| Originally published: Friday, 28 January 2000 | Author: Derrick H. Lewis |
| Published to: news_enhance_security/Security Tips | Page: 1/1 [Printable] |
A trivial but useful tip for helping thwart the script kiddie.Have your users tmp directory set to ~/.tmp or related to help keep /tmp clean. This is just housecleaning. In /etc/profile, export TMP=~/.tmp
Now make /tmp a separate partition. The mount flags for
it should be similar to this list:
"noexec,nosuid,nodev,
rw,auto,async" It is also a good idea to enforce quotas on this partition the options used prevent execution of any files stored, prevent suid operation, no special files, i.e. The kind found in /dev, allows it to be readwrite, auto mounted on boot, and the default asynchronous write operations. Therefore no more /tmp/.sh which is a suid shell created by an exploit. |
|
| Page 1 of 1 | |
|
(this article had no body text) | |