chapter 21 security. computer center, cs, nctu 2 freebsd security advisories

28
Chapter 21 Chapter 21 Security Security

Upload: godwin-berry

Post on 31-Dec-2015

222 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Chapter 21 Security. Computer Center, CS, NCTU 2 FreeBSD Security Advisories

Chapter 21Chapter 21SecuritySecurity

Page 2: Chapter 21 Security. Computer Center, CS, NCTU 2 FreeBSD Security Advisories

Com

pu

ter C

en

ter, C

S, N

CTU

2

FreeBSD Security AdvisoriesFreeBSD Security Advisories

http://www.freebsd.org/security/advisors.html

Upcoming FreeBSD Security Advisory• Announced on 12/1

• Zero-day-exploit

Page 3: Chapter 21 Security. Computer Center, CS, NCTU 2 FreeBSD Security Advisories

Com

pu

ter C

en

ter, C

S, N

CTU

3

FreeBSD Security AdvisoriesFreeBSD Security Advisories

Advisory• Security information

Where to find it• freebsd-security-notifications Mailing list

http://lists.freebsd.org/mailman/listinfo/freebsd-security-notifications

• Web page (Security Advisories Channel) http://www.freebsd.org

Page 4: Chapter 21 Security. Computer Center, CS, NCTU 2 FreeBSD Security Advisories

Com

pu

ter C

en

ter, C

S, N

CTU

4

FreeBSD Security FreeBSD Security Advisories Advisories

Example• rtld

Page 5: Chapter 21 Security. Computer Center, CS, NCTU 2 FreeBSD Security Advisories

Com

pu

ter C

en

ter, C

S, N

CTU

5

FreeBSD Security FreeBSD Security Advisories (4)Advisories (4)

Example• Description

Page 6: Chapter 21 Security. Computer Center, CS, NCTU 2 FreeBSD Security Advisories

Com

pu

ter C

en

ter, C

S, N

CTU

6

FreeBSD Security FreeBSD Security Advisories (5)Advisories (5)

Example• Workaround

• Solution

Page 7: Chapter 21 Security. Computer Center, CS, NCTU 2 FreeBSD Security Advisories

Com

pu

ter C

en

ter, C

S, N

CTU

7

Common Security ProblemsCommon Security Problems

Unreliable wetware • Phishing site

Software bugs• FreeBSD security advisor

• portaudit

Open doors• Account password

• Disk share with the world

Page 8: Chapter 21 Security. Computer Center, CS, NCTU 2 FreeBSD Security Advisories

Com

pu

ter C

en

ter, C

S, N

CTU

8

Common trick Common trick

Tricks • ssh scan and hack

ssh guard sshit …

• Phishing • XSS & sql injection • …

Objective• Spam • Jump gateway • File sharing• …

Page 9: Chapter 21 Security. Computer Center, CS, NCTU 2 FreeBSD Security Advisories

Com

pu

ter C

en

ter, C

S, N

CTU

9

Process file system - procfsProcess file system - procfs

Procfs• A view of the system process table

• Normally mount on /proc

• mount –t procfs proc /proc

Page 10: Chapter 21 Security. Computer Center, CS, NCTU 2 FreeBSD Security Advisories

Com

pu

ter C

en

ter, C

S, N

CTU

10

Simple SQL injection exampleSimple SQL injection example

User/pass authentication

No input validation

SELECT * FROM usrTableWHERE user =AND pass = ;

SELECT * FROM usrTableWHERE user = ‘test’AND pass = ‘a’ OR ‘a’ = ‘a’

Page 11: Chapter 21 Security. Computer Center, CS, NCTU 2 FreeBSD Security Advisories

Com

pu

ter C

en

ter, C

S, N

CTU

11

setuid programsetuid program

/etc/passwd

• /etc/master.passwd is read only !

Setuid shell scripts are especially apt to cause security problems• Minimize the number of setuid programs

• Disable the setuid execution on individual filesystems -o nosuid

zfs[~] -chiahung- ls -al /usr/bin/passwd-r-sr-xr-x 2 root wheel 8224 Dec 5 22:00 /usr/bin/passwd

/usr/bin/find / -user root –perm -4000 –print |/bin/mail –s “Setuid root files” username

Page 12: Chapter 21 Security. Computer Center, CS, NCTU 2 FreeBSD Security Advisories

Com

pu

ter C

en

ter, C

S, N

CTU

12

Security issues Security issues

/etc/hosts.equiv and ~/.rhosts Trusted remote host and user name DB

• Allow user to login (via rlogin) and copy files (rcp) between machines without passwords

• Format: Simple: hostname [username] Complex: [+-][hostname|@netgroup]

[[+-][username|@netgorup]]

• Example bar.com foo (trust user “foo” from host “bar.com”) +@adm_cs_cc (trust all from amd_cs_cc group) +@adm_cs_cc -@chwong

