. One of the systems in the trusted network is a webserver. On the webserver there are several scripts that send email.Let's focus on the PHP scripts. These use the mail() function for that.I am looking for means to reduce the potential abuse of the mail server when one of the PHP scripts is hacked.For the situation that the code is modified by a hacker or a new script is installed I would like to take this approach:
1) scan the system for scripts using the mail() function
2) generate a checksum list from these scripts
3) intercept email (being sent to sendmail) from these scripts
4) check if they match the checksum list
In theory (I will still have to implement it) this would take care of the situation in which new/modified scripts try to send email.
However, there is also the option of an exploit of some script. Are there any ideas on means to prevent email abuse for this situation (other that: make sure scripts cannot be exploited )?
View 2 Replies
View Related
Aug 3, 2010
My customer has a domain hosted by me and he has another domain hosted by another isp. He would like to have this domain am hosted to be forwarded so thwt upon entering the url he should have the website which is hosted by this other ISP displayed (the url of the website be musked). How do i configure my DNS at achieve this?
View 1 Replies
View Related
Jun 29, 2010
I ran the LiveCD of Fedora SecurityLab and noticed these ports open, 111,631, 34526.How can I close them and what runs behind them. I know 111 is rpcbind, 631 ipp and 34526 is unknown.
View 4 Replies
View Related
Jul 22, 2011
my company is a small company!and it only have one public ip,but my company have a lot of websites to access!now i use Reverse Proxy Server -- apahce to solve temporary!it is not convenience for me !So i think out whether iptables can not be used to forward according to the domain!!it is the test as follows:
public ip :10.0.0.1
privite ip1 :192.168.1.1
matching website domain:www1.test.com
privite ip2:192.168.1.2
matching website domain:www2.test.com
and if someone access [URL] the iptables will know they want to access 192.168.1.1 and it will forward to the server 192.168.1.1!!
View 1 Replies
View Related
Nov 19, 2009
I'm still new to PHP and SQL, but all the tutorials I've found connect to the database like this:
PHP Code:
Right now I'm just doing local network tests before exposing everything to the Internet.
Wouldn't leaving the password in there as plain text be a huge security issue? I tried downloading the php file off the server, and it just comes down blank. So does PHP already have a security feature that doesn't allow anyone to just nab PHP files off the server?
And for Postgre, I have pg_hba.conf set up to "trust" it's own IP address:
Code:
Would I need to use something like Kerberos, PAM, or ident authentication? Right now the only plan is to use it as login system for a website. The clients themselves won't be accessing the DB itself, because all the DB access will be through PHP.
View 4 Replies
View Related
Mar 11, 2010
I am creating an FTP server using VSFTP. It will be in the wild, initially at least only functioning as an FTP server. I have the iptables config from the previous box I set up 3-4 years ago. I have also got private/public key authentication running with SSH to eliminate brute force attacks.
Here is where is my specific question. On the old server I set up something that allowed my clients to log in using accounts that were not system accounts but would translate to a single system account that was limited to FTP. I remember setting up a passwd account that had username / password pairs that FTP used for authentication.
What app is this? Is it just part of VSFTP or maybe SELInux? I really want to utilize this.
View 2 Replies
View Related
Jan 5, 2010
I run Slackware 13.0 and I have an apache server 2.2.13 with a postgresql 8.4.1 database attached to it via php 5.3.0. Both the apache server and the postgresql database are on the same machine.
I have the apache server port 80 exposed to the WAN. It is not a fqdm, it's just a simple IP address. On my index page, a user can login with a user/password that encrypts to md5 via postgresql and takes them into the database.
Here is the vulnerability. Can't a hacker just scan port 80 and find my ip address running apache. Go to my index page, see that I accept user/password for authentication into my postgresql database. Then they could setup a script to simply inject html GET requests of random users and passwords and use those values on the php page(the one where the action link is pointing to in the form tag) that contains user login/password in php to login to my postgresql database. There's nothing stopping that. It would be a simple dictionary attack.
