Академический Документы
Профессиональный Документы
Культура Документы
net/publication/265162827
CITATIONS READS
0 10,383
1 author:
Amit Nepal
Western Governors University
1 PUBLICATION 0 CITATIONS
SEE PROFILE
All content following this page was uploaded by Amit Nepal on 30 August 2014.
Amit K Nepal
Linux Server & Hardening Security 2
Abstract
The purpose of this project is to explore and highlight the basic security configurations
that should be performed in order to harden the security posture of a default Linux Operating
System installation. This document is by no means a complete security guide for Linux operating
system; however it outlines the basic hardening of a Linux System, so that it may not be an easy
target for attacks. Many system administrators do not realize the fact that, a default Linux
installation is vulnerable to variety of attacks. Therefore this document presents the basic
security and industry best practices to secure the Linux Server as well as some most popular
This research project explores the key weaknesses and default configurations that are
never changed when building a production Linux Server thereby making the server an easy target
to hackers over the internet. By following some industry best practices and tweaking some
security configurations, a Linux Server can be well secured. This research project explores and
suggests best practices for the general hardening for common Linux services such as Secure
Shell (SSH), Apache Web Server, and configuring host based firewall (IPTABLES) to block
connections to unwanted ports and blocking bad traffic. This project also explores and outlines
how an open source host based intrusion detection and prevention tool (OSSEC) can help take
the security, audit and monitoring of the Linux Server to the next level.
The proposed outcome of the project is to identify common mistakes and weaknesses in
configuring a production Linux Server and the result of such weakness. Many businesses are
compromised as a result of such common mistakes, and this project is expected to explore and
Table of Contents
Introduction ................................................................................................................................................... 5
Scope ....................................................................................................................................................... 22
Assumptions............................................................................................................................................ 24
Project Phases ......................................................................................................................................... 24
Timelines ................................................................................................................................................ 25
Dependencies .......................................................................................................................................... 25
Resource Requirements .......................................................................................................................... 25
Risk Factors ............................................................................................................................................ 26
Important Milestones .............................................................................................................................. 26
Deliverables ............................................................................................................................................ 27
Methodology ............................................................................................................................................... 27
Hardware ................................................................................................................................................. 29
Linux Server & Hardening Security 4
Software .................................................................................................................................................. 30
Tech Stack............................................................................................................................................... 30
Phase I: Removing Unwanted Packages & Services .............................................................................. 30
Phase II: Hardening Security .................................................................................................................. 34
Phase III: Configuring Firewall .............................................................................................................. 42
Phase IV: Installing HIDPS .................................................................................................................... 45
Final Output ............................................................................................................................................ 47
Quality Assurance ....................................................................................................................................... 47
Introduction
Linux Operating System is widely used as server operating system around the world.
Like other operating systems, it has its own pros and cons. Security is one of the aspects that are
overlooked. Many system administrators assume that Linux itself is secure and they leave many
services at the default configurations leaving the server vulnerable and making an easy target for
the hackers. Therefore this project is intended to outline common default settings for common
services like SSH, FTP, Apache, and IPTABLES etc. that should be changed and configured
properly to harden the server. This project also recommends some additional configurations and
installations that will help enhance the security posture of the server. This project will also cover
the installation and configuration of a HIDPS (Host Based Intrusion Detection and Prevention
System) which will help in better monitoring and preventing intrusions. The project will
additionally outline best practices for enhancing the security of the Operating System and
common services running on the server. The solution to the presented problem will be
implemented in four phases. Phase I will explore the default installation of Linux Operating
system and remove unwanted applications and services, Phase II will cover Hardening Security
using industry best practices, configuration changes and tweaks. Phase III will cover the
installation and configuration of a firewall (IPTABLES). Finally phase IV will cover the
Project scope
There are various operating systems that may be used in server systems; however this
project will focus on Linux Operating System, CentOS 5.9 Final is selected as the operating
system for this project. The basic principles, security guidelines and best practices may apply to
other operating systems as well, however this project will only focus on the Linux based
Operating Systems. The security guidelines, configuration and settings explored by this research
Linux Server & Hardening Security 6
project may address the basic security risks of a Linux Server. The project will specifically be
focused on the more widely used Linux based Services not including any custom and 3rd party
applications.
In the scope of this project common services include Secure Shell or SSH which is used
to remotely administer a server, Apache web server used for web application services,
IPTABLES which is used as host based firewall etc. Centos 5.9 are selected as the Linux
Operating System for this project. The project will also cover how a host based intrusion
detection and prevention system can enhance the server security by real-time monitoring and
alerting of any intrusions and changes in important files and binaries in the server operating
system. SSH is the most commonly used tool for remote administration and management of
Linux Servers. Similarly apache is the most widely used web server application in Linux
Operating Systems and IPTABLES is the firewall that ships with Linux Operating System, hence
these are the items of core focus in this project. For the sake of this project, we will explore the
basic installation and configuration of OSSEC, an open source and freely available Host Based
Intrusion Detection and Prevention System, which has the ability to monitor log files in real
time, monitor system files for integrity, and block anything abnormal and also alert the systems
administrators in real time. This project will also explore and guide on checking what services
are running on the server and turning off any unwanted services. We will follow the KISS
principle which says “Keep It as Simple as Possible”. It is my belief that by implementing this
type of monitoring with common best practices and changing default configurations to a more
secure counterpart can highly reduce the risk of easily being compromised.
This project will not address the security and configurations of all the tools and services
available for Linux operating systems and or network security. This project will only cover
Linux Server & Hardening Security 7
Linux operating systems and the most common services on Linux Servers. This study alone will
not make a Linux server completely secure from attacks or vulnerabilities; however it will try to
point out common settings and configurations that will harden the server security.
By taking an approach of keeping the server as simple as possible, the complexity of the
server is reduced. Also a server with less services running is less vulnerable. By exploring the
default installation and removing unwanted applications and services, we reduce the
vulnerabilities in the server. Changing default settings and configurations will cause more effort
on the attacker and may opt to go for another easy target. It is also necessary to have some kind
of restriction on the server such as a firewall to restrict to what ports and what source IP
addresses can connect to the server. Last but not the least, there needs to be some kind of alerting
mechanism, so that an administrator gets notified of any unwanted behavior or intrusions in the
server. As such just by implementing these basic security steps will harden the posture of Linux
server and may protect the server from compromise. This approach of solution is minimally
expensive to implement and requires less time. Thus this solution of hardening the security state
Methodology Justification
The project will be carried out in four phases. In the first phase, we will perform some
intrusion attempts like brute force attacks, foot printing etc. and explore the system response.
