Linux Intrusion Detection/Defense System (LIDS) - Sowmya Ponugoti - Binita Mehta - Christopher James.

Slides:



Advertisements
Similar presentations
Drivers and the kernel1-1 Drivers and the kernel UNIX system has three layers: m The hardware m The operating system kernel m The user-level programs Kernel.
Advertisements

Exploring the UNIX File System and File Security
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
Chapter 2 Accessing Your System and the Common Desktop Environment.
MIS Chapter 51 Chapter 5 – Managing File Access MIS 431 Created Spring 2006.
Lesson 22 – Introduction to Linux Systems Administration.
Information Networking Security and Assurance Lab National Chung Cheng University F.I.R.E. Forensics & Incident Response Environment.
Apache : Installation, Configuration, Basic Security Presented by, Sandeep K Thopucherela, ECE Department.
2004, Jei F.I.R.E. Forensics & Incident Response Environment Information Networking Security and Assurance Lab National Chung Cheng University.
Overview Basic functions Features Installation: Windows host and Linux host.
Department Of Computer Engineering
NDT Tools Tutorial: How-To setup your own NDT server Rich Carlson Summer 04 Joint Tech July 19, 2004.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 6 Switch Configuration.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 6 Switch Configuration.
1 CCNA 3 v3.1 Module 6 Switch Configuration Claes Larsen, CCAI.
Guide to Linux Installation and Administration, 2e1 Chapter 8 Basic Administration Tasks.
Home Media Network Hard Drive Training for Update to 2.0 By Erik Collett Revised for Firmware Update.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 5: Managing File Access.
Managing User Accounts. Module 2 – Creating and Managing Users ♦ Overview ► One should log into a Linux system with a valid user name and password granted.
Controlling Files Richard Newman based on Smith “Elementary Information Security”
Exercise #1: Exploring Open- Source Operating Systems with Virtual Machines J. H. Wang Mar. 9, 2010.
Linux Operations and Administration
09/21/081 Ho Chi Minh city University of Technology Linux kernel R.M. Introduction of building Linux kernel from source.
SUSE Linux Enterprise Desktop Administration Chapter 14 Customize the Graphical Interface on SUSE Linux Enterprise Desktop 10.
Chapter Two Exploring the UNIX File System and File Security.
1 Objectives Manage and install new file systems.
Basic Router Configuration 1.1 Global configuration Cisco allows us to configure the router to support various protocols and interfaces. The router stores.
14 Step-by-Step Instructions for an Upgrade Installation n Prepare for the installation Verify that all devices and applications are Windows 2000 compatible.
Linux Capability Zutao Zhu 10/23/2009. Outline Question 2 Question 5 Question 6.
Troubleshooting and Performance
Guide to Linux Installation and Administration1 Chapter 4 Running a Linux System.
Welcome to JICA SHORT COURSE ON LINUX The Linux 6-Weeks Labs began on 17 Sept. There will be two sessions, currently scheduled for Tuesday 4-6PM and Wed.
There are three types of users in linux  System users: ?  Super user: ?  Normal users: ?
UNIX (Linux) Introduction Module-1. OS Kernel In computing, the kernel is the central component of OS. It is a bridge between applications and the actual.
Operating System What is an Operating System? A program that acts as an intermediary between a user of a computer and the computer hardware. An operating.
Manage Directories and Files in Linux. 2 Objectives Understand the Filesystem Hierarchy Standard (FHS) Identify File Types in the Linux System Change.
A Practical Guide to Fedora and Red Hat Enterprise Linux Unit 9: Basic Linux Administration Chapter 11: System Administration: Core Concepts Chapter 16:
Introduction to System Admin Sirak Kaewjamnong. 2 The system administration’s job  Adding a new user  Doing backup and restoring files from backups.
1 FreeBSD Installation AFNOG X Cairo, Egypt May 2009 Hervey Allen.
7200 Samsung Confidential & Proprietary Information Copyright 2006, All Rights Reserved. 1/16 OfficeServ 7200 Enterprise IP Solutions Data Server S/W Upgrade.
Operating Systems Proj.. Background A firewall is an information technology (IT) security device which is configured to permit, deny or proxy data connections.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.1 Module 6 Switch Configuration.
CSC414 “Introduction to UNIX/ Linux” Lecture 2. Schedule 1. Introduction to Unix/ Linux 2. Kernel Structure and Device Drivers. 3. System and Storage.
Securing the Linux Operating System Erik P. Friebolin.
CS 245 – Part 1 Using Operating Systems and Networks for Programmers Jiang Guo Dept. of Computer Science California State University Los Angeles.
LOGO Linux Installation. Linux Distribution Including shells, libraries, tools, compiler, servers, applications. Redhat, Fedora, Mandrake, SuSE, Debian,
CSC414 “Introduction to UNIX/ Linux” Lecture 6. Schedule 1. Introduction to Unix/ Linux 2. Kernel Structure and Device Drivers. 3. System and Storage.
Installing VERITAS Cluster Server. Topic 1: Using the VERITAS Product Installer After completing this topic, you will be able to install VCS using the.
Linux Administration – Finding You Way on the Command Line The Linux File Directory or Tree.
Operating System Kernel Compilation
RASPBERRY PI WORKSHOP.
Connect:Direct for UNIX v4.2.x Silent Installation
CCNA Routing and Switching Routing and Switching Essentials v6.0
Chapter 6 File Systems CSNB113 SYSTEM ADMINISTRATION
Data Server S/W Upgrade Samsung Electronics Co., Ltd.
CCNA 3 v3.1 Module 6 Switch Configuration
Chapter 10: Device Discovery, Management, and Maintenance
CCNA Routing and Switching Routing and Switching Essentials v6.0
Oracle Solaris Zones Study Purpose Only
Rootkit A rootkit is a set of tools which take the ability to access a computer or computer network at administrator level. Generally, hackers install.
Operating System Kernel Compilation
Exploring the UNIX File System and File Security
Chapter 10: Device Discovery, Management, and Maintenance
Setting Up Firewall using Netfilter and Iptables
IS3440 Linux Security Unit 7 Securing the Linux Kernel
OPS235: Week 1 Installing Linux (Lab1: Investigations 4 - )
COP 4343 Unix System Administration
SUSE Linux Enterprise Desktop Administration
Operating System Kernel Compilation
Objectives Topic 2.6 Understanding the boot process
Presentation transcript:

