- Rongsen.Com.Cn 版权所有 2008-2010 京ICP备08007000号 京公海网安备11010802026356号 朝阳网安编号:110105199号
- 北京黑客防线网安工作室-黑客防线网安服务器维护基地为您提供专业的
服务器维护
,企业网站维护
,网站维护
服务 - (建议采用1024×768分辨率,以达到最佳视觉效果) Powered by 黑客防线网安 ©2009-2010 www.rongsen.com.cn
作者:黑客防线网安linux教程网 来源:黑客防线网安linux教程网 浏览次数:0 |
1、对于xinetd服务,如果状态是running,那必须其下有一个服务要打开,没有服务
打开,是启动不起来的。另xinetd服务和nfs没有关系,所以关闭xinetd对nfs不会有影响
2、XDMCP协议用于X显示管理,整个通信过程未经加密处理,包括口令传输过程。使用同一X Server的攻击者有可能捕获其它X Client的击键,包括口令输入。
解决办法禁用XDMCP服务
关闭XDMCP服务步骤:
/etc/opt/gnome/gdm/gdm.conf
2.1、对于xdmcp服务,修改办法为:
[xdmcp]
# Distributions: Ship with this off. It is never a safe thing to leave
# out on the net. Setting up /etc/hosts.allow and /etc/hosts.deny to only
# allow local access is another alternative but not the safest.
# Firewalling port 177 is the safest if you wish to have xdmcp on.
# Read the manual for more notes on the security of XDMCP.
Enable=false
2.2、关闭之后重启图形服务即可:
rcxdm restart
3、VNC和VNC-HTTP-1
lsof –i:5801以及 lsof –i:5901发现是xinetd下的vnc,在/etc/xinetd.d/vnc下,相应部位加上disable =yes重启xinetd服务,同时chkconfig vnc off即可
4、ssh使用协议1
Station90.example.com:~ # cat /etc/ssh/sshd_config | grep -v ^# | grep Protocol
Protocol 2
5、echo服务,rexecd_服务关闭,远程login(rlogin)服务关闭
Station90.example.com:/etc/xinetd.d #cat echo
# default: off
# description: An echo server. This is the tcp version.
service echo
{
type = INTERNAL
id = echo-stream
socket_type = stream
protocol = tcp
user = root
wait = no
FLAGS = IPv6 IPv4
disable = yes
}
Station90.example.com:/etc/xinetd.d #cat rexec
# default: off
# description:
# Rexecd is the server for the rexec program. The server provides remote
# execution facilities with authentication based on user names and
# passwords.
#
service exec
{
socket_type = stream
protocol = tcp
flags = NAMEINARGS
wait = no
user = root
group = root
log_on_success += USERID
log_on_failure += USERID
server = /usr/sbin/tcpd
server_args = /usr/sbin/in.rexecd
disable = yes
}
Station90.example.com:/etc/xinetd.d #cat rlogin
# default: off
# description:
# Rlogind is a server for the rlogin program. The server provides remote
# execution with authentication based on privileged port numbers from trusted
# host
#
service login
{
socket_type = stream
protocol = tcp
flags = NAMEINARGS
wait = no
user = root
group = root
log_on_success += USERID
log_on_failure += USERID
server = /usr/sbin/tcpd
server_args = /usr/sbin/in.rlogind
# server_args = /usr/sbin/in.rlogind -a
disable = yes
}
在相应的配置文件中加入disable = yes后,重启服务/etc/init.d/xinetd restart
若确定/etc/xinetd.d目录下的服务不需要使用,则直接关闭xinetd服务
/etc/init.d/xinetd stop
Chkconfig xinetd off
6、FTP版本信息可被获取 CVE-1999-0614
Suse 10 sp2在2008年出版,已经修复以上问题
7、SSH版本信息可被获取 "CVE-1999-0634
suse官方确认,suse10 sp2上已修复该漏洞
我要申请本站:N点 | 黑客防线官网 | |
专业服务器维护及网站维护手工安全搭建环境,网站安全加固服务。黑客防线网安服务器维护基地招商进行中!QQ:29769479 |