Also we will explore the commonly installed services and applications and identify what
applications and services we might not need and remove them. In the second phase, we will
Linux Server & Hardening Security 8
actually make the changes to the default configurations; put some restrictions in place with the
common services and operating system. In Third phase, we will configure the firewall
(IPTABLES) to restrict access to certain ports from certain IP Addresses, so that the services to
the server are available only to those who need it. Finally in the fourth phase, we will install and
configure a Host Based Intrusion Detection and Prevention System (OSSEC), which will act as a
I believe that this approach will help us initially identify the issues, by performing some
intrusion attempts and looking at the system response and we check the system response again
after the implementation of the solution. Thus by carrying out the project in this manner, we will
know exactly what was the issue, how it has been mitigated and what would the server respond
The remainder of this capstone report is divided into various sections. The systems and
process audit section which will analyze the pre-implementation state of the server and identify
the weaknesses of the server configuration, cause of the problem, the impact of the problem on
the business, cost analysis and risk analysis. Detailed and Functional Requirements section will
outline the end user and other detailed requirements and the existing gaps in the organizations.
The third section consists of project design details including the scope, assumption, phases,
timelines, any dependencies, resource requirements, risks involved, important milestones and the
deliverables of the project. The fourth section describes the methodology, the explanation of the
approach and why this approach was selected. The fifth section is the actual project development
phase describing all the details of implementation, configuration changes and firewall
Linux Server & Hardening Security 9
configuration and HIDPS installation procedures. After the project development we have a
quality assurance section where we perform solution testing and analyze what level of security
we have been able to attain by implementing the solution. Then we have the implementation
plan section where the strategies for implementation, phases of rollout, any details of the go-live,
dependencies and deliverables are covered. After the implementation plan, this paper covers the
risk assessments which include quantitative and qualitative risks, cost/benefit analysis, and risk
mitigation. After Risk Assessment, the project covers the post implementation support and any
issues associated as well as the maintenance plan. Finally, the last section covers the conclusion,
In order to properly realize the benefits and enhancements provided by the solution as
well as to identify the weaknesses and business and systems inefficiencies, a pre-implementation
systems audit has been performed. The initial systems and process audit revealed various
weaknesses that could be exploited by the attackers and compromise the servers. The
compromise not only affects the technology but affects the business as a whole. Since the
technology is the driver for the business associated, a severe technological compromise could
From the technology standpoint, various issues were discovered with respect to the
security configuration of the server. The server had default programs and applications that were
running on the server. Remote administration (SSH) service was found to be running on the
default port. There was no firewall running on the server and no pro-active monitoring or alerting
On the business side, policies and procedures were lacking. Since the information
contained on the servers are directly related to business transactions, customer data and so forth,
compromise of the server and the data on them would cause a sever business impact. There were
no defined procedures and policies to ensure the proper configurations on the server, and there
By implementing the proposed solution and the changes, the security of both the
infrastructure which constitutes the technology and the information contained there in which
Audit Details
The scope of the audit was limited to exploring and verifying the security of the server
and the business processes associated with the management of the data and information on the
server. An analysis on the system response to various foot printing and brute force attacks was
performed. The server was also audited for any alerting and monitoring system as well as
intrusion prevention system. Following are the areas of audit and the associated discovery.
There are a number of applications that are installed in a Linux Operating system, when one
chooses to perform a default installation which may be a “Server GUI” installation. The list
of programs installed in the server, were retrieved by issuing the following command:
The above command provided a list of all installed packages page by page. The screenshot
The detailed list is not shown in the output, but some applications that were not required for
the server were found to be installed in the system. Some of the applications that can be
a) Lftp: lftp is a file transfer program and lftp is not needed because we should use sftp a
secured alternative.
c) Tomcat: Tomcat is a java web server. The server uses apache as its web server hence tomcat
is not required.
d) Portmap: portmap is used to map ports for Remote procedure calls, used for NFS and other
e) Squid: Squid is a proxy server and is not required on this server as the role of this server is a
web server.
f) Openoffice , desktop –backgrounds, gimp, evolution : All this applications are desktop GUI
applications and since we don’t need graphical interface at all, these applications are not
Above listed are just a few of the applications that were found installed in the server,
however we do not require any of these applications for the production server and thus keeping
them installed may just provide some additional vulnerabilities. In total 53 unneeded applications
All the services running on the server were listed by issuing the command:
ps aux | less
By running the above command, it was found that there were programs like rpc (Remote
Procedure Call), nfslock, portmap which are used for NFS services were running. Cupsd
which is a printer sharing service was also found to be running on the server. These services
are not expected to be provided by the server and again, they may just open doors to some
attackers.
c. Password policy
The system was not setup with any password policy. A user could set the password to as easy
as 123, or dictionary words. There is no minimum length policy and users are not locked for
any number of failed attempts. The screen shot below also displays that there is no password
SSH or Secure shell is the most popular means to remotely access and manage a Linux
Server. While it is a great tool for administration and management, it can also be a great way
for attackers to gain full control of a Linux Server. Therefore, it is very important that SSH
Linux Server & Hardening Security 14
be properly secured. On analyzing the configuration file of the default Linux system, the SSH
was found to be set with default options which can be a target of brute force attacks.
As per the configuration of the SSH, it uses default port 22, which is known to all attackers
out there. Also it is using password authentication, which is prone to brute force attacks, and
if the password happens to be an easy to guess, or a dictionary word, then the risk of SSH
access gained by attackers is very high. Further, root login is enabled by default, which poses
a huge security risk, as attackers can directly attempt to crack root passwords and thus gain
complete access to the server. There were no security controls found which would protect
SSH service from such attacks. As shown in the screenshot below, we were able to crack root
SSH password, by using brute force technique. In order to reduce the time to crack, a simple
As shown in the figure below, just by accessing a bogus URL on the server revealed the
Operating system, Server Type which is Apache in this case and the version of apache. By
accessing this version of software, the attacker could find the vulnerabilities known to that
Upon further foot printing analysis, it was also found that it was possible to get PHP version
We were also able to identify the operating system, kernel version and open ports and services,
On checking for all listening ports and services, there were a number of services that were
listening on various ports, even though they are not the services intended to be served by the
g. Firewall
On checking the status of the firewall (IPTABLES) that ship with Linux operating system, it
was found to be turned off. Without firewall being turned on and properly configured, the
server is prone to attacks by attackers from any network as there is no restriction in place.
