📄 00000017.htm
字号:
<HTML><HEAD> <TITLE>BBS水木清华站∶精华区</TITLE></HEAD><BODY><CENTER><H1>BBS水木清华站∶精华区</H1></CENTER>发信人: vertex (happy hacking), 信区: Linux <BR>标 题: [文挡] 用 LIDS 来构建安全的 Linux 系统. <BR>发信站: BBS 水木清华站 (Thu Apr 20 14:51:09 2000) <BR> <BR> <BR>BUILD A SECURITY SYSTEM WITH LIDS <BR> <BR>Xie Huagang (<A HREF="mailto:xhg@ncic.ac.cn,">xhg@ncic.ac.cn,</A> <BR><A HREF="http://www.lids.org)">http://www.lids.org)</A> <BR> <BR>Tue Apr 18 00:02:12 CST 2000. <BR> <BR> <BR>LIDS ( Linux Intrusion Detection System) is a linux kernel patch to enhance <BR>the the linux kernel. In this article, we will talk about the LIDS including <BR>what it can do and how to use it to build a security linux system. <BR> <BR> <BR>1. Why LIDS. <BR> <BR>With increasing popularity of Linux on Internet , more and more security <BR>holes are found in the current GNU/Linux system. You may hear from the <BR>Internet that - There are bugs found in Linux, which will cause the system to <BR>be easily compromised by hacker. <BR> <BR>Since the Linux is an art of open source community, security holes can be <BR>found easily and can also be patched quickly. But when the hole is disclose <BR>to the public, and the administrator is too lazy to patch the hole. It is very <BR>easy to break into the current system and it is worse that the hacker can get <BR>the root shell. With the current GNU/linux system, he can do whatever he <BR>want. Now, you may ask, what is the problem and what can we do? <BR> <BR>What's wrong with the current GNU/Linux system. <BR> <BR> superuser (root) may abuse the rights Being a root, he can do <BR> whatever he want. Even the capability existing in the current the <BR> system. As a root, he can easily change the capability. <BR> Many system files can be changed easily. There are many important <BR> files, such as /bin/login, in the system. if the hacker come in, he can <BR> upload a changed login program to replace /bin/login , so he can <BR> re-login without any login name of password. But the files do not <BR> need to change frequently, unless you want to upgrade the system. <BR> Modules is easily used to intercept the kernel. Module is a good <BR> design for the linux kernel to make the linux kernel more modulized <BR> and more felixible. But after the modules inserted into the kernel, it <BR> will be part of the kernel and can do what the original kernel can do. <BR> Therefore some unfriendly code could be written as a modules and <BR> inserted into to kernel, the code can even redirect the system call <BR> and act like a virus. <BR> <BR> Process is unprotected. Certain processes, such as web server <BR> daemon, which are critical to to system is not under strict protection. <BR> Therefore, there are vulnerable to the attack of hackers. <BR> <BR>With above description about insecurity thing, how can we build a security <BR>system? we must have a security kernel and then build our security system <BR>on top of it. This is what LIDS do. <BR> <BR>2. Features about LIDS. <BR> <BR>The Linux Intrusion Detection System is a patch which enhances the <BR>kernel's security. When it is in effect, chosen files access, every <BR>system/network administration operations, any capability use, raw device, <BR>mem and I/O access can be made impossible even for root. It uses and <BR>extends the system capabilities bounding set to control the whole system <BR>and adds some network and filesystem security features in kernel to enhance <BR>the security. You can finely tune the security protections online, hide <BR>sensitive processes, receive security alerts through the network, and more. <BR> <BR>In short, LIDS provides Protection, Detection and Response to the <BR>intrusion in the linux kernel. <BR> <BR> Protection. LIDS can protect important files on your hard disk no <BR> matter what filesystem type they reside on, anybody include root can <BR> not change the files. LIDS can also protect the important process <BR> from being killed. LIDS can prevent RAW IO operation from an <BR> unauthority program. It can also protect your hard DISK,include <BR> MBR protection,etc. <BR> Detection. When someone scan your host, LIDS can detect it and <BR> inform the administrator. LIDS can also notice any activity on the <BR> system which violates the rules. <BR> Response. When someone violate the rules, LIDS can log the detail <BR> message about the violated action to the system log file which has <BR> been protected by LIDS. LIDS can also send the log message to your <BR> mailbox. In this case, LIDS can also shutdown the user's session at <BR> once. <BR> <BR>3. Build a security linux system with LIDS <BR> <BR>With the LIDS features, let's go and see how to build a security system with <BR>LIDS step by step. <BR> <BR>3.1 Download LIDS patch and coresponsive <BR>official linux kernel <BR> <BR>You can download lids patch from LIDS Home and LIDS Ftp Home and other <BR>mirror of LIDS around the world, check LIDS Mirror for the nearby mirror <BR>site. <BR> <BR>The patch name will be lids-x.xx-y.y.y.tar.gz, x.xx represents the lids <BR>version and the y.y.y represents the linux kernel version. <BR> <BR>You should download the coresponsive kernel version. For example, if you <BR>download the lids-0.9pre4-2.2.14.tar.gz, you should download the linux <BR>kernel 2.2.14 source code. You can download the kernel source from Kernel <BR>FTP Site or other mirror site of it. <BR> <BR> <BR> <BR> <BR> 1. uncompress the linux kernel source code tree. <BR> # cd linux_install_path <BR> # bzip2 -cd linux-2.2.14.tar.bz2 | tar -xvf - <BR> <BR> 2. uncompress the lids source code. <BR> # cd lids_install_path <BR> # tar -zxvf lids-0.9pre4-2.2.14.tar.gz <BR> <BR> <BR> <BR>3.2 Patch LIDS to official linux kernel <BR> <BR>After downloading the kernel source and lids, uncompress the source and <BR>lids. For example, if you download the lids-0.9pre4-2.2.14.tar.gz and <BR>linux-2.2.14.tar.bz2, then, <BR> <BR> <BR> <BR> <BR> 3. patch the lids to the linux kernel source code. <BR> <BR>
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -