[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
SuSE releases new security tools.
I saw the included posting on the suse-security mailing list, and thought
it sounded like a good idea. So I was thinking of reviewing how compatible
these packages are with Indy (they come in RPM, so that's a start).
What does anyone think of the inclusion of these (or similar) scripts in
Indy?
I'm also just had the idea of writing a simple front end for IPCHAINS, one
that creates a firewall policy for the machine, by prompting the user for
answers to questions. Thoughts? I may have seen something similar on
securityfocus.com, but I'm not sure.
I feel that security is (should be) an important part of EVERY disto. SuSE
seems to be taking it seriously, and I feel we should to.
Project Independence is about creating Linux answers for Linux problems,
not Unix answers. A lot of the processes involved in securing a Linux box
are straight from Unix machines, and are thus daunting to users. Security
is one LARGE area of linux that could do with being made user-friendly,
and IMHO, this is what Indy should do.
I'd be interested in hearing anyone else's views on this topic.
--------------Begin fwd'ed message-----------------------------
From: marc@suse.de
Date: Sun Nov 28 02:03:11 1999
______________________________________________________________________________
SuSE Security Announcement
Announcement of new security tools from SuSE
______________________________________________________________________________
Please note, that that we provide this information on an "as-is" basis only.
There is no warranty whatsoever and no liability for any direct, indirect or
incidental damage arising from this information or the installation of
the update package.
_____________________________________________________________________________
Tools developed by SuSE (all open source) and included in SuSE 6.3 :
SuSE FTP Proxy - The first program of the SuSE Proxy Suite.
A secure FTP proxy with support for SSL, LDAP, command
restriction, active and passive FTP support, and much more.
RPM: fwproxy.rpm, fwproxys.rpm (SSL - not in the US version)
SuSE Firewall - The new firewall script from SuSE, rewritten from scratch.
Autodetection of interface information, masquerading,
autoprotection of services, protection from internal
networks, fail-close design and easy to configure.
RPM: firewals.rpm
Harden SuSE - A special script for hardening a SuSE Linux 5.3 - 6.3.
By answering 9 questions, the system is reconfigured very
tightly. e.g. disabling insecure network services, removing
suid/sgid/world-writable permissions which are not critical.
RPM: hardsuse.rpm
SuSE Secumod - This loadable kernel module enhances the security of the
system by adding a symlink/hardlink/pipe protection,
procfs protection, trusted path execution and capabilities.
RPM: secumod.rpm
SuSE Secchk - These are cron scripts which run daily, weekly and monthly
to check the security of the system and compare them to the
last run.
RPM: seccheck.rpm
Yast-1 - New administration menu for setting password aging,
authentication fail delay and logging of logins + failures.
RPM: yast.rpm
SuSE auditdisk - Please note that this tool is in beta phase!
This tool generates a bootdisk with checksum data and all
binaries etc. needed to automaticaly verify file checksums
upon booting. This way it can't be subverted by lkm's like a
standard e.g. tripwire installation.
WWW: http://www.suse.de/~marc - not included on SuSE 6.3 yet
Watch out for updates of these tools on our WWW or FTP update sites.
Although these are tools developed by SuSE, they (should) work on any Linux
distributions with little problems.
New tools included in the SuSE Linux distribution (not created by SuSE):
FreeS/WAN - IPSEC implementation to build secure VPN tunnels via public
networks.
RPM: freeswan.rpm (not in the US version)
GNU Privacy Guard - A free pgp-like tool for secure (not limited to email)
communication. Frontends are also included.
RPM: gpg (not in the US version)
Nessus - A very good network security scanner!
RPM: nessus
plus tmpwatch, arpwatch, plug, sslwrap, the newest nmap and more.
"Old" packages include: john, saint, cipe, pgp, scanlogd, ssh, tripwire, etc.
______________________________________________________________________________
General information on SuSE Linux:
http://www.suse.com
You can find updates on our ftp-Server:
ftp://ftp.suse.com/pub/suse/i386/update for Intel processors
ftp://ftp.suse.com/pub/suse/axp/update for Alpha processors
or try the following web pages for a list of mirrors:
http://www.suse.com/ftp_new.html
Our webpage for patches:
http://www.suse.de/en/support/download/updates/
Our webpage for security announcements:
http://www.suse.de/security
If you want to report vulnerabilities, please contact
security@suse.de
______________________________________________________________________________
SuSE has got two free security mailing list services to which any
interested party may subscribe:
suse-security@suse.com - moderated and for general/linux/SuSE
security discussions. All SuSE security
announcements are send to this list.
suse-security-announce@suse.com - SuSE's announce-only mailing list.
Only SuSE's security annoucements are sent
to this list.
To subscribe to the list, send a message to:
<suse-security-subscribe@suse.com>
To remove your address from the list, send a message to:
<suse-security-unsubscribe@suse.com>
Send mail to the following for info and FAQ for this list:
<suse-security-info@suse.com>
<suse-security-faq@suse.com>
_____________________________________________________________________________
This information is provided freely to everyone interested and may
be redistributed provided that it is not altered in any way.
Type Bits/KeyID Date User ID
pub 2048/3D25D3D9 1999/03/06 SuSE Security Team <security@suse.de>
------BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6.3i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=pIeS
------END PGP PUBLIC KEY BLOCK-----
-----------------------------End fwd'ed message-----------------
David
-- ,------------------------------,
,==================| S H U N A N T I O N L I N E |=================,
| David M. Webster '------------------------------' (aka cogNiTioN) |
|===| I use Linux everyday to up my productivity - so up yours! |===|
|=================|-| PGP KeyID: 0x 45 FA C2 83 |-|=================|
| <cognition@bigfoot.com> |-|===========|-| http://www.cognite.net/ |
`===========| I walk to the beat of a different drummer |==========='