There was no intrusion detection, prevention or alerting system of any kind installed on
the server.
Linux Server & Hardening Security 18
Problem Statement
From the results of the audit, it is apparent that the default installation of the Linux
Operating system leaves much vulnerability, which needs to be addressed in a timely manner, so
as to minimize the risk of the business and the consumer impact of data theft or compromise as
The major security problems discovered during the systems and process audit that need to
be addressed are related to the default settings of the system and the services running on the
server. These services and system settings must be properly configured in order to mitigate the
associated risks.
Problem Causes
The primary cause of the problem described here is the fact that many people have the
attitude of “Let’s get it up and running first, and then we will come back and secure it later” and
then that later never comes back. Yet another cause of the problem discussed here is
inexperienced or unskilled systems administrators who leave the system wide open to attacks
without even being aware of it and the associated risks. A false sense of security just by using a
Linux server is also one of the causes of the problem. Sometimes it could be the management,
Business Impacts
depending on the nature of the business and the way information system is used. A retail
business using a server just to host a website so that people can browse their homepage may have
Linux Server & Hardening Security 19
less business impact than an online business whose sale solely depends on the availability of
their website. Should any disruption in service occur, or should the website go down, the
business operations cannot continue because the website is the only means of doing business.
Thus the business impact may vary as a result of breach, but in any case, it is necessary that we
Linux Operating system holds a major share of the web servers worldwide and even
though it is used only for serving website, it has various other services running, which can be
used to access the machine, retrieve information, shut down the web service and much more.
Furthermore, defacement of homepage may cause lack of customer confidence, or a DOS attack
could leave the website or any other service unavailable to the legitimate users. Thus the security
Cost Analysis
Linux operating system has been a choice of many simply because of the cost, for others
it may be a sense of security. When properly configured, Linux servers are very reliable and
secure. Being open source, Linux Operating system is free. Along with the operating system,
many applications are free to use and open source. Thus Linux has been increasingly becoming
popular among businesses. In the scope of this project, only free and open source software and
guidelines are presented as the solution to the problem. However an organization may choose to
the tools and guidelines explored by this project and described here are free to use, however if a
Linux Server & Hardening Security 20
support subscription is required, or professional support and or advise is required, it may incur
Risk Analysis
Failure to adhere to proper procedures and guidelines is one of the largest risks associated
with security of the server. Just by having a written procedure and best practices cannot provide
real security, rather it may just provide a false sense of security. This is the greatest risk
Sometimes, an administrator may just skip some guidelines, to save some time or to get
things going. This is another risk factor involved in setting up a proper information
infrastructure. When there is a rush for getting things up and running, some of the guidelines or
best practices may be skipped to revisit later, but it might never be revisited. An audit policy may
be enforced, so that periodic review if anything was configured as per the set guidelines.
So, in order to minimize such risks, a strict policy and guidelines must be set up and the
policy must be enforced at all times, no matter what the situations are.
The implementation of the solution presented in this project is best suited to implement in
the initial phase of setting up a server, however the solution may also be applied at a later stage.
The security solutions presented here should be applied before putting the server in production
environment. Linux Operating system installed on the server is the basic requirement for the
implementation of this solution. Also it is required to develop, policy procedures and checklists
to ensure that the appropriate changes has been applied to the server.
Linux Server & Hardening Security 21
The solution presented by the project is mostly on the server side where, very low user
interaction is recommended. Hence the only requirements to be available for the end users would
be proper security awareness training, operating procedures and documentation on security best
practices such as password protection, good passwords, password change policy, non-sharing of
password etc.
Detailed Requirements
The implementation of this project requires Linux Operating System 5.x or greater. Other
software and application required include OpenSSH, IPTABLES 2.x, OSSEC, Apache 2.x,
VSFTPD, and PHP 5.x. These are the commonly used services and applications; however the
other detailed requirement may vary based on the usage and nature of operations of an
organization.
Existing Gaps
In many operational environments with Linux Based operating systems, there is a lack of
proper alerting, proactive monitoring and tuning of the operating system. It is likely assumed in
many cases, that it is secured just by installing a Linux Operating System. This project outlines
those common mistakes, and how those mistakes could leave the system prone to attack and it
will outline the standard procedures and configurations to mitigate those risks.
Linux Server & Hardening Security 22
Project Design
This project consists of four major phases to design, develop, test and implement the
solution. This project combines testing in each phase before and after implementation of each
security control.
The first phase of the project is to explore the default installation of Linux Operating
System, which actually is the audit and risk analysis of a default installation, and remove
unnecessary packages and applications from the server and stop any services. The project will
identify commonly installed applications that may not be required in the production
environments, default settings and security of remote access applications, response of the system
to various intrusions and so forth. In the Second phase “Hardening Security” the basic operating
system and application security configurations will be done. The third phase consists of
installation and configuration of an open source host based firewall IPTABLES. This phase will
cover the implementation of firewall and tuning the firewall to adapt to the environment and
services running on the server. Phase Four “Installing HIDPS” will cover the installation of a
host based intrusion detection system. After the implementation phases are complete, the next
section will perform the quality assurance and analyze the advantages of the solution and the
response of the system to such attacks after the solution has been implemented.
Scope
There are various operating systems that may be used in server systems; however this
project will focus on Linux Operating System (CentOS 5.9). The basic principles, security
guidelines and best practices may apply to other operating systems as well, however this project
will only focus on the Linux based Operating Systems. The security guidelines, configuration
Linux Server & Hardening Security 23
and settings explored by this research project may address the basic security risks of a Linux
Server. The project will specifically be focused on the more widely used Linux based Services
In the scope of this project common services include Secure Shell or SSH which is used
to remotely administer a server, Apache web server used for web application services,
IPTABLES which is used as host based firewall etc. The project will also cover how a host based
intrusion detection and prevention system can enhance the server security by real-time
monitoring and alerting of any intrusions and changes in important files and binaries in the
server operating system. SSH is the most commonly used tool for remote administration and
management of Linux Servers. Similarly apache is the most widely used web server application
in Linux Operating Systems and IPTABLES is the firewall that ships with Linux Operating
System, hence these are the items of core focus in this project. For the sake of this project, we
will explore the basic installation and configuration of OSSEC, an open source and freely
available Host Based Intrusion Detection and Prevention System, which has the ability to
monitor log files in real time, monitor system files for integrity, and block anything abnormal
and also alert the systems administrators in real time. This project will also explore and guide on
checking what services are running on the server and turning off any unwanted services. We will
follow the KISS principle which says “Keep It as Simple as Possible”. It is my belief that by
implementing this type of monitoring with common best practices and changing default
configurations to a more secure counterpart can highly reduce the risk of easily being
compromised.
