- Timestamp:
- Nov 27, 2012, 4:43:17 PM (13 years ago)
- Location:
- trunk/server
- Files:
-
- 2 edited
Legend:
- Unmodified
- Added
- Removed
-
trunk/server
- Property svn:mergeinfo changed
/vendor/current merged: 581,587,591,594,597,600,615,618,740
- Property svn:mergeinfo changed
-
trunk/server/docs/htmldocs/Samba3-HOWTO/securing-samba.html
r599 r745 4 4 <a class="indexterm" name="id385281"></a> 5 5 <a class="indexterm" name="id385288"></a> 6 <a class="indexterm" name="id38529 4"></a>6 <a class="indexterm" name="id385295"></a> 7 7 <a class="indexterm" name="id385301"></a> 8 8 <a class="indexterm" name="id385308"></a> … … 27 27 <a class="indexterm" name="id385368"></a> 28 28 <a class="indexterm" name="id385375"></a> 29 <a class="indexterm" name="id38538 1"></a>29 <a class="indexterm" name="id385382"></a> 30 30 There are three levels at which security principles must be observed in order to render a site 31 31 at least moderately secure. They are the perimeter firewall, the configuration of the host … … 67 67 </p><p> 68 68 <a class="indexterm" name="id385535"></a> 69 <a class="indexterm" name="id38554 1"></a>69 <a class="indexterm" name="id385542"></a> 70 70 One of the simplest fixes in this case is to use the <a class="link" href="smb.conf.5.html#HOSTSALLOW" target="_top">hosts allow</a> and 71 71 <a class="link" href="smb.conf.5.html#HOSTSDENY" target="_top">hosts deny</a> options in the Samba <code class="filename">smb.conf</code> configuration file to 72 72 allow access to your server only from a specific range of hosts. An example might be: 73 </p><table border="0" summary="Simple list" class="simplelist"><tr><td><a class="indexterm" name="id38558 5"></a><em class="parameter"><code>hosts allow = 127.0.0.1 192.168.2.0/24 192.168.3.0/24</code></em></td></tr><tr><td><a class="indexterm" name="id385597"></a><em class="parameter"><code>hosts deny = 0.0.0.0/0</code></em></td></tr></table><p>73 </p><table border="0" summary="Simple list" class="simplelist"><tr><td><a class="indexterm" name="id385586"></a><em class="parameter"><code>hosts allow = 127.0.0.1 192.168.2.0/24 192.168.3.0/24</code></em></td></tr><tr><td><a class="indexterm" name="id385597"></a><em class="parameter"><code>hosts deny = 0.0.0.0/0</code></em></td></tr></table><p> 74 74 </p><p> 75 75 <a class="indexterm" name="id385612"></a> 76 76 <a class="indexterm" name="id385619"></a> 77 <a class="indexterm" name="id38562 5"></a>77 <a class="indexterm" name="id385626"></a> 78 78 The above will allow SMB connections only from <code class="constant">localhost</code> (your own 79 79 computer) and from the two private networks 192.168.2 and 192.168.3. All other … … 90 90 </p></div><div class="sect2" title="Using Interface Protection"><div class="titlepage"><div><div><h3 class="title"><a name="id385704"></a>Using Interface Protection</h3></div></div></div><p> 91 91 <a class="indexterm" name="id385712"></a> 92 <a class="indexterm" name="id38571 8"></a>92 <a class="indexterm" name="id385719"></a> 93 93 <a class="indexterm" name="id385725"></a> 94 94 By default, Samba accepts connections on any network interface that … … 109 109 the common name for Ethernet adapters on Linux. 110 110 </p><p> 111 <a class="indexterm" name="id38581 7"></a>111 <a class="indexterm" name="id385818"></a> 112 112 <a class="indexterm" name="id385824"></a> 113 <a class="indexterm" name="id38583 0"></a>113 <a class="indexterm" name="id385831"></a> 114 114 <a class="indexterm" name="id385837"></a> 115 115 If you use the above and someone tries to make an SMB connection to your host over a PPP interface called … … 120 120 </p><p> 121 121 <a class="indexterm" name="id385855"></a> 122 <a class="indexterm" name="id38586 1"></a>122 <a class="indexterm" name="id385862"></a> 123 123 <a class="indexterm" name="id385868"></a> 124 124 <a class="indexterm" name="id385875"></a> … … 150 150 </p><p> 151 151 <a class="indexterm" name="id386006"></a> 152 <a class="indexterm" name="id38601 2"></a>152 <a class="indexterm" name="id386013"></a> 153 153 <a class="indexterm" name="id386019"></a> 154 154 When configuring a firewall, the high order ports (1024-65535) are often used for outgoing connections and … … 156 156 ports except for established connections. 157 157 </p></div><div class="sect2" title="Using IPC$ Share-Based Denials"><div class="titlepage"><div><div><h3 class="title"><a name="id386031"></a>Using IPC$ Share-Based Denials </h3></div></div></div><p> 158 <a class="indexterm" name="id38603 8"></a>158 <a class="indexterm" name="id386039"></a> 159 159 <a class="indexterm" name="id386045"></a> 160 160 <a class="indexterm" name="id386052"></a> … … 167 167 </p><p> 168 168 <a class="indexterm" name="id386106"></a> 169 <a class="indexterm" name="id38611 2"></a>170 <a class="indexterm" name="id3861 19"></a>169 <a class="indexterm" name="id386113"></a> 170 <a class="indexterm" name="id386120"></a> 171 171 This instructs Samba that IPC$ connections are not allowed from anywhere except the two listed network 172 172 addresses (localhost and the 192.168.115 subnet). Connections to other shares are still allowed. Because the … … 176 176 <a class="indexterm" name="id386133"></a> 177 177 <a class="indexterm" name="id386140"></a> 178 <a class="indexterm" name="id38614 6"></a>178 <a class="indexterm" name="id386147"></a> 179 179 If you use this method, then clients will be given an <code class="literal">`access denied'</code> reply when they try 180 180 to access the IPC$ share. Those clients will not be able to browse shares and may also be unable to access … … 234 234 User xyzzy can map his home directory. Once mapped, user xyzzy can also map anyone else's home directory. 235 235 </span>”</span></p><p> 236 <a class="indexterm" name="id38632 8"></a>236 <a class="indexterm" name="id386329"></a> 237 237 <a class="indexterm" name="id386335"></a> 238 238 This is not a security flaw, it is by design. Samba allows users to have exactly the same access to the UNIX … … 241 241 </p><p> 242 242 <a class="indexterm" name="id386348"></a> 243 <a class="indexterm" name="id38635 4"></a>243 <a class="indexterm" name="id386355"></a> 244 244 If your UNIX home directories are set up so that one user can happily <code class="literal">cd</code> 245 245 into another user's directory and execute <code class="literal">ls</code>, the UNIX security solution is to change file
Note:
See TracChangeset
for help on using the changeset viewer.