��KNOW HOW
The Linux daemon on steroids
XINETD
f you are already familiar with inetd from UNIX
In a previous article
or the earlier versions of Linux, just think of
we looked at TCP
Ixinetd as inetd on steroids; it can do what inetd
does plus a whole lot more.
Wrappers and how
you can protect
xinetd in a nutshell
xinetd is the main TCP/IP server and it controls the
incoming TCP-based
majority of network connections to your host,
connections, like
allows connections to be logged, provides general
access controls and time-based access control. It
FTP and Telnet. In
also allows specific services to be bound to a
this month s article
specified interface to allow balance of network
traffic to the host. It can also be used to forward
David Tansley looks
services to another host as a sort of DIY fail-over
Figure 1: Listing of xinetd.conf and /etc/xinet.d directory
a bit more closely
service. xinetd s job though, is mainly to determine
what daemon should start for each incoming
at securing your
$ /etc/rc.d/init.d/xinetd restart
connection, like Telnet, FTP or rsh. We won t look
server with xinetd,
at all these features just yet.
xinetd is shipped with most Linux distributions. Or alternately:
or the Extended
Depending on your set-up you could just have one
Internet Service
$ /usr/bin/killall TERM xinetd
file, /etc/xinetd.conf, but this configuration can be
a bit of a headache to administer. Most vendors
Daemon to call it
now split the configuration up into many files, one The configuration basics
its proper name
file for each service and one main default The main default file, /etc/xinetd.conf, lets you set
configuration file, as shown in Figure 1. the defaults for logging successful and failed
Be advised, if any changes are made to the connections. In Figure 1, the instances is set to 60,
xinetd configuration files the xinetd daemon must this is the number of requests that a service can
be restarted by either: handle at a time. If the Linux machine is part of a
big network, pump it up to 90. The log_type is
$ /sbin/service xinetd restart
how and where the logging will occur, as this is set
to SYSLOG authpriv, then syslog will handle the
Or alternately: logging, which is the default. Being logged as an
authpriv means the content maybe privileged
information, like usernames or IP addresses, but not
Listing 1: Listing of
the passwords. Depending on your Linux flavour
these messages will either be logged into
/etc/xinetd.d/telnet
/var/log/messages or more probably to
/var/log/secure.
service telnet
{ Lets now look at a typical service configuration
flags= REUSE
file as Telnet is a commonly used service this
socket_type= stream
makes it a good choice.
wait= no
The flags option of REUSE, lets the TCP/IP socket
user= root
(that s the protocol Telnet uses) to be well,
server= /usr/sbin/in.telnetd
reusable, in simple terms all this means is that the
log_on_failure= USERID
service can be restarted on the fly. The socket_type
disable= yes
STREAM is the type of TCP/IP used, stream is used
}
for both Telnet and FTP connections. When a
connection for Telnet is requested xinetd will either
39
Issue 20 " 2002 LINUX MAGAZINE
KNOW HOW
operate a multithreaded (unlike MS Windows) or IP-based control access
single service. The wait option says NO, so for every You may want to allow connections to a service from
new connection a new instance of in.telnetd the local network, but disallow it from any other
daemon will be created. If wait had been set to network. This is accomplished using the keywords
YES, then the incoming Telnet connection would ONLY_FROM by just specifying the IP/Network
wait until the in.telnetd daemon had finished address. If we want only Telnet to be accessible from
serving the previous request, before it would service the network address of 192.168.10.0. Edit the Telnet
the next request. The user is ROOT, this means the file in /etc/xinetd.d directory and insert the following:
service will run as root User ID. The actual server
will be the Telnet daemon /USR/SBIN/IN/TELNETD. It
only_from = 192.168.10.0/24
would be good to log all failures to syslog, so
log_on_failure will log the User ID as well as the IP The zero at the end of the IP address (192.168.10.0)
Address of the failed connection. When xinetd is is a wildcard. The /24 is the netmask.
initially shipped it comes pretty much secure, with Normal fully qualified hostnames can also be used,
Telnet disabled, so if your machine is on a network (such as bumper.somedomain.com) as long as they
and you cannot connect to your host simply change are resolvable. Let s now turn our attention to the FTP
the disable entry from YES to NO. service. Imagine we have a local company who
download extracts from their database and then FTPs
Controlling services it to our system, so that we can import it into our
To disable a service there is no need to go around databases. The other company s host IP address is
every services file located in /etc/xinetd.d and then 192.168.8.23; as our company is very security
edit the particular services file you wish to disable, conscious, we only want this specific IP address to
this can be done globally through the defaults file use the FTP service. You are not bound to use
/etc/xinetd.conf. Here s how: simply put the service network addresses in specifying the entry in
you want disabled on a new line that contains the ONLY_FROM, though it is much easier to. You can
following: just use the actual IP as in the following:
disabled = <�service to disable> <�service to only_from = 192.168.8.23
disable> <�?.>
The following is an extract from the error log
So, to disable say Telnet and FTP you would create a /var/log/secure, informing us that a host with an IP
entry like the following: address of 192.168.1.12 tried to FTP to our Linux
machine and failed. It also tells us the date and time
disable = telnet ftp
and the process number (PID).
Mar16 12:32:42 bumper xinetd[1380]: START: ftp
Notice that a space separates the services.Figure 2,
pid=1383 from=192.168.1.12
shows the defaults file with FTP and Telnet disabled.
Mar16 12:32:42 bumper xinetd[1383]: FAIL: ftp
As mentioned before, for the effect to take place
address from=192.168.1.12
you ll need to restart xinetd.
Mar16 12:32:42 bumper xinetd[1380]: EXIT: ftp
pid=1383 duration=0(sec)
Being a systems administrator, one of your firsts tasks
each day should be to check the logs. To quickly
check on failed accesses, use egrep. The following
one-liner will print out lines that contain either FAIL
or Auth* (for Authentication) from files ending in
.log.
$ egrep FAIL | Auth* *.log
To specify more that one host IP address, the proper
format is to enclose the non-network part in curly
brackets, separating them with commas. For example
suppose we wanted to specify the following hosts:
192.168.1.8, 192.168.1.20, 192.168.1.22 and
192.168.1.50 on the 192.168.1.0 network. We would
use the following to include those IP addresses:
Figure 2: Listing of /etc/xinetd.conf with FTP and Telnet disabled
40
LINUX MAGAZINE Issue 20 " 2002
KNOW HOW
All you need to do is specify the IP address and the
only_from = 192.168.1.{8,20,22,50}
port of the forwarding machine. Assume the local
Info
host has an IP address of 192.168.1.10. We wish
Xinted homepage
Similarly, to specify more that one network address, to forward all FTP connections to a backup FTP
http://synack.net/xinetd
for instance to allow network addresses 192.168.8.0 server, which has the IP address of 192.168.1.15,
and 192.168.10.0, use spaces to separate the entries, the FTP port number is 21. To see what port
like the following: numbers match what service check the
/etc/services file out.
only_from = 192.168.8.0/24 192.168.10.0/24
Using the redirect entry, our FTP (wu-ftpd) file
would look like Figure 3. Your file may look
Time-based control access slightly different. When a host tries to establish
You may have a security policy where FTP must be an FTP connection to our host, their screen will
closed down when office hours are over. xinetd lets display a Trying?192.168.1.10 message, then
you specify in a HH:MM format when a service can the re-direction will kick in and a connection will
be disabled. To disable FTP from 17:30 through to be established to the backup server
09:30 the following morning, using the (192.168.1.15).
ACCESS_TIMES entry we could specify the following
in the FTP (wu-ftpd) file: Conclusion
xinetd by itself enables you to create a fairly secure
access_times = 17:30-09:30
policy from daemons that are launched from
xinetd. We have demonstrated how you can
Being more adventurous we can also specify that the control your daemons, based on access via hosts
service is to be disabled at lunch break times: and IP addresses and how to enable/disable the
daemons, as well as simple time-based access
access_times = 12:30-14:00 17:30-09:30
control. We ve also shown how you can implement
basic redirection of services to another host. What
Unfortunately this format does not allow for a day we ve shown this month has been without the
number or day of week sequence. To disable it over a involvement of TCP Wrappers, so if you do not
weekend you ll have to edit the defaults file and have TCP Wrappers installed you re not out on a
insert a disable entry, like we have done previously. A limb security wise.
better solution however, would be to make a couple
of copies of xinetd.conf, one for normal working
(xinetd.live) and the other with the daemons you
wish disabled (xinetd.disable), then use cron to
automate it.
The following crontab entries would on a Friday at
17:30 copy the xinetd.disable over to xinetd.conf,
and on Monday at 07:30 copy the original
(xinetd.live) back, ready for business.
30 17 * * 5 /bin/cp /etc/xinetd.disable
/etc/xinetd.conf >/dev/null 2>&1
32 17 * * 5 /sbin/service xinetd restart >
/dev/null 2>&1
30 7 * * 1 /bin/cp /etc/xinetd.live
/etc/xinetd.conf > /dev/null 2>&1
32 7 * * 1 /sbin/service xinetd restart >
/dev/null 2>&1
Figure 3. Redirect entry in the FTP (wu-ftpd) file
A bit of redirection
The author
xinetd offers redirection (of sorts). This function
David has written two Linux-based books and
allows you to redirect a service to another
several magazine articles and enjoys riding his
machine. Why do this? Well suppose your FTP
motorbike when it s not raining. David is a Senior
directory structure got blitzed or perhaps the
Systems Analyst at ACE Europe, a leading
performance of your current machine is under-
Insurance company.
achieving. You will want a quick solution to
redirect all incoming connections to another host.
41
Issue 20 " 2002 LINUX MAGAZINE
Wyszukiwarka
Podobne podstrony:
In Control What Is Right2006 07 in and Out Using Rcs Version Control to Manage Simple Scripts2002 05 Migration Finding Controls to Tailor Your System2002 05 PodkarpackieSHSpec 06 6402C25 What Auditing Is and What It Isn t2003 05 Revision Control Openoffice Org ExplainedWhite Collar [02x12] What Happens In Burma12 Werntges controling KNX from Linux and USBQuasi Homogeneous and Pseudospin Modes of Zirconium Wire Combustion in AirWhat I Want In A ManMadonna And The Money Kept Rolling In (And Out)(ebook) L Ron Hubbard Dianetics Scientology Control and the mechanics of SCSResource Management using Control Groups Cgroups in Red Hat Enterprise Linux 62002 05 Wielofunkcyjny, komputerowy pilot RC52002 05 Networking the First Guide to Connecting MachinesC J England What Happens in Mexico Stays in Mexicowięcej podobnych podstron