This project will not address the security and configurations of all the tools and services
available for Linux operating systems and or network security. This project will also not cover
Linux Server & Hardening Security 24
operating systems other than Linux. This project will only cover Linux operating systems and the
most common services on Linux Servers. This study alone will not make a Linux server
completely secure from attacks or vulnerabilities; however it will try to point out common
Assumptions
This project is carried out with the assumption that most of the security breaches and
server compromise are a result of leaving default installation of the Operating System. Also it is
assumed that by Operating System we are meaning Linux Based operating system. Most of these
guidelines may apply to many UNIX like operating systems including Linux, UNIX and other
flavors of UNIX and Linux based operating systems. It is also assumed that any additional
security measures are in place above the Server itself such as Network Firewall, router access
controls etc. and that this project is limited to hardening the security of the server in itself.
Project Phases
The project consists of four major phases. Initially the server is audited and response of
the system to the intrusions is analyzed. After the initial analysis the four major phases of the
project begins. The first phase “Removing unwanted applications and services” will comprise of
exploring what packages and applications are installed on the system, what services are running,
any firewall rules and so forth and removing and stopping unwanted applications and services.
The second phase will include the security hardening of the operating system, common services
and some kernel parameters. The third phase focuses on configuration of the firewall to protect
the server from access to unauthorized ports and services. A restrictive firewall policy will be
Linux Server & Hardening Security 25
implemented. The fourth phase will cover installation of a host based intrusion detection system,
which will alert the system administrator of any intrusion and also block such attacks in a real
time manner.
Timelines
The initial analysis of the server will begin as soon as the project is planned and
procedures outlined. After the completion of the initial analysis, we will step into the first phase
of the project which includes the exploring of the installed applications and services followed by
Hardening security, configuring firewall and Installing intrusion detection and prevention
system. Finally test of the solution will be performed. The total expected time of implementation
of the project is one week, from analysis to implementation and final testing.
Dependencies
The second phase hardening security is dependent on the first phase Exploring default
installation of the operating system and required services and applications on the server.
However configuring firewall and installing intrusion detection and prevention system is
detection system may be installed. However, for the sake of simplicity, this project has been
Resource Requirements
This project is based on freely available open source tools and applications and thus
requires minimal resources. However, skilled man power and testing personnel’s are required for
Linux Server & Hardening Security 26
the successful implementation of the solution. Penetration testing manpower may be needed if
we wanted to take the implementation to the next level and assess any residual risks with the
server security. Skilled system administrators with sound Linux knowledge are required during
Risk Factors
Availability of skilled system administrator is a major risk that might impact the
situation. Another factor that may impact the situation is the experience level of the system
administrator. Furthermore management support is required for the project and convincing
changes.
Important Milestones
The most significant and measurable points in the project is the hardening of the initial
security of services and operating system itself. After the hardening of initial security, the next
major milestone is the installation and configuration of firewall to protect the server from
unauthorized service access. Finally installation and configuration of HIDPS (Host Based
Intrusion Detection and Prevention System) and receiving a real time notification of the brute
Deliverables
This project starts on top of a hardware baseline, meaning the project is completely
dependent on the software layer, without the need for custom hardware, parts and accessories as
such. Thus there is no hardware deliverable provided by the project directly. The project
tools, apply proper configurations to the server settings, summary on how to identify and remove
unwanted applications and services from the server and make the server production ready with
Methodology
implemented is first planned. Then the initial analysis is performed, where the initial security
state of the server is inspected. In the check phase, we perform some intrusion tests, view the
system response, and then we enhance the server security in the next cycle of the process. Also
this cycle should be continuous. Security is not a onetime goal, it must be continually
maintained. Maintenance plan section of this project will discuss the maintenance in greater
detail. There are other approaches like delta project implementation strategy as well, however in
that approach, we would be implementing security in small increments and that would leave
server vulnerable for a longer period of time. Thus PDCA approach seems to be the best
approach for the implementation of security to the server. Further security needs to be
Approach Explanation
The implementation has been approached in a two staged manner. First explore and audit
and secondly, implement and audit. So initially we explore the system, identify the weaknesses,
audit system responses to intrusions, and then we implement security controls and verify the
system responses again. By using this approach, we will be able to identify exactly what issues
we had encountered and what we have resolved. Also we would know by this approach, what
would have system responded before and what the system does after implementation of the
solution.
implementing the firewall and intrusion detection system and then checking to see if there were
vulnerabilities, or test the system for response. However, we would not be able to identify what
Approach Defense
By using this approach of implementation, it becomes clear to as what the threats to the
server were and what has been taken care of. Also this approach establishes a clear vision on
how to perform such security enhancement if new servers were added or new service were added
to the system. Also in this approach, the system is audited before implementation and the
controls are implemented and the system is tested for the response of the system after
implementation of control. This approach is very scalable as it can be applied to any number of
servers in the network. The whole process can be applied to any number of servers as they are
put into production. This approach of implementation provides a long-term success because the
Linux Server & Hardening Security 29
basic security controls are applied to the servers and it includes continuous monitoring and
adjustment of the security controls. For example, implementing an intrusion detection system
and adjusting firewall rules to block any intrusion detected is a continuous process.
Project Development
The project development phase is the phase where the actual security posture of the
server is evaluated and necessary controls are applied so as to enhance the security posture of the
server. The servers will be evaluated for unwanted applications and services that have been
installed as a part of default installation. The unnecessary packages will be removed and services
will be stopped so as to minimize the complexity of the server and to configure the server in such
This section should contain the details on building out your project. Discuss the
development and list the multiple phases (if applicable) and the deliverables. Ensure that you list
all the details of development including any hardware, software, tech stack, and architecture
details. Explain the process for developing your project. Include the following in your
explanation:
Hardware
Since the security controls will be applied on the servers, it does not require specific
hardware accessory as an addition. However if needed to further enhance the security, hardware
firewall, hardware based intrusion detection systems and advanced routers with access control
Software
The project is based on implementation of freely available open source tools and
application and again, to enhance the security further, commercial applications with more
features and support subscription may be used. However, for the sake of this project we will use,
IPTABLES as the firewall software, OSSEC as the Intrusion detection and prevention system
software, APACHE as the web server and VSFTPD (Very Secure FTP Daemon) as the FTP
Server.
