Threats to Server Security
593
unwanted services, such as Telnet, DHCP, or DNS, to run on a server or workstation without the
administrator realizing it, which in turn can cause unwanted traffic to the server, or even, a potential
pathway into the system for crackers. Refer To
Section 43.2, “Server Security”
for information on
closing ports and disabling unused services.
42.3.3.2. Unpatched Services
Most server applications that are included in a default installation are solid, thoroughly tested pieces
of software. Having been in use in production environments for many years, their code has been
thoroughly refined and many of the bugs have been found and fixed.
However, there is no such thing as perfect software and there is always room for further refinement.
Moreover, newer software is often not as rigorously tested as one might expect, because of its recent
arrival to production environments or because it may not be as popular as other server software.
Developers and system administrators often find exploitable bugs in server applications and publish
the information on bug tracking and security-related websites such as the Bugtraq mailing list (
http://
www.securityfocus.com
) or the Computer Emergency Response Team (CERT) website (
http://
www.cert.org
). Although these mechanisms are an effective way of alerting the community to security
vulnerabilities, it is up to system administrators to patch their systems promptly. This is particularly
true because crackers have access to these same vulnerability tracking services and will use the
information to crack unpatched systems whenever they can. Good system administration requires
vigilance, constant bug tracking, and proper system maintenance to ensure a more secure computing
environment.
Refer to
Section 42.5, “Security Updates”
for more information about keeping a system up-to-date.
42.3.3.3. Inattentive Administration
Administrators who fail to patch their systems are one of the greatest threats to server security.
According to the
System Administration Network and Security Institute
(
SANS
), the primary cause of
computer security vulnerability is to "assign untrained people to maintain security and provide neither
the training nor the time to make it possible to do the job."
4
This applies as much to inexperienced
administrators as it does to overconfident or amotivated administrators.
Some administrators fail to patch their servers and workstations, while others fail to watch log
messages from the system kernel or network traffic. Another common error is when default passwords
or keys to services are left unchanged. For example, some databases have default administration
passwords because the database developers assume that the system administrator changes these
passwords immediately after installation. If a database administrator fails to change this password,
even an inexperienced cracker can use a widely-known default password to gain administrative
privileges to the database. These are only a few examples of how inattentive administration can lead
to compromised servers.
42.3.3.4. Inherently Insecure Services
Even the most vigilant organization can fall victim to vulnerabilities if the network services they choose
are inherently insecure. For instance, there are many services developed under the assumption that
they are used over trusted networks; however, this assumption fails as soon as the service becomes
available over the Internet — which is itself inherently untrusted.
Source:
http://www.sans.org/security-resources/mistakes.php
Содержание ENTERPRISE LINUX 5 - VIRTUAL SERVER ADMINISTRATION
Страница 22: ...xxii ...
Страница 28: ......
Страница 36: ...10 ...
Страница 40: ...14 ...
Страница 96: ...70 ...
Страница 116: ...90 ...
Страница 144: ...118 ...
Страница 146: ......
Страница 158: ...132 ...
Страница 165: ...Installing and Removing Packages 139 Figure 11 7 Installing and removing packages simultaneously ...
Страница 166: ...140 ...
Страница 172: ...146 ...
Страница 178: ......
Страница 228: ...202 ...
Страница 264: ...238 ...
Страница 318: ...292 ...
Страница 330: ...304 ...
Страница 388: ...362 ...
Страница 428: ...402 ...
Страница 452: ......
Страница 458: ...432 ...
Страница 476: ...450 ...
Страница 478: ...452 ...
Страница 494: ...468 ...
Страница 498: ...472 ...
Страница 530: ...504 ...
Страница 536: ...510 ...
Страница 544: ...Chapter 36 Log Files 518 Figure 36 7 Log file contents after five seconds ...
Страница 546: ......
Страница 550: ...524 ...
Страница 576: ......
Страница 584: ...558 ...
Страница 608: ......
Страница 776: ...750 ...
Страница 796: ...770 ...
Страница 800: ...774 ...
Страница 804: ......
Страница 806: ...780 ...
Страница 808: ...782 ...
Страница 816: ...790 ...
Страница 820: ...794 ...
Страница 822: ...796 ...
Страница 830: ...804 ...
Страница 836: ...810 ...
Страница 844: ...818 ...
Страница 848: ...822 ...