[Triumf-linux-managers] Security of Linux SBCs

Andrew Daviel advax at triumf.ca
Mon Oct 26 19:08:12 PDT 2015


In the distant past (1990's), there was a variety of Unix and Linux 
computers at TRIUMF, running things like Telnet service and NFS3 over the 
internet, with DES3 passwords in /etc/passwd for anyone to see.
So we had security guidelines for updating and securing them, published 
online.

Over time as we adopted Scientific Linux and kickstart installations, 
RedHat tightened security so that SL out-of-the-box was, for most 
purposes, adequately secured and updated automatically with yum, and our 
default installations added e.g. syslog forwarding. With web 
reorganizations, our security guidelines became outdated and became lost.

In recent years, there has been a proliferation of non-RedHat systems at 
TRIUMF, not using kickstart and unable to use our RPM packages. This 
includes SBCs (single-board computers) such as Raspberry Pi and 
BeagleBoard. These devices are full Linux systems in their own right, are 
just as vulnerable as normal desktop or server systems, and are not exempt 
from normal good security practices.

Recently, a Raspberry Pi computer was found which had been placed on the 
public internet, where it was attacked on multiple occasions and used to 
host phishing websites and a network scanner.
Unlike RedHat systems which create a strong password during installation, 
this device uses a widely published default password out-of-the-box, and 
an open sudoers file (so that root access is trivial).

Please ensure that such devices are not placed on the open TRIUMF network, 
or that if they are, that they are adequately secured:

https://ccn.triumf.ca/security/linux.security
https://ccn.triumf.ca/security/linux.security.other/


Any discussion on TRIUMF Linux Users <triumf-linux-users at lists.triumf.ca>, 
please.


-- 
Andrew Daviel, TRIUMF, Canada
Tel. +1 (604) 222-7376  (Pacific Time)
Network Security Manager


More information about the Triumf-linux-managers mailing list