Tech Stack
In order to limit the scope of the project, we will assume that the server provides web
service, FTP service and database service. The implementation of the controls presented by this
project will provide layers of security to the services and the operating system as a whole.
The first phase of the technical stack of this project is to remove unwanted packages and
services installed in the server. When a type of installation for example, “Desktop GUI” is
chosen, numerous applications and services are installed on the server. The server should be
installed with specifically those applications that are required for proper operation of the services
required from the server. So in order to keep the server simple and mitigate any threats from
vulnerabilities related to applications that are not used, we should remove the unwanted packages
and services.
Linux Server & Hardening Security 31
The above screenshot displays the package groups installed on the server. Packages like DNS
Name Server, Dialup Networking Support, GNOME Desktop Environment, Games and
Entertainment, HyperV, News Server, Printing Support, Office/Productivity, Sound and Video,
X Window System are not needed for the operations of a server. Thus we can safely remove
those programs from the server. The unwanted package groups can be simply removed by
We will run same command for each unwanted package group. However, to ease up the process
we may create a file with the list of package groups to be removed and run command:
Similarly if we wanted to remove a standalone package, we may issue the following command:
The next step is to stop and turn off unwanted services to start on next boot. We have identified
the unnecessary services like rpc.statd, portmap,rawdevices, iscsi, iscsid etc. as unnecessary
service running on the server, so we will stop those unnecessary services. The list of services that
will run on run level 3, which is the default run level for servers can be seen as shown in the
below figure.
The above screenshot shows how to stop and disable portmap service for current session and
subsequent reboots. We run same commands for other services that we do not need running on
the server.
The next phase in securing the server is hardening security. Hardening security consists
of multiple steps like updating the system, enforcing password aging, password complexity
requirements, securing SSH, Kernel security parameters, locking users after multiple failures,
The system should be updated on a regular basis. New patches should be applied, as they
roll out. In order to update a Linux system, yum utility can be used.
Linux Server & Hardening Security 35
In order to ensure that user passwords are secure, a security policy must be
server for strict password requirements, it will be unavoidable. Thus password security
requirements, restricting use of repeated passwords etc. The file /etc/login.defs needs to
By editing the above file, we can set the maximum number of days a password is
considered valid (PASS_MAX_DAYS), minimum number of days before a user can change the
after password expiration when the account is disabled (INACTIVE). This file can also be used
In the file /etc/pam.d/system-auth, as shown in the above image, we have to make some
modificaitons to enforce password complexity rqeuirements. For the line above, make it look
dcredit= -2 ocredit= -1
Where,
Make sure that the content looks like shown in below image after the change.
Securing SSH
SSH or Secure Shell is the most commonly used remote administration and management
tool for Linux and Unix based operating system. While it provides secured and encrypted
Linux Server & Hardening Security 38
session between the server and the client, if not secured, attackers can gain complete
the file /etc/ssh/sshd_config. First of all, disable root login via SSH. Any user who needs
root access will have to first login as a normal user and then switch to root. By doing this,
an attacker has to first gain user access and then further gain root access instead of just
having to gain root access, if direct root login were enabled. In order to disable root
login, edit file /etc/ssh/sshd_config and uncomment the line “PermitRootLogin yes”. If
for some reason, direct root login is required and cannot be disabled, it is advised to
enable root login only without password i.e. by using a key. This can be configured by
By default, SSH service listens on port 22 which is known to any Linux User. Thus
attackers may just scan for servers listening on port 22. In order to bypass such attackers,
changing SSH port is a good idea. It is recommended to change the SSH Port to
If possible, completely disable password authentication and use key based authentication
only. A key is more secure than a password. Further, a key can be restricted to be used
only from certain IP Addresses. Password Authentication can be completedly disabled for
SSH by setting “PasswordAuthentication no” in sshd configuration file. Also you should
use SSH Login Banner to alert the users attempting to login to the system that the system
is private and that the unauthorized access is prohibited. Include the list of users that are
allowed access via SSH in the configuration file, so that accidentally created users, or
unauthorized users cannot login via SSH. This can be done by using the value
Linux Server & Hardening Security 39
“AllowUsers user1 user2 user3”. Below is a screenshot of ssh configuration file with
net.ipv4.tcp_syncookies will protect from SYN Attack which is a denial of service attack,
disable source routing, disable icmp redirect messages, enable IP Spoofing protection,
ignore requests to icmp messages if possible, ignore broadcast requests in icmp , which
protects from ping of death attack, enable bad error message protection and enable
logging of spoofed, source routed and redirect packets for analysis of source of such
attacks. These kernel parameters can be applied by adding the appropriate keyword and
value pairs to /etc/sysctl.conf file. In order to apply changes without restarting the server,
Login Alerts
It is good to know who logs into the server. If an attacker gains access to a server, they
may remove the logs and it may be difficult for an administrator to even know that the
server has been compromised. It comes very handy, if you implement a script that will
notify the administrator of any logins by email. Since the script is executed as soon as the
user logins, the email is sent and thus the attacker may not be able to cover track and an
administrator can promptly know that someone has accessed the server. The path of the
vi /etc/profile
/usr/scripts/loginnotifier
#!/bin/bash
#Author : Amit Nepal
#Email : amit@amitnepal.com
#This script is free to use as long as you have these lines in the
#script.
Logging=true; #true/false
Linux Server & Hardening Security 41
TCP Wrappers
“TCP Wrappers add an additional layer of protection by defining which hosts are or are
not allowed to connect to "wrapped" network services” (Centos, TCP Wrappers and
xinetd). TCP wrappers provide an additional layer of security to services using libwrap
library. Services such as SSH, portmap, telnet can be protected using TCP Wrappers. In
additional to proper firewall configuration, use of TCP Wrappers can add an extra layer
of security. With TCP wrappers, we can define the networks or hosts allowed to use
specific service on the server. This is done by denying all hosts in the /etc/hosts.deny file
Linux operating systems come equipped with a very powerful, stateful packet filtering
provide a very good security to the server and services. The firewall can be configured to allow
access selectively to certain hosts for certain ports, protocols etc. This firewall can also be
configured to detect intrusions by logging certain types of traffic. Further this firewall also has
the capability to limit the rate of connections from a specific source IP Address. The following
#Drop all Input and Forward requests which are not allowed in this configuration file.
