CIS 290 LINUX Security Tripwire file integrity and change management tool and log monitoring.

Slides:



Advertisements
Similar presentations
Presented by Nikita Shah 5th IT ( )
Advertisements

CIS 193A – Lesson3 Vigilance! Logging & Monitoring Syslog Logrotate Logwatch Accounting.
Setting up and configuring BCO EE (BPA) Linux Console How I Learned to Stop Worrying and Love BCO EE Dima Seliverstov 3/3/2014.
Using Nagios for Intrusion detection Miguel Cárdenas Montes Elio Pérez Calle Francisco Javier Rodríguez Calonge.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
Lecture 10: The FAT, VFAT, and NTFS Filesystems 6/17/2003 CSCE 590 Summer 2003.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 12: Managing and Implementing Backups and Disaster Recovery.
2004, Jei Tripwire An Intrusion Detection Tool Information Networking Security and Assurance Lab National Chung Cheng University.
Security SIG: Introduction to Tripwire Chris Harwood John Ives.
Chapter 12 File Management Systems
Presented by C.SARITHA ( 07R91A0568) INTRUSION DETECTION SYSYTEM.
Linux+ Guide to Linux Certification, Second Edition
Maintaining and Updating Windows Server 2008
Backup and Recovery Part 1.
9 Copyright © Oracle Corporation, All rights reserved. Oracle Recovery Manager Overview and Configuration.
AfChix 2011 Blantyre, Malawi Log management. Log management and monitoring ■ What is log management and monitoring ? ● It's about keeping your logs in.
Intrusion Prevention, Detection & Response. IDS vs IPS IDS = Intrusion detection system IPS = intrusion prevention system.
Linux Networking and Security Chapter 10 File Security.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Tripwire Enterprise Server Rule Sets Vincent Fox, Doreen Meyer, and Paul Singh UC Davis, Information and Educational Technology July 25, 2006.
CLI modes Accessing the configuration Basic configuration (hostname and DNS) Authentication and authorization (AAA) Log collection Time Synchronization.
1 Chapter 12 File Management Systems. 2 Systems Architecture Chapter 12.
Chapter Oracle Server An Oracle Server consists of an Oracle database (stored data, control and log files.) The Server will support SQL to define.
CLI modes Accessing the configuration Basic configuration (hostname and DNS) Authentication and authorization (AAA) Log collection Time Synchronization.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Managing User Accounts. Module 2 – Creating and Managing Users ♦ Overview ► One should log into a Linux system with a valid user name and password granted.
SCSC 455 Computer Security Chapter 4 File Security.
Linux Operations and Administration
CIS 450 – Network Security Chapter 16 – Covering the Tracks.
System logging and monitoring
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
Event Management & ITIL V3
System Monitoring and Automation. 2 Section Overview Automation of Periodic Tasks Scheduling and Cron Syslog Accounting.
TELE 301 Lecture 10: Scheduled … 1 Overview Last Lecture –Post installation This Lecture –Scheduled tasks and log management Next Lecture –DNS –Readings:
Day 11 SAMBA NFS Logs Managing Users. SAMBA Implements the ability for a Linux machine to communicate with and act like a Windows file server. –Implements.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
Guide to Linux Installation and Administration, 2e1 Chapter 10 Managing System Resources.
Linux+ Guide to Linux Certification, Third Edition
Database Design and Management CPTG /23/2015Chapter 12 of 38 Functions of a Database Store data Store data School: student records, class schedules,
Maintaining and Updating Windows Server Monitoring Windows Server It is important to monitor your Server system to make sure it is running smoothly.
Section 11: Implementing Software Restriction Policies and AppLocker What Is a Software Restriction Policy? Creating a Software Restriction Policy Using.
Ch11: Syslog and Logfiles Presented by: Apichana Thiantanawat 06/11/02.
1 Periodic Processes and the cron Daemon The cron daemon is where all timed events are initiated. The cron system is serviced by the cron daemon. What.
Unix Security.  Security architecture  File system and user accounts  Integrity management  Auditing and intrusion detection.
Troubleshooting Security Issues Lesson 6. Skills Matrix Technology SkillObjective Domain SkillDomain # Monitoring and Troubleshooting with Event Viewer.
CIS 193A – Lesson 6 Intrusion Detection. CIS 193A – Lesson 6 Focus Question What Linux utilities and third party software is there for detecting an intrusion?
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
Cosc 4750 Log files Logging policies Throw away all data immediately Reset log files at periodic intervals Rotate logs files, keeping data for a fixed.
CS 346 – Chapter 11 File system –Files –Access –Directories –Mounting –Sharing –Protection.
Security fundamentals Topic 2 Establishing and maintaining baseline security.
Carlos Armas Roundtrip Networks Hervey Allen NSRC.
The world leader in serving science Overview of Thermo 21 CFR Part 11 tools Overview of software used by multiple business units within the Spectroscopy.
Hyperion Artifact Life Cycle Management Agenda  Overview  Demo  Tips & Tricks  Takeaways  Queries.
 Introduction  Tripwire For Servers  Tripwire Manager  Tripwire For Network Devices  Working Of Tripwire  Advantages  Conclusion.
Maintaining and Updating Windows Server 2008 Lesson 8.
17 Copyright © 2006, Oracle. All rights reserved. Information Publisher.
IDS And Tripwire Rayhan Mir COSC 356. What is IDS IDS - Intrusion detection system Primary function – To monitor network or host resources to detect intrusions.
SQL Database Management
Architecture Review 10/11/2004
COP 4343 Unix System Administration
Cosc 4750 Log files.
CONTENT MANAGEMENT SYSTEM CSIR-NISCAIR, New Delhi
IBM Software Group | Tivoli Brand Software
Printer Admin Print Job Manager
IIS.
IS3440 Linux Security Unit 9 Linux System Logging and Monitoring
TRIP WIRE INTRUSION DETECTION SYSYTEM Presented by.
Sending data to EUROSTAT using STATEL and STADIUM web client
Presentation transcript:

