Welcome to www.ClusterGate.RU

Internet
ClusterGate.RU

Home: Why clusters and for what the clusters are
News: mainly about the site
Linux: General Information,
Distributions, etc.
Clustering: software systems to organize clusters
Virtualization:
Hardware: server hardware and hardware for clustering
General Purpose Software
File Systems:
local and distributed
Access Methods
to large volume of data
Data transfer
between clusters
Security: all aspects (antihacker software, spare backup copy, power control)
High Performance Computing:
Examples of powerful clusters
Examples: midrange clusters
Monitoring and Measurement tools
Batch/Load Balance systems
Grid ...
Further reading:
Journals, Reviews,
News, Books
Computing in High Energy Physics:
Computing sites,
application packages
This is Security page for ClusterGate.RU

  • CAIDA the Cooperative Association for Internet Data Analysis, provides tools and analyses promoting the engineering and maintenance of a robust, scalable global Internet infrastructure.
  • Survey - A comparison of several host/file integrity checkers (scanners).
  • CCEVS The National Institute of Standards and Technology (NIST) and the National Security Agency (NSA) have established a program under the National Information Assurance Partnership (NIAP) to evaluate IT product conformance to international standards. The program, officially known as the NIAP Common Criteria Evaluation and Validation Scheme for IT Security (CCEVS) is a partnership between the public and private sectors. This program is being implemented to help consumers select commercial off-the-shelf information technology (IT) products that meet their security requirements and to help manufacturers of those products gain acceptance in the global marketplace.
    Project Objectives
    • To meet the needs of government and industry for cost-effective evaluation of IT products;
    • To encourage the formation of commercial security testing laboratories and the development of a private sector security testing industry;
    • To ensure that security evaluations of IT products are performed to consistent standards;
    • To improve the availability of evaluated IT products.
  • The ISF's Standard of Good Practice The Standard For Information Security
    The Standard of Good Practice for Information Security is designed to help any organisation, irrespective of market sector, size or structure, keep the business risks associated with its information systems within acceptable limits. It is a major tool in improving the quality and efficiency of security controls applied by an organisation.
  • The ISO 17799 Directory ISO 17799 is actually "a comprehensive set of controls comprising best practices in information security". It is essentially, in part (extended), an internationally recognized generic information security standard.
  • ShadowServer established in 2004, The Shadowserver Foundation gathers intelligence on the darker side of the internet. We are comprised of volunteer security professionals from around the world. Our mission is to understand and help put a stop to high stakes cybercrime in the information age.
  • DAMBALLA - (commercial company) Targeted Protection against targeted attacks
    "A typical enterprise already has between 3% and 5% of its systems compromised with BotArmy malware, even with up-to-date antivirus and other online defenses."
  • SeLinux >>Security-Enhanced Linux
  • RSBAC -- is a flexible, powerful and fast (low overhead) open source access control framework for current Linux kernels, which has been in stable production use since January 2000 (version 1.0.9a). All development is independent of governments and big companies, and no existing access control code has been reused.
    Practically, it allows full fine grained control over objects (files, processes, users, devices, etc.), memory execution prevention (PaX, NX), real time integrated virus detection, and much more.
  • SecurityFocus -- SecurityFocus is the most comprehensive and trusted source of security information on the Internet. SecurityFocus is a vendor-neutral site that provides objective, timely and comprehensive security information to all members of the security community, from end users, security hobbyists and network administrators to security consultants, IT Managers, CIOs and CSOs.
  • CERT established in 1988, the CERTŪ Coordination Center (CERT/CC) is a center of Internet security expertise, located at the Software Engineering Institute, a federally funded research and development center operated by Carnegie Mellon University.
  • unsecure - personal page for Gordon Lyon (author of nmap scanner). The site does contain a lot of info about (un)security for Open Source Software.
  • rkhunter - Rootkit scanner (for Linux of course) is scanning tool to ensure you for about 99.9%* you're clean of nasty tools. This tool scans for rootkits, backdoors and local exploits by running tests like:
    • MD5 hash compare
    • Look for default files used by rootkits
    • Wrong file permissions for binaries
    • Look for suspected strings in LKM and KLD modules
    • Look for hidden files
    • Optional scan within plaintext and binary files
  • chkrootkit chkrootkit is a tool to locally check for signs of a rootkit
  • OSSEC OSSEC is an Open Source Host-based Intrusion Detection System. It performs log analysis, integrity checking, Windows registry monitoring, rootkit detection, real-time alerting and active response.
    It runs on most operating systems, including Linux, OpenBSD, FreeBSD, MacOS, Solaris and Windows.
  • OpenSSL The OpenSSL Project is a collaborative effort to develop a robust, commercial-grade, full-featured, and Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a full-strength general purpose cryptography library. The project is managed by a worldwide community of volunteers that use the Internet to communicate, plan, and develop the OpenSSL toolkit and its related documentation.
  • OpenSSH OpenSSH is a FREE version of the SSH protocol suite of network connectivity tools that increasing numbers of people on the Internet are coming to rely on. Many users of telnet, rlogin, ftp, and other such programs might not realize that their password is transmitted across the Internet unencrypted, but it is. OpenSSH encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other network-level attacks. Additionally, OpenSSH provides a myriad of secure tunneling capabilities, as well as a variety of authentication methods.
    The OpenSSH suite includes the ssh program which replaces rlogin and telnet, scp which replaces rcp, and sftp which replaces ftp. Also included is sshd which is the server side of the package, and the other basic utilities like ssh-add, ssh-agent, ssh-keysign, ssh-keyscan, ssh-keygen and sftp-server. OpenSSH supports SSH protocol versions 1.3, 1.5, and 2.0.
  • Information Security at St.Petersburg (Russia) State Politechnical University (mainly in Russian)