*filter
:LogAndDrop - [0:0]
#Drop all incoming traffic from private networks on the public interface
-A INPUT -i lo -j ACCEPT
#Limit SSH attempts to 3 per seond, 4th attempt will be send to LogAndDrop Chain to log and
-A INPUT -p tcp --dport 2222 -i eth0 -m state --state NEW -m recent --set
-A INPUT -p tcp --dport 2222 -i eth0 -m state --state NEW -m recent --update --seconds 60 --
hitcount 4 -j LogAndDrop
#Any Traffic routed to this chain will be logged and then dropped
-A LogAndDrop -j DROP
COMMIT
Linux Server & Hardening Security 45
“An intrusion detection system (IDS) is a device or software application that monitors network
or system activities for malicious activities or policy violations and produces reports to a
management station” (Wikipedia). There are various types of Intrusion detection and preventions
systems, both hardware and software systems. For the sake of this project, we are considering an
open source Host Based Intrusion Detection and Prevention System called OSSEC.
“OSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis,
file integrity checking, policy monitoring, rootkit detection, real-time alerting and active
response” (OSSEC). OSSEC provides very robust features and can greatly enhance the security
of the server. The first step in installing OSSEC is to download the source. The source code is
then extracted, compiled, build and then configured for use in the system.
In the above figure, we downloaded OSSEC and extracted the source file from a tarball using
wget http://www.ossec.net/files/ossec-hids-2.7.tar.gz
Once extracted, we change directory to the extracted folder and run the install script.
cd ossec-hids-2.7
./install.sh
On executing the script, an installation wizard will ask various questions like email notification,
email address, whether or not to run rootkit detection engine, integrity monitoring and so forth.
All the questions are to confirm if you want to enable a specific feature. After going through the
process, the installation will finish and asks to press ENTER to finish. Once finished, we should
run the command to start the Intrusion Detection system or OSSEC HIDS.
/var/ossec/bin/ossec-control start
Now the OSSEC Intrusion detection and prevention system will alert you of any intrusions. It
will also block any intrusion attempts. For example, if there is an attempt to brute force to SSH
service, OSSEC will block that IP Address from making any further requests. OSSEC also
monitors for any changes in important Operating System files and alert you on any changes.
Final Output
As the above phases are completed, the basic security controls have been implemented in
the server. The final output of the implemented solution is that the server is more secure which
will be discussed in the quality assurance section. The server will not be an easy target for simple
attacks and as such will better ensure the security of the information contained in the server and
Quality Assurance
conducted with Quality Assurance in consideration. The approach used in this project for
assuring the quality of the security control is the pre-implementation analysis and the post
implementation analysis. Basic attacks such as brute force attacks are performed on the server
and server before and after implementation of the security controls and guidelines. The
advantage of this approach is that we will be able to directly realize the advantage and the level
This project will not cover the sophisticated level of attacks and security issues, however
it will cover basic brute force attack, foot printing, banner grabbing, and denial of service at a
small scale in order to assure the quality of the presented security guideline.
Solution Testing
The solution was tested in a two phase model. Initial test was performed on the bare
installation of default Linux Operating System and the final test was performed on the secured
server after implementation of the controls and guidelines presented in this project.
The test cases consisted of performing brute force attack on the “root” account and any
other user accounts on the server. Brute force attack was also performed on the FTP accounts on
the server. Banner grabbing was performed to identify the operating system version and the
application version for services like Apache and PHP installed on the server.
policy, an easy password “123” was attempted to set, but the system rejected to change
It was also confirmed that the password expiration policy were properly enforced.
Linux Server & Hardening Security 49
It was confirmed that TCP Wrapper provided an extra layer of security by refusing
A brute force attempt was performed after allowing access to the test machine, and upon
re-launching the brute force attack, OSSEC blocked the IP Address from which the attack
Other tests were also performed, such as firewall test, banner grabbing etc. and it was
found that the firewall was pro-actively blocking any unwanted traffic to the server. Foot
print information was reduced by hiding Operating System version, apache version, PHP
The acceptance criteria set for the project deliverable was that the implementation would
be able to protect the server form basic forms of attacks and that the server would have necessary
controls and alerting systems in place to block the intrusions and notify systems administrator in
real time. Also the implemented solution provided a real time operating system binaries integrity
monitoring. Thus by performing these tests, it was confirmed that the security hardening
Implementation Plan
Firstly, the initial assessment of the server is performed, in the second phase the actual controls
and solutions are implemented in various phases and finally quality assurance and acceptance
The project phases include exploring the default posture of the Operating system,
enforcing policies. After this a firewall is configured and adjusted so as to restrict unauthorized
access to ports and restrict access to trusted IP Addresses only. Finally the Host Based Intrusion
Detection and prevention System is implemented and the server will be considered to be the final
based appliance solutions could have been implemented. However, implementing hardware
based solutions would pose the necessity to purchase additional hardware and equipment and
also need for extensively training IT personnel to operate the newly acquired hardware. On the
contrary, by using this approach, the additional cost of purchasing the hardware could be utilized
in other business process improvements. Only a portion of the cost, could be used in training the
IT personnel on using the open source tools seems highly beneficial. The other greatest
advantage is that being open source, a large group of brilliant minds, continuously work on
improving the security of the applications, fixing issues and providing documentation and
support to the open source tools and applications. Furthermore, the tools are native to the Linux
Operating system and they are built to protect Linux Servers, as such this approach of
implementation seemed best strategy for implementation of the security to the Linux Server.
The rollout will constitute of the initial analysis phase, hardening security, configuring
firewall, installation of an intrusion detection system and then final testing of the outcome. The
audit analysis of the initial and final testing will be compared and analyzed for acceptance. At
the very least, the outcome of the implementation is expected to be a server with the ability to
block brute force attacks and alert the system administrator in real time of any intrusions or
malicious behavior in the system. If this level of expected outcome is achieved, then that will
The server is tested in the same manner as initial tested after the implementation is
completed. The outcome of the post implementation test determines if the project is fully
implemented. After the implementation of the project, the server may be monitored for a week
for intrusions and system response to those intrusions, timely alerts of notifications and the
reduction of intrusion attempts, timely notifications to systems administrators and the proactive
reaction of the server to those attempts can be deemed as successful project implementation. As
mentioned earlier, it is not a one-time solution, hence whenever new services are added to the
server, or applications become outdated, they will have to be updated and new security controls
implemented.
Dependencies
This project is composed of modular components. Being modular, this project can be
implemented in any order. For example an intrusion detection system could be implemented
before the firewall is implemented, or a firewall could be implemented before analyzing the
unwanted applications and services in the system. However, implementing the project in right
order helps tuning the controls and configuration in a right order, so the order of implementation
is outlined as analysis, hardening security, installing firewall and then finally installing intrusion
detection system.
