Sicherheitsmassnahmen für UNIX Dr. Stefan Turowski Systemkolloquium WS 2003/2004 13. Januar 2004.

Slides:



Advertisements
Ähnliche Präsentationen
Wie mache ich mein UNIX-System sicher(er)? Stefan Turowski.
Advertisements

Verbs Used Impersonally With Dative Deutsch I/II Fr. Spampinato.
Can you think of some KEY phrases which would be useful in multiple contexts? Take 2 minutes with a partner and come up with as many as you can!
| DC-IAP/SVC3 | © Bosch Rexroth Pneumatics GmbH This document, as well as the data, specifications and other information set forth in.
You need to use your mouse to see this presentation © Heidi Behrens.
You need to use your mouse to see this presentation © Heidi Behrens.
CALPER Publications From Handouts to Pedagogical Materials.
Greetings and goodbyes Deutschland v. USA
Der formelle Imperativ – the Imperative
Sprachneuerungen des .NET Frameworks 3.5
Einfaches Erstellen von Präsentationen aus Einzelfolien heraus.
Stephanie Müller, Rechtswissenschaftliches Institut, Universität Zürich, Rämistrasse 74/17, 8001 Zürich, Criminal liability.
Ralf M. Schnell Technical Evangelist Microsoft Deutschland GmbH
Ralf M. Schnell Technical Evangelist Microsoft Deutschland GmbH.
Literary Machines, zusammengestellt für ::COLLABOR:: von H. Mittendorfer Literary MACHINES 1980 bis 1987, by Theodor Holm NELSON ISBN
You need to use your mouse to see this presentation © Heidi Behrens.
Arbeiten in einem agilen Team mit VS & TFS 11
Page  1 YOUR LOGO This text can be replaced with your text. POLAROIDCHART.
? What is Open PS? SAP Open PS based on EPS 4.0
Welcome to Web Services & Grid Computing Jens Mache
Software and Searchengines
3rd Review, Vienna, 16th of April 1999 SIT-MOON ESPRIT Project Nr Siemens AG Österreich Robotiker Technische Universität Wien Politecnico di Milano.
Possessive Adjectives How to show belonging… The information contained in this document may not be duplicated or distributed without the permission of.
Thema: Umwelt: Was könnte man tun, um der Umwelt zu helfen?
GERMAN 1013 Kapitel 5 Review. terminology Word types: –nouns, pronouns, verbs, adjectives, prepositions … Functions: –subject, predicate, object … Form.
Schreiben Sie fünf Sätze aus diesen Elementen. [Beispiel
Asking someone out in German.
COMMANDS imperative There are three command forms: formal familiar singular familiar plural.
COMMANDS imperative 1. you (formal): Sie 2. you (familiar plural): ihr
The Workers‘ Freedom The debate about industrial democracy in Germany and Sweden, Klaus Neumann presentation held at the.
1 Konica Minolta IT Solutions Prinzip Partnerschaft MANAGED MONITORING ÜBERWACHJUNG DER SERVERINFRASTRUKTUR UND ANWENDUNGEN DIREKT AUS DER CLOUD.
Gregor Graf Oracle Portal (Part of the Oracle Application Server 9i) Gregor Graf (2001,2002)