I checked out postgresql documentation and it suggested using ldap, kerberos, or md5 and not trust. I'm using md5 already. I currently use fail2ban for proftpd and sshd and it works great. After 6 failed user/pass attempts on either of these services, the IP gets banned via iptables for 24 hours. I love it. I was wondering if I could use that. Of course postgresql port is not exposed to the WAN which is a good thing. I know that when I put in a wrong user/pass from my index page, I get sent to a default postgresql pg_connect warning page. Perhaps I can increase the verbosity of postgresql's logger, find the phrase that it spits out when there's been a bad login and create a filter using that.
I understand that the way it is currently setup, my server is pretty secure, but where there's a will there's a way. I just feel that my postgresql database is unprotected even tho the postgresql port is not exposed to the WAN. They could just bruteforce from the apache server.
View 12 Replies
View Related
Nov 19, 2010
I am using a linux fedora 12.0 with L7 filter and proxy as the main firewall for my system composed of some several hundred pcs. The port 80 is open for certain mac addresses these computers, that is to say that , only a few of these computers have access to internet and others have been denied. However, they have access to two specific websites on internet .
I would like to know that if there is a virus attack through these websites in form of executable adwares or malwares, can this linux firewall detect any information that might be directed out of those computers to the attacking source? In other words, is there s tuning in L7 filter or any other filter that can detect transfer of files or some bites through port 80 unrelated to normal http requests?
View 1 Replies
View Related
Feb 7, 2011
I was looking for some help getting a good list of IP tables and other security measures on my new Linux Centos VPS.. I have some files I wan't no one other than myself to have access to.. I will be running some gameservers on it on ports 7777 and 7778 though and I want to have VSFTPD running for fast file transfers.
View 1 Replies
View Related
Apr 27, 2011
There are multiple servers to be backed up. Different access rights exist in each server. There are two backup servers with plenty of disk space, one local, and one offsite. The local one feeds to the offsite one. The rsync command is being used to make a replica of backed up data. Deleted data is also being archived. There are two methods that have been considered: One is to have the individual servers run rsync which logs in to the backup server to push data. Two is to have the backup server run rsync which logs in to each individual server to pull data. Because system data is involved and meta information (like owning user) must be stored, root is required to access the data as well as to store it. That means everything runs as root both ends. So method one was quickly dismissed because each server would effectively have rights to access ALL the data on the backup server since it logs into the backup server as root. The security containment here involves different groups using different servers, and they need to be isolated from each other.
But even method two involves some risks that are a concern. This means one machine has access rights to every server. If the backup server were compromised, every machine could be compromised.What I'd like to find is some way to allow backups to be run without either machine granting root access to the other, while still running as root, or something equivalent, that allows accessing all data and storing all metadata. So I was looking at setting up an rsync daemon on each individual server (running as root so it can access what it is specified to access), and running an rsync client on the backup server (as root so it can store metadata). This opens network access issues. Any user on the network can connect to the rsync daemon. So password protection is needed. But this communication is also not encrypted, which exposes the password and the data should the network be sniffed.
So now I'm thinking about a non-root ssh login between machines. The backup server would login to a non-privileged user on each individual server and set up a secure forwarding channel to the rsync daemon. Is this the best that can be done? Is there a way to run rsync via SSL with key verification so it can all be done together? I'd like to have the rsync daemons configured to always talk SSL, and always verify the client's key against a list of authorized keys, and likewise the client verify the server's key against the known public key for that server.
View 14 Replies
View Related
Nov 22, 2010
easier way to forward email, in postfix, from a user to one domain for the user without listing every domain and user name? Example:send all of user joe's email to joe@somewhere, in which there are mulitple domains other than "somewhere".
Usual Given Example-
/etc/postfix/virtual:
joe@example.com joe@somewhere
jane@example.com jane@somewhere-else
[code]....
I'm looking for an easier way to forward email, verses having (ex) 50 different lines for 5 users and 10 domains.
View 2 Replies
View Related
May 12, 2010
I'm currently using Slackware 13.0 and have my machine behind a Linksys DD-WRT router. I believe the DD-WRT software has all ports blocked by default so opening up my machine for SSH login would only leave my system vulnerable at that port. To give an extra layer of security for that opened port, I've created the following script that would be invoked as the users' shell.
