Difference between revisions of "Linux Security"

Replaced checksums with file integrity monitoring
imported>Tele
imported>Dalto
(Replaced checksums with file integrity monitoring)
Line 117: Line 117:




=Internet and Network Security=
=Firewalls=


==Firewalls==
The [[Firewalls]] article has a full description of the Firewall solutions available on Manjaro.
 
 
=File Integrity Monitoring=


The [[Firewalls]] article has a full description of the Firewall solutions available on Manjaro.
Your first line of defense should always be security practices that prevent an intrusion such as firewalls, intrusion prevention systems and keeping your system patched and up-to-date.  However, it is also useful to try to ensure that your system has not been compromised.  One way to help with this is by using a file integrity monitoring solution.  These solutions work by comparing the checksums or the files on your system to their previous versions and alerting about changes.


An open source tool which provides this service is [https://aide.github.io/ AIDE](Advanced Intrusion Detection Environment.  You can install it with the command:


=Checksums=
pamac install aide


Checksums are used to validate processed files.
By checking the file checksum, you can detect changes to the file, but the method is not perfect.
* The larger the file, the greater the probability of receiving the same checksum. This phenomenon is called collision. This is a disadvantage for checking whether a file is identical and it is also a security defect.
* Certain algorithms (MD5, SHA-0, SHA-1) are prone to collision, generally antiquated for security purposes, and thus not modernly recommended for use.
* Servers can make use of checksums instead of passwords. One advantage is this makes it possible to generate several passwords that will match the same checksum.
* Checksums can also be used to detect changes in files rather than for security. Sample programs for checking file integrity Tripwire, AIDE.


List of hash functions
Instructions for using configuring aide can be found on [https://github.com/aide/aide/blob/master/doc/manual.html the AIDE Github site].
https://en.wikipedia.org/wiki/List_of_hash_functions#Unkeyed_cryptographic_hash_functions




Anonymous user