© Crown copyright 2011, Department for Education These materials have been designed to be reproduced for internal circulation, research and teaching or.
Imperfekt (Simple Past) Irregular or strong verbs
Kapitel 2 Grammar INDEX 1.Subjects & Verbs 2.Conjugation of Verbs 3.Subject Verb Agreement 4.Person and Number 5.Present Tense 6.Word Order: Position of.
Fragen Wo wohnen Chris und Richard? Was bekommt Chris? Woher ist der Brief? Wer arbeitet in Zürich? Wo ist Zürich? Wann fährt ein Zug nach Zürich ab? Wo.
Großvater Großmutter Großvater Großmutter Tante/Onkel Vater Mutter.
Sven Koerber-Abe, 2015 Grammatik: müssen, dürfen Grammatik: müssen, dürfen.
Position Sven Koerber-Abe, 2015 ▪ ▪. in Der PC ist in ___ Box.
© 2012 IBM Corporation © 2013 IBM Corporation IBM Storage Germany Community Josef Weingand Infos / Find me on:
January 2014 Message manager add-on for SAP SMS 365, enterprise service Automator.
Technische Universität München Institute of Aeronautical Engineering Prof. Dr.-Ing. Horst Baier Presentation of the Institute (December 2009)
Custom error page for timeout Gergely Andó / Application Innovation July 10, 2013 Customer.
LLP DE-COMENIUS-CMP Dieses Projekt wurde mit Unterstützung der Europäischen Kommission finanziert. Die Verantwortung für den Inhalt dieser.
My great friends let this not come to you as Meine großen Freunde, lasst dies nicht zu uns kommen, als.
Thema: Umwelt: Was könnte man tun, um der Umwelt zu helfen?
This is a placeholder text
Azure Backup, Azure Backup Server und Azure Site Recovery
FREE ICONS POWERPOINT TEMPLATE.
Azure Active Directory und Azure Active Directory Domain Services
Premiere Conferencing GmbH
Freizeit Thema 5 Kapitel 1 (1)
you: ihr ( familiar plural ) you: du ( familiar singular)
LEAFCHART All phrases can be replaced with your own text.
Englisch Grundlagen, Modal Verbs
Vorlesung Völkerrecht Diplomatischer Schutz
Insert your own text here
Grammatik: waren / hatten
© Horst Lange, University of Central Arkansas
Beuth Hochschule Berlin, Juni 2017, Uwe Löhr
The new online recognition process
Welcome! Prepare for Day 1! Site Hamburg / Finkenwerder
CHAINCHART This is placeholder text. All phrases can be replaced with your own text. The text demonstrates how your own text will look when you replace.
If you feel that the resources that I have created have helped you save time and/or money, please consider supporting the work that I do by doing your.
DATIV Ich schreibe meinem Bruder einen Brief.
The Conversational Past
The Conversational Past
OFFICE 365 FOCUS SESSION SHAREPOINT ONLINE 101:LERNE DIE BASICS 19. März 2018 Höhr-Grenzhausen.
Niedersächsisches Ministerium
- moodle – a internet based learning platform
 Präsentation transkript:

