LinuxQuestions.org
Latest LQ Deal: Latest LQ Deals
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 07-24-2001, 05:21 PM   #1
tmiles
LQ Newbie
 
Registered: Jul 2001
Location: MD
Distribution: NETMAX
Posts: 18

Rep: Reputation: 0
Question Security


How can I make it so no one can find out my OS version when a network scan is done? Also how can I hide the BIND DNS version I am using? I am using NETMAX linux (on redhat 6.2)
 
Old 07-25-2001, 07:34 AM   #2
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Active fingerprinting tools like Nmap, Hunt and Queso rely on differences in TCP/IP stack (tcp 3-way handshake reaction, initial/return payload, byte-order, system settings) to come up with a fingerprint. Then there's also passive fingeprinting (manually or with tools like Siphon) based on system settings like TTL, window size, TOS and DF flags (theres more like icmp payload, sequence/ip ident numbers. etc etc tho).

Some behaviour can be changed by patching the kernel, some by echoing a value into /proc/sys/net/* keys. The TOS bits can be set tru fi ipchains. For more I think u really should read Fyodor's Phrack article and nmap docs, Kernel$(version)/Documentation/ip-sysctl, else look for docs by Vision, Dug Song or Spitz.

So at least 20+ params can be set from /proc to customize behaviour. Theres a few patches around to help thwart recognition: Fpf or Finger Print Fu***r (dunno if its LKM or kernel patch, never used it), then theres something (LKM?) against tracerouting, at least one setting from Solar Designers Openwall kernel patch and Sytek's kernel patch.


Just try proc & patch customizing out, but remember this is "security by obscurity", not a true solution, and if someone effectively scans for banners it's of no use anyway (IIS5 on Linux, yeah right).

Bout Netmax I dont know, but in BIND u would set up an ACL on the CHAOS zone named "bind". If its hardcoded itll require rebuilding. Look for printf'ed {BASE_}VERSION strings in the *.{c,h} code.

HTH somehow.

*(doh! I forgot to mention the obvious... firewalling helps thwart OS recon also...)

Last edited by unSpawn; 07-25-2001 at 08:18 AM.
 
Old 07-25-2001, 08:46 AM   #3
jharris
Senior Member
 
Registered: May 2001
Location: Bristol, UK
Distribution: Slackware, Fedora, RHES
Posts: 2,243

Rep: Reputation: 47
Have a look at http://www.linuxquestions.org/questi...ht=fingerprint if you can access a port of a machine then you can pretty much fingerprint it - if you block all the ports then you don't have a problem, but then again you also don't have any available network services - not much use if you want to run a web server etc...

As for hiding the version of Bind you are using - do you just want to stop people from access it? If this is the case then you can just firewall the port, if you want people to be able to access it but now know the version the you probably want to hack the source code so it doesn't reply with the version, or replys with an incorrect version. But as mentioned hiding possible holes isn't a very good way to go about security!

HTH

Jamie...
 
Old 07-25-2001, 10:43 PM   #4
tmiles
LQ Newbie
 
Registered: Jul 2001
Location: MD
Distribution: NETMAX
Posts: 18

Original Poster
Rep: Reputation: 0
Talking Thanks!

Security is not the issues. In the building I work in has a problem with using Linux. And even though I know it's secure when they do Nmap scans etc and see the linux or they run hydra and it comes up with the bind version they freak out. I could use UNIX (Even though it's no more secure) So I want to hind the bind version that comes back on the scan and the os version..
 
Old 07-26-2001, 02:51 AM   #5
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
In BIND 8 or 9's /etc/named.conf:
Code:
     options {
     (options-here-yada-yada-yada)
     version "Microsoft Office BINDer REL 1.0";
     };
:-]
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
help needed in security ,vonarabilities ,loopholes in linux security haseebnazar Linux - Security 2 11-23-2005 07:16 PM
[Security Questions] Last Login, how good is this feature for security breach info? t3gah Linux - Security 2 06-14-2005 01:02 AM
todays requirements regarding security (not limited to linux security) markus1982 Linux - Security 8 04-25-2004 10:58 PM
Linux security Vs Windows security keene General 50 11-01-2003 11:22 PM
Slackware Security Update: GDM security update phoeniXflame Slackware 2 08-26-2003 04:21 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 11:27 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration