OS X security - Information Security and Policy Office

Download Report

Transcript OS X security - Information Security and Policy Office

OS X Security
IT Security Analyst – Robert Vinson
[email protected]
[email protected]
Reality Check





OS X had a similar number of vulnerabilities
patched as Windows last year.
Rootkits and worms have been developed for
OS X.
OS X machines can be and have been
compromised.
Move to x86 architecture makes OS X a more
attractive target to exploit developers.
The Point: Use Anti-Virus, keep up to date on
patches, etc.
Physical/Boot Security



Location – adequate visual surveillance
Service Provided – Affects which mitigation
steps are realistic
Desktops
 Open
Firmware password
 Case lock
 Disable automatic root login in Single-User mode

Servers
 Open
Firmware password would hinder remote reboot
Software Updates

System Preferences -> Software Update
 Servers
should generally have this disabled.
 Workstations should have daily update
checks.
Disable Unneeded Services

Enumerate open ports
 Netstat
 Port
scanner
 Server Admin application

Disable unneeded services
 Server Admin
 /etc/hostconfig
SSH





Edit configuration file - /etc/sshd_config
Disallow root logins
Add usernames which should be able to connect
via the AllowedUsers Directive.
Utilize firewall to restrict access to the daemon
(e.g. perhaps restrict to University and
Mediacom IP space only)
Add the service to xinetd and utilize xinetd
throttling capabilites.
Permissions

OS X Permissions are weak.
 Many
world writable/readable directories and even
executables!

Set more restrictive umask
 Can

be done via shell initialization files and/or globally
Audit permissions system wide
 Good
place to start: SUID files, world
writable/files/directories
File Serving
AFP - allows for encrypted File transfer.
 NFS - netboot mounts should be exported
as read-only and squash root by default.
 SMB – sharing in Windows environments.

Firewall





OS X uses the IPFW firewall.
Server Admin can be used to configure the
firewall.
Greater control can be had by editing the
/etc/ipfilter/ipfw.conf file.
IPFW utility can be scripted to open up ports at
needed times, etc.
Utilize the firewall to scope down accessibility to
services.
Logging



Syslog – configuration in /etc/syslog.conf
/var/log
Remote logging, as always, is a very good idea.
 Syslog
server can be restricted to only accept alerts
from certain IP(s) or subnet(s).
 Generally a good idea to have a separate partition for
/var or even /var/log on a syslog server
User Authentication

Utilize Open Directory to set a password
policy
 Some
Recommended settings
8 char long passwords
 Require alphanumeric
 Enable expiring passwords
 Enable account locking for failed attempts


Use pwpolicy to set policy
Misc.
File Vault
 Disk Utility for fixing permissions

References/Resources
OS X Benchmark security document http://www.cisecurity.org
 NSA’s OS X Server Security Configuration
guide - http://www.nsa.gov/snac
 Apple – www.apple.com
