Metalworking (rec.crafts.metalworking) Discuss various aspects of working with metal, such as machining, welding, metal joining, screwing, casting, hardening/tempering, blacksmithing/forging, spinning and hammer work, sheet metal work.

Reply
 
LinkBack Thread Tools Search this Thread Display Modes
  #1   Report Post  
DoN. Nichols
 
Posts: n/a
Default Warning VIRUS (was: Fw: Do not release, its the internal rls!)

In article ,
Tim Williams wrote:
"DoN. Nichols" wrote in message
...
And how many know automatically that they should go in and turn
it off?


At least as many as those think they should bypass it altogether and get
Linux.


Which, then, leaves an awful lot of systems wide open.

I'm not sure whether you want to lump me into that last
category, as I'm normally using Sun's Solaris and OpenBSD's unix, not
linux. :-)

Enjoy,
DoN.
--
Email: | Voice (all times): (703) 938-4564
(too) near Washington D.C. | http://www.d-and-d.com/dnichols/DoN.html
--- Black Holes are where God is dividing by zero ---
  #2   Report Post  
Dave Hinz
 
Posts: n/a
Default

On 7 Feb 2005 20:48:02 -0500, DoN. Nichols wrote:
In article ,
Tim Williams wrote:
"DoN. Nichols" wrote in message
...
And how many know automatically that they should go in and turn
it off?


At least as many as those think they should bypass it altogether and get
Linux.


Which, then, leaves an awful lot of systems wide open.

I'm not sure whether you want to lump me into that last
category, as I'm normally using Sun's Solaris and OpenBSD's unix, not
linux. :-)


How's OpenBSD? I've been using FreeBSD lately for my intel (and Mac,
obvously), and it seems very stable, and everything works. Bull****
and advocacy aside, any good reason to pick Open over Free?

Dave Hinz
  #3   Report Post  
DoN. Nichols
 
Posts: n/a
Default

In article ,
Dave Hinz wrote:
On 7 Feb 2005 20:48:02 -0500, DoN. Nichols wrote:


[ ... ]

I'm not sure whether you want to lump me into that last
category, as I'm normally using Sun's Solaris and OpenBSD's unix, not
linux. :-)


How's OpenBSD? I've been using FreeBSD lately for my intel (and Mac,
obvously), and it seems very stable, and everything works. Bull****
and advocacy aside, any good reason to pick Open over Free?


That is a good question. I don't use FreeBSD, so I can't do a
true comparison, but OpenBSD is predicated on careful analysis of all of
the source code, and having only things which are *trusted* turned on in
the system as it installs. Things like sendmail (which is of
questionable security, just based on history, and which *must* run as
root) are run in a "chroot jail", so there are severe limitations on
what it can do to the rest of the system.

Also -- if you want to establish a truly hardened system as a
firewall -- start with "pf" (packet filter), which I understand that
FreeBSD has picked up from OpenBSD, get the system configured and
running as you want, and then set the bits using "chflags" (like chmod,
but it works on a different set of flags). You can set the following
flags on a file-by-file basis:

================================================== ====================
arch set the archived flag
opaque set the opaque flag (owner or superuser only)
nodump set the nodump flag (owner or superuser only)
sappnd set the system append-only flag (superuser only)
schg set the system immutable flag (superuser only)
uappnd set the user append-only flag (owner or superuser only)
uchg set the user immutable flag (owner or superuser only)
================================================== ====================

In particular, look at the last four, with "schg" and "sappnd" being the most
important. Once you have those set, edit the "/etc/rc.securelevel" file
to set "Securelevel" to a value of 1 (the default in mult-user mode) or greater.

Here is the man page for securelevel, so you can see just how
tight it can make a system.


================================================== ====================
SECURELEVEL(7) OpenBSD Reference Manual SECURELEVEL(7)

NAME
securelevel - securelevel and its effects

SYNOPSIS
The OpenBSD kernel provides four levels of system security:

-1 Permanently insecure mode
- init(8) will not attempt to raise the securelevel
- may only be set with sysctl(8) while the system is insecure
- otherwise identical to securelevel 0

0 Insecure mode
- used during bootstrapping and while the system is single-user
- all devices may be read or written subject to their permissions
- system file flags may be cleared

1 Secure mode
- default mode when system is multi-user
- securelevel may no longer be lowered except by init
- /dev/mem and /dev/kmem may not be written to
- raw disk devices of mounted file systems are read-only
- system immutable and append-only file flags may not be removed
- kernel modules may not be loaded or unloaded
- the fs.posix.setuid sysctl(8) variable may not be raised
- the net.inet.ip.sourceroute sysctl(8) variable may not be
raised

2 Highly secure mode
- all effects of securelevel 1
- raw disk devices are always read-only whether mounted or not
- settimeofday(2) and clock_settime(2) may not set the time back-
wards or close to overflow
- pfctl(8) may no longer alter filter or nat rules
- the ddb.console and ddb.panic sysctl(8) variables may not be
raised

DESCRIPTION
Securelevel provides convenient means of ``locking down'' a system to a
degree suited to its environment. It is normally set at boot via the
rc.securelevel(8) script, or the superuser may raise securelevel at any
time by modifying the kern.securelevel sysctl(8) variable. However, only
init(8) may lower it once the system has entered secure mode. A kernel
built with option INSECURE in the config file will default to permanently
insecure mode.