CIS 290 LINUX Security Tripwire file integrity and change management tool and log monitoring

Security Policy Data integrity -Assuring that the object (files, systems registry) and infrastructure items (server data, Web page content, router configurations etc.) remain in a desired good state. -Deviations from the desired state are identified via an integrity check. -Alerts will be generated and routed to the appropriate parties, and other software systems, enabling rapid recovery Detect improper modification

Tripwire Runs in active or passive mode Gives system admins ability to monitor for added, deleted & modified files Is now a commercial product (note the package level) Checks for changes in file attributes, e.g.: – size, – access & modification timestamps, – permissions, – inode number – signature (more on signature later)

Tripwire UNIX File system Permissions Inode number Number of links (i.e. inode reference count) User ID of owner Group ID of owner File type File size File is expected to grow Device number of the disk on which the inode is stored Device number of the device to which the inode points. Number of blocks allocated Access timestamp Modification timestamp Inode creation / modification timestamp CRC-32 hash of the data MD5 hash of the data SHA hash of the data HAVAL hash of the data

Checking Techniques Established techniques: maintaining checklists, comparison copies, checksum records or backup tapes These methods are costly, prone to error and susceptible to easy spoofing Intruders w/ root privileges can alter checklists or compromise utilities (eg “ls”) Changes to a file can be made w/out changing its length or checksum.

Tripwire files Configuration file (tw.cfg) derived from twcfg.txt Policy file (tw.pol) derived from twpol.txt – list of files & directories to be monitored – their associated selection mask (list attributes that can safely be ignored) Database file --describes each “file” – automatically generated – set of file names, inode attribute values, signature info., associated tw.pol entry

Tripwire Component Overview generate newly generated database tw.config file old database compare apply ignore-masks Tripwire report Files residing on system

Integrity Checking Mode Generate new database Compare new database with baseline db Produce report of added & deleted files Apply selection mask to modified files

Syslog (r)syslog is a utility for tracking and logging all manner of system messages from the merely informational to the extremely critical. Sysogs stored in In LINUX, system logs are stored in /var/log. System messages are recorded in /var/log/messages. Other OS’es may use different files in different directories (e.g. /var/adm). Each system message sent to the syslog server has two descriptive labels associated with it that makes the message easier to handle. - The first describes the function (facility) of the application that generated it. For example, applications such as mail and cron generate messages with easily identifiable facilities named mail and cron. - The second describes the degree of severity of the message.

Syslog Severity:Level: Keyword: Description 0 emergencies System unusable 1 alerts Immediate action required 2 critical Critical condition 3 errors Error conditions 4 warnings Warning conditions 5 notifications Normal but significant conditions 6 informational Informational messages 7 debugging Debugging messages

Syslog The files to which syslog writes each type of message received is set in the /etc/rsyslog.conf configuration file. In older versions of Fedora, this file was named /etc/syslog.conf. This file consists of two columns. The first lists the facilities and severities of messages to expect and the second lists the files to which they should be logged. By default, RedHat/Fedora's /etc/rsyslog.conf file is configured to put most of the messages in the file /var/log/messages. Example: *.info;mail.none;authpriv.none;cron.none /var/log/messages Note other services may record messages in other files (e.g. sendmail) Syslog is also a network service. A common implementation is to forward system info to a common syslog server. Logs compressed,,stored and optionally ed by the logrotate function. Definitions stored in /etc/logrotate.conf and /etc/logrotate.d

Logrotate Log management for LINUX and UNIX Basic config file is /etc/logrotate.conf Individual package package config files in/etc/logrotate.d usually configured during package installation Each config file specifies logfile list, rotate interval, rotation count, log size, compression options, postrotate command to perform a function after the log has been copied.

Logrotate automation UNIX systems require use of a specific CRON job LINUX automatically includes logrotate in ANACRON. ANACRON is an automatic CRON list created for system functions such as logtotate or tripwire. It is an extension of CRON. See /etc files anacron, cron.daily, cron.weekly, cron.monthly. Also /var/spool/anacron

Logwatch Default freeware log monitoring tool Runs in Perl Numerous other “pay for play” tools: -Logrobot -Nagios -Logstash -Graybar

Logwatch files System specific config: /etc/logwatch Default config: /usr/share/logwatch/default.conf/ Distro specific config: /usr/share/logwatch/distro.conf/ Directories: conf /*.conf, conf/logfiles, conf/services scripts/services Always copy default, distro files to local /etc/logwatch for modification Priority sequence: - /etc/logwatch - /usr/share/logwatch/distro.conf - /usr/share/logwatch/default.conf

Security today Governement regulations: -HIPAA -PCI-DSS -SOX No clear text applications – FTP, TELNET, NFS, RCP, RCMD, HTTP Restricted access, minimum to do the job Most legacy 3 rd party apps are now commercial products: - ssh - Nagios - Tripwire - PGP Some have freeware equivalents, but fewer over time.