Sicherheitsmassnahmen für UNIX Dr. Stefan Turowski Systemkolloquium WS 2003/ Januar 2004

UNIX Inhalt  Angriffe  * Folgen  Ziele  Massnahmen  Werkzeuge

UNIX Angriffe  Scans zum Entdecken von Sicherheitslücken (mehrere am Tag)  Spezifisches Angreifen von Schwachstellen (ftpd, named, pop,...)  * Installation von P2P Software  * Installation von Mailern (auch nicht Port 25) zur Verbreitung von SPAM  Eigentreffer durch Dummuser

UNIX * Kurz bevor die Bomben fallen… University Erlangen Nuremberg Martensstrasse 1D Notice ID: Notice Date:7 Nov :03:04 GMT Dear Sir or Madam: BayTSP, Inc. ("BayTSP") swears under penalty of perjury that Paramount Pictures Corporation ("Paramount") has authorized BayTSP to act as its agent for copyright infringement notification. BayTSP's search of the protocol listed below has detected infringements of Paramount's copyright interests on your IP addresses as detailed in the attached report. BayTSP has reasonable good faith belief that use for the material in the manner complained of in the attached report is not authorized by Paramount, its agents, or the law. The information provided herein is accurate to the best of our knowledge. Therefore, this letter is an official notification under provisions of section 512(c) of the U.S. Digital Millennium Copyright Act to effect removal of the detected infringement listed in the attached report. The Berne Convention for the Protection of Literary and Artistic Works, the Universal Copyright Convention, as well as bilateral treaties with other countries allow for protection of client's copyrighted work even beyond U.S. borders. The attached documentation specifies the exact location of the infringement. The Notice ID identifies the copyrighted works by file identification number. We hereby request that you immediately remove or block access to the infringing material, as specified in the copyright laws, and insure the user refrains from using or sharing with others Paramount's materials in the future. Please send us a prompt response indicating the actions you have taken to resolve this matter. Please reference the Notice ID number above in your response. Nothing in this letter shall serve as a waiver of any rights or remedies of Paramount with respect to the alleged infringement, all of which are expressly reserved. Should you need to contact me, I may be reached at the following address: Mark Ishikawa Chief Executive Officer BayTSP, Inc. PO Box 1314 Los Gatos, CA v: f: *pgp public key is available on the key server at ldap://keyserver.pgp.comldap://keyserver.pgp.com Note: The information transmitted in this Notice is intended only for the person or entity to which it is addressed and may contain confidential and/or privileged material. Any review, reproduction, retransmission, dissemination or other use of, or taking of any action in reliance upon, this information by persons or entities other than the intended recipient is prohibited. If you received this in error, please contact the sender and delete the material from all computers. This infringement notice contains an XML tag that can be used to automate the processing of this data. If you would like more information on how to use this tag please contact BayTSP Infringed Work: Core, The -Infringing FileName: (DgE) The Core - Der Innere Kern SVCD 2v2 Deutsch.mpg -Infringing FileSize: Protocol: eDonkey Infringers -IP Address:

UNIX * FAU – Die Oberspammer [ SpamCop V1.3.4 ] This message is brief for your comfort. Please use links below for details. from xx.1yy / 9 Jan :54: xx.1yy is open proxy, see: proxies.html 77d7c04ezhttp:// proxies.html 77d7c04ez [ Offending message ] Return-Path: Delivered-To: x Received: (qmail 2159 invoked by uid 1000); 9 Jan :54: Received: (qmail 2130 invoked from network); 9 Jan :54: Received: from xxx.yyy.uni-erlangen.de (HELO ascade.se) ( xx.1yy) by dsl.redshift.com with SMTP; 9 Jan :54: Message-ID: From: "Catherine Graham" To: x Subject: stronger and harder Date: Fri, 09 Jan :50:

UNIX Ziele  Systeme schwerer angreifbar machen  Systemfunktionalität verbergen  Schaden begrenzen

UNIX Unbedingt erforderlich  Einspielen von Sicherheitspatches sicherstellen  Zugänge zum System kontrollieren  alle Benutzer müssen (gute) Passwörter haben  nur die Dienste dürfen aktiviert sein, die auch wirklich genutzt werden sollen  jeder Dienst muss beschränkt sein auf das geringst mögliche Minimum  physikalische Sicherheit (Console)

UNIX Unterstützende Massnahmen  Logging und Überwachung des Systems  * am RRZE: zentraler syslog  * am RRZE: SRS Netconnect (  Zeitsynchronisation  * am RRZE: NTP  Warnungen einbauen  * am RRZE: /etc/issue  nur verschlüsselte Verbindungen zulassen  * am RRZE: eingeschränkt: rlogin/rsh/telnet/ftp/http(auth)  * gelegentliche Neuinstallation/Update

UNIX Einfache Werkzeuge  autopatch, YOU (Yast Online Update), APT  * am RRZE: voll in Betrieb  tcpwrapper (tcpd, /etc/hosts.allow)  * am RRZE: Einschränkungen für backup, finger, …  * am RRZE: Keine Verbindungen von Systemen ohne DNS-Eintrag  Einstellungen in /etc/default  * am RRZE: login mit Logging

UNIX Profi-Werkzeuge  Personal Firewall (ipfilter, ipchains, iptables)  * am RRZE: ipfilter auf speziellen Systemen  Teergruben  * am RRZE: keine