#!/bin/sh
#if SSH_CLIENT defined run nail with $SSH_CLIENT as an argument
if [[ -n ${SSH_CLIENT} ]]; then
[code]....
View 10 Replies
View Related
May 21, 2011
iam working on mail server in redhat centos. i want to know how to secure my mail server for heavy loading , any monitoring tools in GUI or console , is any essential tool which is used in Like MNC for mail server..
i know few command in like top,netstat,etc through google but i willing to know some more
View 8 Replies
View Related
Jan 19, 2011
I'm running an SFPT server which my clients logon to using an FTP client. at the moment each client has a user name and password.
Thus far to improve security I've disabled root login but an looking for futrhrt ways to protect it from attack, having researched using google some of the security features suggested prevent the FPT clients from connecting.
Questions:
1- what further things can i do to secure my server that still allows it to be usable for FTP clients?
2- specifically is it possible to use non login pre-share key authentication?
How i set up the server is shown here: [url]
View 3 Replies
View Related
Jul 10, 2011
That's the title of article at[URL]Did ubuntu do all this already or is it that ubuntu isn't secure out of the box that it is assumed to be?explain if these steps are applicable to ubuntu and why/why not.
View 5 Replies
View Related
Jan 29, 2010
I have a server on my router on the DMZ. All outside traffic goes to it. This server has Apache running and the domain mysite.com resolves to the the DMZ web server. I have a second server on the LAN that also has apache running. I want to set up another domain, myothersite.com to resolve to the second server on the LAN. Since the main server is on DMZ I have the DNS A records for myothersite.com pointing to the public IP that the DMZ is on.
How do I get myothersite.com to resolve to the second webserver on the LAN? What configuration do I need to do on my DMZ server so it routes traffic for myothersite.com to the other server on teh LAN? Do I use BIND DNS? If so please advise on how to set that up. BIND DNS seems confusing and I having trouble knowing how to configuring it. Is there another option besides BIND?
View 2 Replies
View Related
Apr 1, 2010
I have to deploy a server to some customers that should not be given access to the server itself. I know that nothing is 100% secure but I've searched without finding a decent answer (maybe I googled for the wrong terms ?)I need some advice about encrypted filesystem. * The server must boot without asking for a passphrase (the server will be in a restricted access area so typing a password could take a while). I can't store the password for luks in an unencrypted file so it seems a loop to me. The only way out I can see is to store the passphrase in the boot binaries (better than nothing...) but this results in more work for me.* possibly the customer should not be able to move the hard disks to another pc, i.e. reading the passphrase from some unique hardware ID. This is risky but I could add a master passphrase to be used in case of hardware replacement
View 3 Replies
View Related
Jun 9, 2011
We want to set up a Linux server (hosting Git or later SVN repositories) which should have all stored data strongly encrypted, so that if one steals the server the data cannot be read. For example, our notebooks have all important data stored on a "true-crypted" partition.
We plan to access it with SSH private keys and only after successful login should the data be readable. The server would be located in our office, shut down at night and not be connected to the Internet directly, but only accessible in our intranet.
View 1 Replies
View Related
Aug 18, 2010
I had some help via email from someone drafting my CV into the correct table format with open office. It's a .pdf file but now unfortunately lists the author in the document tab of properties as that person.
Is there anyway to change it to my own name, and also how do I 'secure' the document so that it's not easy for people viewing it to copy and paste, I've heard this is why many people now use .pdf for their CVs/rsums?
View 2 Replies
View Related
Nov 29, 2010
Recently I've been going over a few resources (like Guide to the Secure Configuration of Red Hat Enterprise Linux 5) some forum members have provided and I've been using other resources I use for work (like the UNIX STIG requirements). I would like to improve my skill-set on hardening a linux server (for work and personal interest). Is there a specific linux distro I can install that is purposely corrupted/vulnerable where the sole goal is to secure it, and then have the means to scan it to make sure all vulnerabilities are patched and secured?
View 6 Replies
View Related
Feb 13, 2011
step by step procedure of how to install Free Adobe Flex SDK in Ubuntu 10.04.