Do not use this

Page 13: Chapter 21 Security. Computer Center, CS, NCTU 2 FreeBSD Security Advisories

Com

pu

ter C

en

ter, C

S, N

CTU

13

Security toolsSecurity tools

nmap jhon, crack PGP CA …

Page 14: Chapter 21 Security. Computer Center, CS, NCTU 2 FreeBSD Security Advisories

Com

pu

ter C

en

ter, C

S, N

CTU

14

Firewall Firewall

FreeBSD firewalls• ipfw -- IP firewall and traffic shaper control program

ipfw(8)

• ipf (IP Filter) - alters packet filtering lists for IP packet input and output

ipf(8)

• pf -- packet filter pf(4)

Page 15: Chapter 21 Security. Computer Center, CS, NCTU 2 FreeBSD Security Advisories

Com

pu

ter C

en

ter, C

S, N

CTU

15

Firewall (1)Firewall (1)

Using ipfw1. Add these options in kernel configuration file and recompile the

kernel

2. IPFW is already installed as run time loadable module Add firewall_enable=“YES” into /etc/rc.conf Unless NAT functionally is required

options IPFIREWALLoptions IPFIREWALL_VERBOSEoptions IPFIREWALL_VERBOSE=5options IPFIREWALL_DEFAULT_TO_ACCEPT

# firewallfirewall_enable="YES"firewall_script="etc/firewalls/rules"

Page 16: Chapter 21 Security. Computer Center, CS, NCTU 2 FreeBSD Security Advisories

Com

pu

ter C

en

ter, C

S, N

CTU

16

Firewall (2)Firewall (2)

3. Edit ipfw command script that you specify in rc.conf Ex: /etc/firewall/rules

4. ipfw command % sudo ipfw list (show current firewall rules) % sudo ipfw flush (delete all firewall rules)

% ipfw add {pass|deny} {udp|tcp|all} from where to where

Page 17: Chapter 21 Security. Computer Center, CS, NCTU 2 FreeBSD Security Advisories

Com

pu

ter C

en

ter, C

S, N

CTU

17

Firewall (3)Firewall (3)

Example (Head part)

#!/bin/sh

fwcmd="/sbin/ipfw -q“myip=“140.113.17.215”${fwcmd} -f flush

${fwcmd} add pass all from ${myip} to any

# Allow TCP through if setup succeeded${fwcmd} add pass tcp from any to any established${fwcmd} add deny log all from any to any fragecho -n "Established “

# Allow icmp (ping only)${fwcmd} add pass icmp from any to any icmptypes 0,3,8,11

Page 18: Chapter 21 Security. Computer Center, CS, NCTU 2 FreeBSD Security Advisories

Com

pu

ter C

en

ter, C

S, N

CTU

18

Firewall (4)Firewall (4)

Example (service part)

# Allow SMB${fwcmd} add pass tcp from 140.113.17.0/24 to ${myip} 137-139 setup

# Allow HTTP/HTTPS${fwcmd} add pass tcp from any to ${myip} 80 setup${fwcmd} add pass tcp from any to ${myip} 443 setupecho -n "HTTP/HTTPS "

# SSH access control${fwcmd} add pass tcp from any to any 22 setupecho -n "SSH "

Page 19: Chapter 21 Security. Computer Center, CS, NCTU 2 FreeBSD Security Advisories

Com

pu

ter C

en

ter, C

S, N

CTU

19

Firewall (5)Firewall (5)

Example (Tail part)

# Default to deny ${fwcmd} add 65500 reset log tcp from any to any ${fwcmd} add 65501 reject udp from any to any ${fwcmd} add 65502 reject log icmp from any to any ${fwcmd} add 65534 deny log all from any to any

Page 20: Chapter 21 Security. Computer Center, CS, NCTU 2 FreeBSD Security Advisories

Com

pu

ter C

en

ter, C

S, N

CTU

20

Firewall (6)Firewall (6)

Manual reset firewall rules• Edit the script and

• % sudo sh /etc/firewall/rules

When you install new service and wondering why it can not use…• % sudo ipfw flush

• Delete all firewall rules to remove problems caused by firewall

Page 21: Chapter 21 Security. Computer Center, CS, NCTU 2 FreeBSD Security Advisories

Com

pu

ter C

en

ter, C

S, N

CTU

21

Firewall (7)Firewall (7)

Debug your system via log file• /var/log/security

Dec 25 11:25:36 sabsd last message repeated 2 timesDec 25 11:45:06 sabsd kernel: ipfw: 65500 Reset TCP 211.48.52.58:1997 140.113.17.215:5554 in via fxp0Dec 25 11:45:07 sabsd kernel: ipfw: 65500 Reset TCP 211.48.52.58:1997 140.113.17.215:5554 in via fxp0Dec 25 11:45:07 sabsd kernel: ipfw: 65500 Reset TCP 211.48.52.58:4062 140.113.17.215:1023 in via fxp0Dec 25 11:45:08 sabsd kernel: ipfw: 65500 Reset TCP 211.48.52.58:4062 140.113.17.215:1023 in via fxp0Dec 25 11:45:09 sabsd kernel: ipfw: 65500 Reset TCP 211.48.52.58:4246 140.113.17.215:9898 in via fxp0Dec 25 12:05:44 sabsd kernel: ipfw: 65500 Reset TCP 204.100.126.30:2188 140.113.17.215:445 in via fxp0Dec 25 12:05:45 sabsd last message repeated 2 times

