[1843] in SIPB_Linux_Development

home help back first fref pref prev next nref lref last post

Re: suggestion for /etc/athena/inetd.conf

daemon@ATHENA.MIT.EDU (Erik Nygren)
Mon Oct 6 00:01:30 1997

To: "Kevin 'Bob' Fu" <fubob@MIT.EDU>
Cc: linux-dev@MIT.EDU, net-defense@MIT.EDU
In-Reply-To: Your message of "Sun, 05 Oct 1997 23:23:20 EDT."
             <199710060323.XAA02449@tiramisu.mit.edu> 
Date: Mon, 06 Oct 1997 00:00:58 EDT
From: Erik Nygren <nygren@MIT.EDU>


Kevin 'Bob' Fu wrote:
> Do people object to distributing the default /etc/athena/inetd.conf
> with "telnetd -a valid" set?
> 
> We should more activity discourage unencrypted logins.  Disallowing
> non-kerberized telnet is more convenient than dealing with sniffed
> passwords.

Before I would have objected, but I think we need to start taking more
actions to keep Linux Athena machines secure with the default installation.
I think there are a number of actions we need to take in the RedHat 4.2
release before it comes out of beta to improve its security:

* In order to notify users of security problems that require attention,
  we need to be able to contact them in some way.  One approach is for
  the machine to prompt for the owner's email address at install-time.
  This address could either be used to add the user to an announcement-only
  list, or could be used by the machine to send mail about things
  like needing to run update.pl when it changes.

* Make the system default to only allowing secure connections.
  As part of this, we should also include ssh in the distributions.
  (Apparently, there's a modified version that works with PAM).
  Users can enable insecure telnet themselves, but a comment
  in inetd.conf could discourage this.  Also distribute
  kerberized telnet and ssh client binaries for lots of platforms
  so that people don't have any excuse.  We have to make it
  as easy as possible for people to use them without any/much
  effort and without being sysadmins on the machines they're
  logging in from.  I think NetOps is working on this...

* Possibly have a script that checks for standard indications
  of break-ins (ie, weird files in /dev, changed login binary, 
  etc) and notifies the machine owner.

* Make subsystems (such as samba) not start up even if they are
  installed, but make it easy for users to enable them.
  Also comment out unnecessary things in inetd.conf.

I think taking this combination of actions could greatly
reduce the number of break-ins we're seeing.

In addition, we'll need to convince people to upgrade their systems.
There are lots of people with ancient swiss-cheese-like RedHat 3.0.3
and Slackware machines.

I suggested having a meeting last week but Thursday was a bad time.
Do people think a meeting would be useful, or should we just discuss
issues here?  Either way, something really needs to get done.

	Erik

home help back first fref pref prev next nref lref last post