Highly secure mode may seem Draconian, but is intended as a last line of
defence should the superuser account be compromised. Its effects pre-
clude circumvention of file flags by direct modification of a raw disk
device, or erasure of a file system by means of newfs(8). Further, it
can limit the potential damage of a compromised ``firewall'' by prohibit-
ing the modification of packet filter rules. Preventing the system clock
from being set backwards aids in post-mortem analysis and helps ensure
the integrity of logs. Precision timekeeping is not affected because the
clock may still be slowed.

Because securelevel can be modified with the in-kernel debugger ddb(4), a
convenient means of locking it off (if present) is provided on highly se-
cure systems. This is accomplished by setting ddb.console and ddb.panic
to 0 with the sysctl(8) utility.

FILES
/etc/rc.securelevel commands that run before the security level changes

SEE ALSO
chflags(2), settimeofday(2), mem(4), options(4), init(8), rc(8),
sysctl(8)

HISTORY
The securelevel manual page first appeared in OpenBSD 2.6.

BUGS
The list of securelevel's effects may not be comprehensive.

OpenBSD 3.5 January 4, 2000 2
================================================== ====================

So -- you see that the combination of the immutable flags on
properly selected files and the securelevel make it very difficult for
the system to be modified without going to single-user mode -- which
means that anyone attacking from the net cannot get in while in
single-user mode. (That is -- all networking is turned off in that
mode.) Obviously, log files would only get the append-only flag, not
the immutable one.

But OpenBSD prides itself on the security of the default install
of the system. Yes -- you can do things to reduce the security of the
system, such as opting to not run apache in a chroot jail, and to not
run it in /var, which by default is mounted "nodev" and "nosuid", making
it more difficult to get out of the chroot jail.

I hope that this helps,
DoN.
--
Email: | Voice (all times): (703) 938-4564
(too) near Washington D.C. | http://www.d-and-d.com/dnichols/DoN.html
--- Black Holes are where God is dividing by zero ---
  #4   Report Post  
Dave Hinz
 
Posts: n/a
Default

On 8 Feb 2005 21:57:19 -0500, DoN. Nichols wrote:
In article ,
Dave Hinz wrote:


and advocacy aside, any good reason to pick Open over Free?


That is a good question. I don't use FreeBSD, so I can't do a
true comparison, but


(read and saved. Thank you for an obviously non-trivial amount of
time and advice, Don.)

(huge snip))

I hope that this helps,


It does indeed. I need to build a mailhub, I'm thinking postfix,
and I'll give OpenBSD a shot. Thanks.

Dave
  #5   Report Post  
DoN. Nichols
 
Posts: n/a
Default

In article ,
Dave Hinz wrote:
On 8 Feb 2005 21:57:19 -0500, DoN. Nichols wrote:
In article ,
Dave Hinz wrote:


and advocacy aside, any good reason to pick Open over Free?


That is a good question. I don't use FreeBSD, so I can't do a
true comparison, but


(read and saved. Thank you for an obviously non-trivial amount of
time and advice, Don.)


You're welcome.

(huge snip))

I hope that this helps,


It does indeed. I need to build a mailhub, I'm thinking postfix,
and I'll give OpenBSD a shot. Thanks.


When you get there -- drop me an e-mail first. It obviously
does not belong on this newsgroup, but there are some interesting kinks
in the way sendmail is started and messages are inserted in OpenBSD.
And you will be setting this up as a replacement for sendmail, I
presume? I've not dealt with postfix. (Hmm ... maybe it is in the
packages tree already.)

I learned about these kinks in the process of setting up qmail
to replace sendmail.

Oh yes -- and is there a non-spamcop e-mail address for you?
I'll probably just drop things if I hit a challenge-and-response type of
service -- just general principles.

Enjoy,
DoN.
--
Email: | Voice (all times): (703) 938-4564
(too) near Washington D.C. | http://www.d-and-d.com/dnichols/DoN.html
--- Black Holes are where God is dividing by zero ---


  #6   Report Post  
Dave Hinz
 
Posts: n/a
Default

On 8 Feb 2005 23:32:47 -0500, DoN. Nichols wrote:
In article ,
Dave Hinz wrote:
On 8 Feb 2005 21:57:19 -0500, DoN. Nichols wrote:


When you get there -- drop me an e-mail first. It obviously
does not belong on this newsgroup, but there are some interesting kinks
in the way sendmail is started and messages are inserted in OpenBSD.


Good to know, you'll have mail shortly.

Oh yes -- and is there a non-spamcop e-mail address for you?
I'll probably just drop things if I hit a challenge-and-response type of
service -- just general principles.


Nope, I don't do the challenge/response thing anymore, and unless you're
in one of the dozen or so blacklists I scrub with and/or write to me
about mortgages, viagra, or whatever else, I'd see an email immediately.
I'm really pleased with how well spamcop filters stuff while not blocking
legitimate messages.

Dave
Reply
Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes

Posting Rules

Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


Similar Threads
Thread Thread Starter Forum Replies Last Post
Warning VIRUS (was: Fw: Do not release, its the internal rls!) DoN. Nichols Metalworking 8 February 7th 05 07:43 PM
Virus Warning Fred Holder Woodturning 4 December 16th 04 02:46 PM
Drilling through internal solid walls........... Paul Duffy UK diy 5 August 5th 04 11:18 PM
"Damp" internal wall - initial measurements made. Any ideas? Clive Long,UK UK diy 5 January 30th 04 09:28 AM
W.C Internal Overflow hays UK diy 5 October 11th 03 10:11 PM


All times are GMT +1. The time now is 09:13 AM.

Powered by vBulletin® Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
Copyright ©2004-2024 DIYbanter.
The comments are property of their posters.
 

About Us

"It's about DIY & home improvement"