Linux Intrusion Detection/Defense System (LIDS) - Sowmya Ponugoti - Binita Mehta - Christopher James

Why LIDS File System is unprotected Processes are unprotected System administration is unprotected Super user may abuse his rights.

Introduction Linux Intrusion Detection/Defense System (LIDS) is a patch and set of admin tools which enhances the kernel’s security. When installed, chosen file access, system/network administration, any capability use, raw device, mem and I/O access can be made impossible even for root.

Features Protection  Protect important files and directories irrespective of the file system  Protect important processes  Prevent raw i/o operations by any unauthorized program Detection  Notice any activity on the system that violates the rules.

Features … Response  Log a detail message about the violated action to the system log file which has been protected by LIDS.  Send the log message to your mailbox.  Can also shutdown the user’s session immediately.

Building a Secure Linux System 1. Download LIDS patch and corresponding official Linux kernel  uncompress the Linux kernel source code tree. # cd linux_install_path/ # bzip2 -cd linux tar.bz2 | tar -xvf -  uncompress the lids source code # cd lids_install_path # tar -zxvf lids tar.gz

Building a Secure Linux System 2. Patch LIDS to official Linux kernel # cd linux_install_path/linux # patch -p1 </lids_install_path/lids-0.9pre patch 3. Configuring the Linux Kernel # make menuconfig or make xconfig Turn this option on [*] Prompt for development and/or incomplete code/drivers Entering the menu- "Linux Intrusion Detection System“ turn this option on [*] Linux Intrusion Detection System support (EXPERIMENTAL) (NEW).

Building a Secure Linux System Here are the options we turned on for LIDS  Security alert when executing unprotected programs before sealing  Try not to flood logs  Allow switching LIDS protections  Allow reloading the config file  Send security alerts through network After this compile the kernel following the usual steps

Building a Secure Linux System 4.Install LIDS admin tool into the Linux system # cd lids /lidsadm-0.9.8/ # make # make install 5. Configuring the LIDS System  Protecting Files and Directories DENY access to any body. # lidsadm -A -o /etc/shadow -j DENY # lidsadm -A -s /bin/login -o /etc/shadow -j READ

Building a Secure Linux System Read Only Files or Directories. # lidsadm -A -o /sbin/ -j READ Append Only Files. # lidsadm -A -o /var/log/message -j APPEND Our Configuration : lidsadm -Z lidsadm -A -o /usr/sbin -j READ lidsadm -A -o /usr/bin -j READ lidsadm -A -o /usr/lib -j READ

Building a Secure Linux System 6. Making a Password for LIDS lidsadm -P 7. Reboot into the New Kernel ! 8. Sealing the Kernel and Setting Capabilities We removed the following capabilities  CAP_CHOWN Overrides changing file and group ownership  CAP_NET_ADMIN Disallows Interface Configuration Disallows modification of routing tables..

Building a Secure Linux System  CAP_SYS_ADMIN Disallows mount() and umount() Disallows examination and configuration of disk quotas …  CAP_SYS_MODULE Disallows insertion and removal of kernel modules  CAP_SYS_TIME Disallows modification of System Time  CAP_SYS_BOOT Disallows reboot() command For Finally Sealing the Kernel without these capabilities : lidsadm –I -- -CAP_CHOWN –CAP_NET_ADMIN – CAP_SYS_ADMIN –CAP_SYS_MODULE –CAP_SYS_TIME – CAP_SYS_BOOT

Online Administration Switching LIDS On and Off # lidsadm -S -- -LIDS Changing the Configuration  Modify lids.cap or lids.conf  lidsadm -S -- +RELOAD_CONF

References “Building a Secure System with Lids” LIDS-Howto LIDS FAQ