Deliverables
completely dependent on the software layer, without the need for custom hardware, parts and
Linux Server & Hardening Security 53
accessories as such. Thus there is no hardware deliverable provided by the project directly as we
start implementing the project in an existing hardware. The project deliverable consists of the
controls and detailed documentation on implementing those tools, apply proper configurations to
the server settings, summary on how to identify and remove unwanted applications and services
from the server and make the server production ready with respect to security and performance.
Once the security controls and the guidelines have been implemented, user training
session should be conducted. Users will be made aware of the security changes and their
responsibilities in ensuring the security of the server, services and the information contained in
the servers. No matter how secure the server or the network is, if users are vulnerable, attackers
can by-pass all the controls. Therefore, users should be made aware of their responsibilities and
they should be trained about good password protection, good password policy etc. Users should
be made aware that they should never use easy to guess passwords, never share their passwords
and that they should not install any third party applications without prior approval of the
information security team. Also the implementation of this project will enforce password
complexity requirements and password aging so users should be made aware of that policy as
well.
Linux Server & Hardening Security 54
Risk Assessment
“Risk assessment is a systematic process for identifying and evaluating events (i.e., possible
risks and opportunities) that could affect the achievement of objectives, positively or negatively”
(Price water house Coopers). There may be two types of risk assessments which are Quantitative
and Qualitative risk assessments. Qualitative risk assessment is based on categorizing the risks
based on the likelihood of occurrence and the business impact by the risk factor, whereas
quantitative risk assessment is based on numerical value or the dollar amount associated with
each risk.
By implementing the solutions in this project, we are attempting to mitigate those risks, however
there may be some potential risks associated with the implementation of this project itself which
This project is intended to implement security controls and enhance the security posture
of the server containing information and not as described by the scope of the project, we do not
associate the contained information with specific dollar amount and thus, for the sake of this
The following table identifies the risks and their likelihood and consequences that might
Likelihoo Seve
Risk Description Consequences d rity
In order to M H
Skilled System implement the Improper changes may be applied to
Administrator security settings and the system, leaving the system more
controls, a skilled vulnerable to the attacks
system administrator
is required
Management Management support is L H
Support required in order to The project may not be given a go
implement the changes ahead if management support is not
and enforce policy obtained.
Security Misconfigurations may Additional vulnerabilities may arise, or H H
Misconfiguration occur while making service interruption may occur
changes to the
configuration files.
Network Changing firewall Services may not be available over the L M
Interruption configuration, HIDS network.
may cause network
interruption.
Firewall Improper configuration Some services may not be available or M M
Misconfiguration of firewall may cause may not be fully functional.
some services to not
function properly.
Unsupervised Lack of supervision to Interruption in services, risk of loss of M M
implementation during implementation configurations.
may lead to errors and
interruptions.
Unanticipated If the plan is not Unpredicted and unwanted situation M H
Changes followed properly, may arise, such as loss of network
unanticipated changes connectivity, availability of services.
may be applied to the
server.
Configuration Failure to backup No backup will be available if the H H
Backup and configuration before configurations need to be restored to
Recovery applying changes may the previous state.
cause problems, if the
configuration needs to
be restored.
Linux Server & Hardening Security 56
Cost/Benefit Analysis
The following points highlight the cost/benefit analysis of the project implementation.
The implementation of this project is expected to reduce the risks of malicious attacks by
80%. If the risks of attack were not lowered, the risks of impact on the business, its
The project makes good use of open source software and tools there by reducing the cost of
implementation to a minimal level and thus it is very beneficial for an organization to adapt
to this solution and overrun the risk of malicious attacks and intrusions into the system.
The lower cost of implementation means, there are no chances of cost overrun which could
result in reduced staffing. Additionally, it may provide the advantage of being able to hire
additional personnel for maintaining the security of the infrastructure as a result of high
Risk Mitigation
We have identified potential risks to the implementation of the proposed solution and
thus in order to mitigate these risks; we have to consider appropriate risk mitigation strategy. In
order to combat the risk of management support to the implementation, we will present the
cost/benefit analysis to the management. Since the cost of implementation is very low and the
mitigate the risk of unskilled system administrator, security misconfiguration and network
perform the appropriate tests in development or cloned environment and proceed with caution. A
proper backup and recovery mechanism will be implemented and tested prior to implementation
Linux Server & Hardening Security 57
so that we can promptly rollback to the previous state if necessary. Also there may occur some
which should be taken care by a proper backup and recovery mechanism. The proper testing and
implementation in a similar environment combined with a good backup and recovery mechanism
should be a good mitigation of the potential pitfalls with the implementation of the solution.
If we encounter any issues with the implementation we will be able to roll back the
configuration to the original state from backup performed before the implementation. Another
alternative is that since we will implement the solution in phases, only the problematic change
may be rolled back to the previous state. However, with the rollback and recovery, we will have
both advantages and disadvantages. The advantage being that we will be promptly able to restore
the operations to previous state; however we will be leaving the system vulnerable for a longer
As discussed earlier throughout this document, security is an ongoing process and just by
implementing this solution once, it cannot be expected to maintain the security forever, thus we
need to consider post implementation plan for support and other issues that may appear as a
The enhanced system will be supported by skilled system administrators. If the system
administrators are not readily skilled or experienced, proper trainings should be provided to the
system administrators. Since the new system is equipped to respond to any threats or intrusions,
Linux Server & Hardening Security 58
it is possible that some false positives may arise in the system and a legitimate user may be
blocked access. In such cases, a trained administrator is required to analyze the event, unblock
access to the user and fine tune the system so that it does not happen. The server needs to be
continually updated, tuned and maintained. If necessary professional support may be obtained by
hiring consultants or third party services may be obtained for maintaining the system.
After the implementation of this solution, various support resources are required to
maintain and enhance the security of the server. Any changes in regulations or business
processes, may lead to change in the usage of server. There may be additional services deployed
to the server, modifications may be required to the configurations and there may also be
employee turnover. In order to support the security in the long run, the required resources
include qualified and skilled system administrator, periodic training programs to maintain the
knowledge of systems administrators, period audit process and policies and plans to react to the
penetration testing and trainings to the IT staffs. The currently implemented software may
become inefficient with the rapidly growing technology and the tactics used by the attackers, in
that case new software may need to be implemented to ensure the security of the system.
Additional hardware firewall or intrusion detection system may also become necessary in the
long run.