Page 22: Chapter 21 Security. Computer Center, CS, NCTU 2 FreeBSD Security Advisories

Com

pu

ter C

en

ter, C

S, N

CTU

22

TCP WrapperTCP Wrapper

There are something that a firewall will not handle• Sending text back to the source

TCP wrapper• Extend the abilities of inetd

Provide support for every server daemon under its control

• Logging support

• Return message

• Permit a daemon to only accept internal connetions

Page 23: Chapter 21 Security. Computer Center, CS, NCTU 2 FreeBSD Security Advisories

Com

pu

ter C

en

ter, C

S, N

CTU

23

TCP WrapperTCP Wrapper

TCP Wrapper• Provide support for every server daemon under its control

Page 24: Chapter 21 Security. Computer Center, CS, NCTU 2 FreeBSD Security Advisories

Com

pu

ter C

en

ter, C

S, N

CTU

24

TCP WrapperTCP Wrapper

To see what daemons are controlled by inetd, see /etc/inetd.conf

TCP wrapper should not be considered a replacement of a good firewall. Instead, it should be used in conjunction with a firewall or other security tools

#ftp stream tcp nowait root /usr/libexec/ftpd ftpd -l#ftp stream tcp6 nowait root /usr/libexec/ftpd ftpd -l#telnet stream tcp nowait root /usr/libexec/telnetd telnetd#telnet stream tcp6 nowait root /usr/libexec/telnetd telnetdshell stream tcp nowait root /usr/libexec/rshd rshd#shell stream tcp6 nowait root /usr/libexec/rshd rshdlogin stream tcp nowait root /usr/libexec/rlogind rlogind#login stream tcp6 nowait root /usr/libexec/rlogind rlogind

Page 25: Chapter 21 Security. Computer Center, CS, NCTU 2 FreeBSD Security Advisories

Com

pu

ter C

en

ter, C

S, N

CTU

25

TCP WrapperTCP Wrapper

To use TCP wrapper1. inetd daemon must start up with “-Ww” option (default)

Or edit /etc/rc.conf

• Edit /etc/hosts.allow Format:

daemon:address:actiondaemon:address:action

– daemon is the daemon name which inetd started– address can be hostname, IPv4 addr, IPv6 addr– action can be “allow” or “deny”

– Keyword “ALL” can be used in daemon and address fields to means everything

inetd_enable="YES"inetd_flags="-wW"

Page 26: Chapter 21 Security. Computer Center, CS, NCTU 2 FreeBSD Security Advisories

Com

pu

ter C

en

ter, C

S, N

CTU

26

/etc/hosts.allow/etc/hosts.allow

First rule match semantic• Meaning that the configuration file is scanned in ascending order for

a matching rule

• When a match is found, the rule is applied and the search process will stop

exampleALL : localhost, loghost @adm_cc_cs : allowptelnetd pftpd sshd: @sun_cc_cs, @bsd_cc_cs, @linux_cc_cs : allowptelnetd pftpd sshd: zeiss, chbsd, sabsd : allowidentd : ALL : allowportmap : 140.113.17. ALL : allowsendmail : ALL : allowrpc.rstatd : @all_cc_cs 140.113.17.203: allowrpc.rusersd : @all_cc_cs 140.113.17.203: allowALL : ALL : deny

Page 27: Chapter 21 Security. Computer Center, CS, NCTU 2 FreeBSD Security Advisories

Com

pu

ter C

en

ter, C

S, N

CTU

27

/etc/hosts.allow/etc/hosts.allow

Advance configuration• External commands (twist option)

twist will be called to execute a shell command or script

• External commands (spawn option) spawn is like twist, but it will not send a reply back to the client

# The rest of the daemons are protected.telnet : ALL \ : severity auth.info \ : twist /bin/echo "You are not welcome to use %d from %h."

# We do not allow connections from example.com:ALL : .example.com \ : spawn (/bin/echo %a from %h attempted to access %d >> \ /var/log/connections.log) \ : deny

Page 28: Chapter 21 Security. Computer Center, CS, NCTU 2 FreeBSD Security Advisories

Com

pu

ter C

en

ter, C

S, N

CTU

28

/etc/hosts.allow/etc/hosts.allow

• Wildcard (PARANOID option) Match any connection that is made from an IP address that differs from

its hostname

See• man 5 hosts_access

• man 5 hosts_options

# Block possibly spoofed requests to sendmail: sendmail : PARANOID : deny