View 1 Replies
View Related
Jan 23, 2010
My son's desktop has Fedora 12 and a wireless card. Everything worked for a long time until one fine day the network management just disappeared from both System/Preferences menu and the panel on top.I can run a Live CD with Fedora 12 on that machine and it immediately connects to our home wireless network. Booting from hard drive has no sign of NM. Trying to run 'yum install NetworkManager-gnome' does nothing because there is no connection. Running the same command as a LiveUser from CD does seem to install everything (but where to???), no errors reported, and still the is no network functionality upon reboot from the hard drive, even when plugging to LAN with a cable.It seems that I need NetworkManager in order to go online in order to install NetworkManager.I have other computers at home that work fine, I was able to download a couple of archives with NM, but I am new to Linux and have no idea what to do with those files.I could not find any step-by-step installation guides for NM, especially when the computer has no connection at all.
View 8 Replies
View Related
Jun 26, 2011
Recent refugee from Ubuntu here. Fedora fan for one month.I have two computers that access the Internet through a router. They are assigned IPs dynamically by the router's DHCP. I need each computer to be able to "see" some shared folder on the other one, with RW permissions to that folder and its content.I want to use Nautilus to access those folders from each computer.
Tried NFS, Samba, gnome-user-share to no avail.
Willing to kill Fedora's firewall forever in order to ease folder sharing.Can some kind and knowledgeable person try a step by step setup guide for this? As an 8-year Linux user I am not afraid of command line interfaces.
View 9 Replies
View Related
Jul 18, 2010
I'm an absolute beginner trying to sue Linux. I just installed Ubuntu Linux Netbook Remix 10.04 LTS and everything's fine. I just wanted to have Java in my Ubuntu. I downloaded JDK from Sun website. There are 2 files
jdk-6u21-linux-i586.bin
jdk-6u21-linux-i586-rpm.bin
I searched the web for instructions on how to install but I just get confused. Can anyone provide me with step-by-step installation including registering environment variable ?
View 1 Replies
View Related
Jun 6, 2011
i would want someone who would like to assist me as i start to use linux because i am naive to this platform. Also want a step to step approach to this platform called linux i mean a self explanatory article or tutorial
View 8 Replies
View Related
Apr 4, 2011
Are there any document or website for creating MRTG with CentOS 5.5 step by step?
View 1 Replies
View Related
May 21, 2011
i installed rtorrent using the script in the rtorrent forum it installed webmin and vsftpd.vsftpd shows connection refused tried everything open port 990 in iptable disable selinux but not working someone tell me step by step to reinstall vsftpd on ubuntu 10.0.4 (32bit)
View 1 Replies
View Related
Sep 7, 2010
mention an example step by step procedure for adding a PLUGIN in Cacti. And also mention what does a PLUGIN serve in Cacti ? I am a newbie to cacti please consider my silly questions.
View 1 Replies
View Related
Sep 4, 2010
I have read a bajillion tutorials and have gotten nowhere. This is my first Linux box, and it has been nothing but headaches. i'm pretty handy around computers, I took a Unix class, and I used Dos as a kid, but i'm just having so much trouble with this.I just want to remotely control my Ubuntu box from my windows laptop over my home network. That's it. I cannot find one comprehensive step-by-step tutorial that will show me how to do this. Everything I find assumes I know at least something about linux, and I don't.
I have Putty, realvnc and tightvnc viewer installed on my laptop.I have open-ssh and vx11 somethingorotherinstalled on the Ubuntu box. I have also allowed remote connections on Ubuntu from system>preferences. I am getting very frustrated and would really appreciate someone giving me some help. So far I HAVE been able to remotely control the box through one method. Through the GUI on ubuntu I went to: System>Preferences>network connections
and set the server to static IP, then I was able to use real VNC viewer from my windows machine to connect to the IP I set (192.168.0.11) but I couldn't get there through servername.local or whatever it said. The problem witht his solution is that the Ubuntu box then couldn't connect to the internet (which I need it to do.) someone please please please direct me to the information I need for this simple task. I just need to remotely control the desktop, the reason I wanted to use vnc through ssh so that I can leave the ubuntu box headless. Using just VNC I was having problems when the box was rebooted (had to log in before I could remotely control it... something about a security key ring?)
View 7 Replies
View Related