Linux Gurus: What are your post install security routines?

GTaudiophile

Lifer
Oct 24, 2000
29,776
31
81
I remember, after installing Slackware for the first time 3 years ago, my expert friend guided me through the process of plugging a few holes. I distinctly remember editing the hosts.allow file and then also some other file where one could comment out FTP and Telnet such that those services wouldn't run (I forget the file name).

What are some of the things you all do to plug holes after a new installation? Or do you just leave everything at default?
 

n0cmonkey

Elite Member
Jun 10, 2001
42,936
1
0
/etc/inetd.conf is probably the place to comment out services you don't need. I generally just don't let inetd run.

In /etc/hosts.deny:
ALL:ALL

Don't forget to update your system.
 

Nothinman

Elite Member
Sep 14, 2001
30,672
0
0
AFAIK Ubuntu comes with no network services listening, /etc/inetd.conf or /etc/xinetd.d/* and /etc/xinetd.conf, I don't remember which Ubuntu defaults to installing.
 

Nothinman

Elite Member
Sep 14, 2001
30,672
0
0
Another thing one can do is edit startx with -nolisten tcp in the serverargs section.

This should be done by default, Ubuntu is based on Debian and Debian has been doing that by default for as long as I can remember.
 

stars

Golden Member
Feb 27, 2002
1,068
0
0
Originally posted by: Nothinman
Another thing one can do is edit startx with -nolisten tcp in the serverargs section.

This should be done by default, Ubuntu is based on Debian and Debian has been doing that by default for as long as I can remember.

Yes, I agree. The main reason I mentioned it, is in case someone using a distro that doesnt do that by default reads this.