Author: Benjamin D. Thomas
One of the greatest indicators of unauthorized system activity is logging. However, in a compromise the integrity of logs often come into question. Depending on the extent of an attack, logs could have been deleted, modified, or flooded. More knowledgeable attackers possess the skills necessary to cover their tracks and make any forensic investigation
virtually impossible.
Those administrators who have external intrusion detection sensors will have some advantage and additional information to aid in an investigation, but nothing takes the place of accurate system logs. It is possible to have the best of both worlds by setting up an external logging server. Msyslog gives system administrators the ability to send syslog messages to an external database. Therefore, logs from multiple servers can reside on single hardened machine. This gives administrators the advantage of being able
to focus all of their efforts at a single location.
In addition to log integrity problems, often administrators are fed too much data. If logging is too verbose, real anomalies may easily be overlooked. Feeding all logs into a central database will also reduce this problem. Using additional software or SQL queries, it can potentially be easier to find correlations and anomalies in logs across multiple servers. Takeing it a step further, one could simply automate the log analysis process and only alert the administrator when there is a major problem.
Managing logs effectively is no easy task. Extracting information from Gigs of data is even more difficult. We have a very valuable resource at our fingertips. Start using your logs, they can give a remarkably clear picture of the state of a network.
More information on using syslog with MySQL and PHP can be found here.
Until next time, cheers!
Benjamin D. Thomas
LinuxSecurity
Feature Extras:
Managing
Linux Security Effectively in 2004
– This article examines the process of proper Linux security management in
2004. First, a system should be hardened and patched. Next, a security routine
should be established to ensure that all new vulnerabilities are addressed.
Linux security should be treated as an evolving process.FEATURE:
OSVDB – An Independent and Open Source Vulnerability Database
– This article outlines the origins, purpose, and future of the Open Source
Vulnerability Database project. Also, we talk to with Tyler Owen, a major
contributor.[ Linux
Advisory Watch ] – [ Linux
Security Week ] – [ PacketStorm
Archive ] – [ Linux Security
Documentation ]
Linux Advisory Watch
is a comprehensive newsletter that outlines the security vulnerabilities that
have been announced throughout the week. It includes pointers to updated packages
and descriptions of each vulnerability.
[ Subscribe
]
Distribution: | Conectiva | ||
1/5/2004 | kernel | ||
Privilege escalation vulnerability Paul Starzetz from iSEC Security Research reported another vulnerability |
|||
1/6/2004 | lftp | ||
Buffer overflow vulnerability Ulf Hþrnhammar reported two buffer overflow vulnerabilities[3] in the lftp |
|||
1/7/2004 | ethereal | ||
Denial of Service vulnerability When reading crafted data, Ethereal will crash. |
|||
Distribution: | Debian | ||
1/5/2004 | ethereal | ||
Denial of service attack A heap-based buffer overflow allows remote attackers to cause a denial of |
|||
1/5/2004 | lftp | ||
Buffer overflow vulnerability An attacker could create a carefully crafted directory on a website so that |
|||
1/5/2004 | screen | ||
Privilege leak vulnerability Timo Sirainen reported a vulnerability in screen, a terminal multiplexor |
|||
1/6/2004 | BIND | ||
Cache poisoning vulnerability A vulnerability was discovered in BIND, a domain name server, whereby a |
|||
1/6/2004 | libnids | ||
Buffer overflow vulnerability A vulnerability was discovered in libnids, a library used to analyze IP |
|||
1/6/2004 | mpg321 | ||
Malformed format string vulnerability A vulnerability was discovered in mpg321, a command-line mp3 player, whereby |
|||
1/6/2004 | nd | ||
Buffer overflow vulnerability Multiple vulnerabilities were discovered in nd, a command-line WebDAV interface, |
|||
1/6/2004 | kernel | ||
Privilege escalation vulnerability Paul Starzetz discovered a flaw in bounds checking in mremap() in the Linux |
|||
1/7/2004 | jabber | ||
Denial of Service vulnerability A bug in the handling of SSL connections could cause the server process |
|||
1/7/2004 | zebra | ||
Denial of Service vulnerability Two vulnerabilities were discovered in zebra, both resulting in DoS. |
|||
1/7/2004 | fsp | ||
Buffer overflow/Directory traversal vulns. A remote user could both escape from the FSP root directory, and also overflow |
|||
1/7/2004 | kernel | ||
More for Priv. Esc vulnerability A flaw in bounds checking in mremap() in the Linux kernel may allow a local |
|||
1/8/2004 | vbox3 | ||
Privilege leak vulnerability Root privileges were not properly relinquished before executing a user-supplied |
|||
Distribution: | EnGarde | ||
1/5/2004 | kernel | ||
bug and security fixes. This update fixes two security issues and one critical bug in the Linux |
|||
Distribution: | Fedora | ||
1/6/2004 | kernel | ||
Privilege escalation vulnerability Paul Starzetz discovered a flaw in bounds checking in mremap() in the Linux |
|||
Distribution: | Immunix | ||
1/6/2004 | kernel | ||
Privilege escalation vulnerability Paul Starzetz has discovered a mishandled boundary condition in the mremap(2) |
|||
Distribution: | Mandrake | ||
1/8/2004 | kernel | ||
Privilege escalation vulnerability A flaw in bounds checking in mremap() in the Linux kernel may be used to |
|||
Distribution: | Openwall | ||
1/6/2004 | kernel | ||
Privilege escalation vulnerability This vulnerability may allow any local user and any process to execute arbitrary |
|||
Distribution: | Red Hat |
||
1/5/2004 | kernel | ||
Privilege escalation vulnerability Updated kernel packages are now available that fix a security vulnerability |
|||
1/8/2004 | ethereal | ||
Denial of Service vulnerabilities By exploiting these two issues it may be possible to make Ethereal crash |
|||
Distribution: | Slackware | ||
1/7/2004 | kernel | ||
Privilege escalation vulnerability There is a bounds-checking problem in the kernel’s mremap() call which could |
|||
Distribution: | Suse | ||
1/5/2004 | kernel | ||
Privilege escalation vulnerability By exploiting an incorrect bounds check in do_mremap() during the remapping |
|||
Distribution: | Trustix | ||
1/5/2004 | kernel | ||
Privilege escalation vulnerability The kernel packages prior to this update suffers from a bug in the mremap |
|||
Distribution: | Turbolinux | ||
1/6/2004 | kernel | ||
Privilege escalation vulnerability The local users may be able to gain root privileges. |
|||