Ana səhifə

Authors: Adam Gray cism


Yüklə 279 Kb.
səhifə6/11
tarix25.06.2016
ölçüsü279 Kb.
1   2   3   4   5   6   7   8   9   10   11

Network


The Network pane contains per-interface network settings. In general, disable unused interfaces. Wireless networking shouldn’t be used for servers unless absolutely required. Here are some recommendations for any network interface:

  • When possible, configure IPv4 addresses manually, rather than using DHCP.

  • Disable IPv6 if it isn’t used.

  • Leave Make AppleTalk Active unchecked.

Note: When possible use a proxy for Internet connections. This improves performance and security of these connections.


Wireless Networking


To secure the wireless networking:

  • Open System Preferences.

  • Select Network Preferences.

  • Select Airport.

  • Set By default, ‘Ask to join to new networks’

  • Then press the ‘Advanced…’ button and configure the following:

    1. Check “Require Administrator password to control airport”

    2. Consider un-checking ‘Remember any network this computer has joined’

    3. Consider checking ‘Disconnect from wireless networks when logging out’

  • Make sure that when connecting to wireless networks that you never use WEP. Always use WPA or WPA2 if at all possible.

Due to attacks like those released at BlackHat by David Maynor and Johnny Cache, disable Airport when wireless is not required. To do so:

  • Click on the Airport icon at the top of the screen.

  • Select the ‘Turn Airport Off’ menu item.

RADIUS is required to use the WPA2 Enterprise feature of the Apple Airport. 10.5 has no built-in RADIUS server: MacRADIUS is available at http://www.macradius.com.

Bluetooth


If your device has Bluetooth support, go the Network pane, and click on Bluetooth. Choose ‘Set Up Bluetooth Device…’

  • Uncheck On.

If you must enable it, make the system less likely to be found by:



  • Uncheck Discoverable.

Unless you need to be able to wake the computer with a Bluetooth device (say, a cordless keyboard or mouse),



  • Uncheck Allow Bluetooth devices to wake this computer.

  • On the Sharing tab, disable all unused services.

One danger behind the use of Bluetooth is Bluetooth file sharing. To secure the Bluetooth File Sharing features:



  • Go to the Sharing tab of the Bluetooth System Preference.

  • Uncheck items that you will not be using to share data with Bluetooth.

  • Check the password option for all items that are enabled.

  • For Bluetooth File Transfer:

    1. Select the folder with files that should be shared. Make sure only items that are required to have remote access are located in this folder.

    2. Check the box for Require pairing for security.

  • For Bluetooth File Exchange:

    1. Select the appropriate folder.

    2. Check the box for Require pairing for security.

  • For Bluetooth-PDA-Sync:

    1. Select the type of Serial Port interface for Bluetooth to mimic.

    2. Check the box for Require pairing for security.

    3. Check the box for Show in Network Preferences.

QuickTime


To avoid potential malicious content downloaded from the web, a situation that has happened in the past:

  • Uncheck Play movies automatically on the Browser tab.

Sharing


Reducing the number of services in reduces the attack surface of your system:

  • Disable all unused services on the Services tab.

If you enable Apple Remote Desktop(Remote Management):



  • Click the Access Privileges button and configure the following:

  • For each user, only grant those privileges that the user requires under Allow user to do the following on this computer.

  • Uncheck Guests may request permission to control screen.

  • Disable VNC connections if possible; otherwise, require a strong password.

On the Internet tab, leave Internet Sharing off unless you need to share your network connection with other computers. If you use AirPort to share your connection, be sure to follow the recommendations on Wireless Networking elsewhere in this document.


The ipfw.conf file and the ipfw command line utility, located at /etc/ipfilter/ipfw.conf, can be used to customize firewall rules beyond what is available in the GUI. In addition to ipfw there is dummynet, which can be used to shape traffic and impose bandwidth limits using a variety of parameters. The security section of this document outlines additional firewall options and should be reviewed as needed.

Accounts


System administrators should have unprivileged accounts for performing many of their daily tasks and a separate administrative account for system maintenance only. In most cases, a sysadmin will automatically be prompted for administrator credentials when performing administrative actions as an unprivileged user. For more intensive administrative tasks, the sysadmin can use Fast User Switching to login to the special administrator account.

To make an account unprivileged:



  • Uncheck Allow user to administer this computer on the Password pane of the Accounts section in the System Preferences application.

Each sysadmin’s administrative account should have an inconspicuous user name (not Administrator), a strong passphrase. Once these settings have been set:



  • Allow user to administer this computer checked.

On the Login Options tab:



  • Uncheck Automatically log in as.

  • Set Display login window as to Name and password so as not to give an attacker a list of valid usernames.

  • Uncheck Show the Restart, Sleep, and Shut Down buttons to prevent denial of service.

  • Uncheck Show password hints to avoid displaying user-chosen hints that could be too revealing.

  • Fast user switching should only be used on computers where the user community is trusted. Rouge process can stay resident in the background even if another user is using the computer.
1   2   3   4   5   6   7   8   9   10   11


Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©atelim.com 2016
rəhbərliyinə müraciət