Linux Server & Hardening Security 59
Maintenance Plan
For the short term maintenance of the Information System, systems administrators should
be trained to operate the firewall and the intrusion detection system. They should be able to
perform daily operations on the firewall and the intrusion detection system. They must be trained
to respond to the alerts, read and understand the notifications sent by the intrusion detection
system and make necessary changes to the configurations. System users must be trained and
made aware of their responsibilities in ensuring security and best practices and that they must
For the long term, the organization should hire additional skilled system administrators
and servers for implementation of high availability and failovers. Stand by servers should be
built for combating the unexpected situations that may occur. Hardware crash, network problems
and data loss could pose serious threats to the business operations. An Information Security
Manager or Chief Information Security officer should be hired to direct and supervise the system
administrators as well as other staffs so as to maintain the enforcement of security policies at all
times. Proper backup and recovery procedures, disaster recovery plans and business continuity
plans must be developed to countermeasure the unwanted and unexpected situations that may
In conclusion, the project provided a detailed insight to the security posture of a default
installation of Linux Operating System and that we must apply some changes and controls, in
order to bring the server to production environment. The project also helped understand various
open source tools and how low cost solutions can protect and provide greater assistance in
maintaining and enhancing the security of a server. It is also apparent that by implementing basic
controls, proper guidelines and a proper combination of freely available application software a
server can be secured greatly. Most of the attacks start with the information gathering or the
scanning phases, where they normally run a scan through a range of random IP Addresses. The
result of the scan is the deciding factor for malicious attackers on which IP Address to include
for next phase or which ones to exclude. Just by changing some default ports and implementing
firewalls, we can present our servers in the exclude list. It should be noted however that, a
targeted attack goes much more beyond just scan and these controls may not be enough to
protect against a targeted attack, but will definitely make us appear as a hard target and some
newbie hackers may just opt to ignore and move on to the next and easy target. The project also
enabled a real time notification and monitoring of any intrusions in the server so that a system
administrator may respond quickly which can be helpful in targeted attacks as well.
Project Summary
In summary this project was a great exploration of a Linux Operating system, its default
installation and security posture at the install time. This project covered a lot of basic installation
defaults and operating system configuration changes that should be made in order to make the
server production ready. The project walked through various security controls, securing common
Linux Server & Hardening Security 61
services and applications like Apache, VSFTPD, and PHP etc. and also provided an insight to
firewall configuration and Intrusion Detection and Prevention system installation and Operation.
Even though the project is not a complete security solution to a Linux Server, it is a good
starting place towards a secure server. The security issues covered by the project are the basic
weaknesses which when left vulnerable makes the server an easy target and the attackers may
enjoy the vulnerabilities and compromise the server there by impacting business operations,
confidentiality, integrity and availability of data and information contained in the server as well
Thus in summary, this project presents a good starting point for security of Linux Server
and a complete real-time monitoring and intrusion detection system as well as firewall
configuration to protect the server and ensure availability of services and information served and
Deliverables
In a nutshell the deliverables of this project are the security configuration details, shell
script for login notification on a server, firewall configuration guide, Host based intrusion
detection and prevention system installation guide. The project described various settings that
could be changed to enhance the security of the Linux Server. These are the starting point for
securing the server from the baseline. With these guidelines and following a proactive and
periodic approach, the servers are expected to be secured in the long term. This project
deliverable are the security guidelines and best practices, which will help secure Linux servers
which run 24/7 to provide information and services to the businesses and to the end users.
Linux Server & Hardening Security 62
Outcomes
The outcome of this project was a production ready, secured Linux Server with hardened
security. The resulting server was ready to react to intrusions, it was tweaked to be stealth
enough to hide from basic attackers and also react to the basic forms of attacks like brute force
I actually rented a server with a default Centos 5.9 Final which is a freely available
version of Red hat Linux and applied all the solution presented in this project. I left the server
over the internet for two days before implementing the controls and stored the log files. After
collecting log files for two days, I applied the controls and solutions presented in this project to
the server and collected log files again after two days. The comparison of two log files showed
approximately 80% reduction in SSH brute force attacks. Also turning off ping response reduced
I am really glad that I chose this topic, which aligns with my everyday work as well as
the degree program I am pursuing and that this project really helped me explore much more
details in the Linux Operating system, perform penetration testing and analyze situations before
and after implementation of security and tools and thus I realized the importance of this controls.
I am excited that this project will provide guidelines and serve as a starting point for securing
Reflection
During the course of this project, I applied numerous skills and tools that I had learned
during the whole degree program. Using the tools and skills learned, I was able to analyze and
mitigate the security issues that would leave the server vulnerable to basic forms of attacks and
Linux Server & Hardening Security 63
attracting attackers for performing various attacks on the servers. I learned about various open
source tools which are freely available but also help a great deal on securing Linux servers. I
came across and explored a lot of other tools, even though they were out of the scope of this
project.
The major areas of learning during this project were the architecture of the Linux
Operating System, working model and the response of the system to various attacks. I also
learned tuning various kernel parameters and actually performed basic penetration testing of the
server. The entire tests were performed in Virtual Machine environment, which actually provided
a production environment insight to the threats and attacks. During the project I also learned the
importance of using real-time alerting and notification system as well. Also the HIDPS was a
great tool as an outcome of this project. I believe that I will apply the knowledge, skills gained
through this project and my entire course of study as well as the security guidelines and solutions
References
http://www.centos.org/docs/5/html/Deployment_Guide-en-US/ch-tcpwrappers.html
http://www.amitnepal.com/email-notification-on-root-login-on-linux-machines/
H. Jeffrey, how to Block SSH Brute Force Attacks, retrieved 13th Aug from
http://www.rackaid.com/resources/how-to-block-ssh-brute-force-attacks/
centos/
analysis.com/introduction.htm
http://www.bloginfosec.com/2008/09/04/the-difference-between-quantitative-and-qualitative-
risk-analysis-and-why-it-matters-part-1/
http://www.sonoracomm.com/support/18-support/114-minimal-svcs
Price Water House Coopers, A practical guide to risk assessment, retrieved 13th Aug from
http://www.pwc.com/en_US/us/issues/enterprise-risk-
management/assets/risk_assessment_guide.pdf
P.Werner, Securing and Hardening Red Hat Linux Production Systems, retrieved 8th Aug from
www.puschitz.com/SecuringLinux.shtml
Linux Server & Hardening Security 65
References
http://bkraft.fr/articles/Securing_CentOS_6_installation/
centos-5.6
http://www.linuxsecurity.com/content/view/111337/65/