Backup and Power control tools

  • Backup -- what is backup?, which tools?, and related info
  • Apcupsd a daemon for controlling APC UPSes. Apcupsd can be used for power mangement and controlling most of APC's UPS models on Unix and Windows machines. Apcupsd works with most of APC's Smart-UPS models as well as most simple signalling models such a Back-UPS, and BackUPS-Office. During a power failure, apcupsd will inform the users about the power failure and that a shutdown may occur. If power is not restored, a system shutdown will follow when the battery is exhausted, a timeout (seconds) expires, or runtime expires based on internal APC calculations determined by power consumption rates.
  • Network UPS Tools (NUT) The primary goal of the Network UPS Tools (NUT) project is to provide reliable monitoring of UPS hardware and ensure safe shutdowns of the systems which are connected. We attempt to monitor every kind of UPS, given sufficient interest. This software is the combined effort of many individuals and companies.
  • OpenUPSd -- A UPS daemon. OpenUPSd is a UPS daemon, pretty specific to those Belkin serial-connected UPS's that speak the "regulator pro smart protocol", as documented on this handy web-page. I've got a device that reports itself to be a "F6C625-220V" and it's working with the software quite happily :-). That UPS may now have done its last dance, so I've now got an APC smart UPS. Currently investigating adding support for this; found some handy protocol documentation for it.
  • Simplest way to monitor the power the cite begins.
    "The solution in its original form was to attach a modem to the mains power and connect it to the Linux machine, then have the Linux machine monitor the data set ready (DSR) line on the modem. When the mains power is lost, the Linux machine will still be running because it is connected to the UPS. The modem, which is not connected to the UPS, will lose its power source. The Linux machine will detect that the modem is no longer powered the next time it polls the DSR line and start to shut down while the UPS battery still has power."
    End of cite.
Please email the
portalmaster@pnpi.spb.ru
with questions or comments.
Our smart sponsors:

All rights reserved. Copyright © 2006, 2007, 2008, 2009. Andrey Y Shevel.


Last revised: Monday, 27-Apr-2009 12:41:47 MSD
Current date/time: Saturday, 04-May-2024 21:06:07 MSK
This document URL http://hepd.pnpi.spb.ru:443/ClusterGate.RU/CG_Security/index.shtml