20

Click here to load reader

Secure your IT infrastructure with GNU/Linux

Embed Size (px)

DESCRIPTION

I first did this presentation way back in 2006 during foss enterprise event organized in Colombo.

Citation preview

Page 1: Secure your IT infrastructure  with GNU/Linux

1

Secure your IT infrastructure with GNU/Linux

ByBuddhika Siddhisena

Chief Technology Officer & Co-Founder's of ThinkCube Systems

&Member's of LKLUG

Page 2: Secure your IT infrastructure  with GNU/Linux

2

Strategy

● Migrate Core services

● Migrating other services

● Desktop replacements

Page 3: Secure your IT infrastructure  with GNU/Linux

3

Core services

● Email

● Web site

● Proxy

● File sharing

● Printer sharing

Page 4: Secure your IT infrastructure  with GNU/Linux

4

Email Server

● Email Server Software

– Sendmail is the most popular– Postfix and Exim are other popular ones

● Email Authentication

– Unix account authentication– MySQL authentication– LDAP authentication

Page 5: Secure your IT infrastructure  with GNU/Linux

5

Email Clients

● Any client which supports SMTP/IMAP/POP

● Web mail

– OpenWebMail (perl)– Horde (php)– Zimbra (java)

Page 6: Secure your IT infrastructure  with GNU/Linux

6

Email + Virus + Spam

● SPAM detection

– Spam Assassin (rule based)– Dspam (statistical)

● Virus scanners

– ClamAV● Virus to Mail server interfaces

– Amavis – MailScanner

Page 7: Secure your IT infrastructure  with GNU/Linux

7

Web & Proxy

● Recommended Web server is Apache 2.x

● Recommended Proxy server is SQUID

● SQUID to virus scanner interfaces

– Squirm– Squidguard– squidcalm

Page 8: Secure your IT infrastructure  with GNU/Linux

8

File Shares

● File sharing

– SAMBA, implements the SMB/NMB protocols– WebDAV, uses apache to upload/download

files– SFTP/SCP, Secure FTP or Secure Copy. Part of

OpenSSH

Page 9: Secure your IT infrastructure  with GNU/Linux

9

Printer Sharing

● CUPS (Common Unix Printing System)

– Implements IPP (Internet Printing Protocol)– SAMBA can be configured to share printers

● Printer Drivers– Foomatic drivers– GIMP Print Drivers

Page 10: Secure your IT infrastructure  with GNU/Linux

10

Other services

● Firewalls

● Windows PDC/AD

● Databases

● VOIP/FAX

● Network monitoring

Page 11: Secure your IT infrastructure  with GNU/Linux

11

Firewalls

● Linux already has a built in firewall called IPTables

● SELinux for application level security

Page 12: Secure your IT infrastructure  with GNU/Linux

12

PDC/BDC/AD

● SAMBA can be configured for all of these scenarios.

● OpenLDAP or Fedora Directory can be used to implement directory services.

Page 13: Secure your IT infrastructure  with GNU/Linux

13

Databases

● MySQL is a much better replacement for MS Access or MSSQL.

● PostgreSQL can replace Oracle & MSSQL.

Page 14: Secure your IT infrastructure  with GNU/Linux

14

VOIP/FAX

● Asterisk is a popular SIP based VOIP server.

– Peer-to-peer calls via a VOIP phone.– Conferencing support– Interface with PSTN lines and provide PBX

functionality

● HylaFAX is a popular FAX server.

Page 15: Secure your IT infrastructure  with GNU/Linux

15

Net Monitor

● LAN monitoring tools.

– netcat.– Ntop

● Log Analyzers– Webalizer (http,squid etc.)– Awstats (http,squid,mail etc.)

Page 16: Secure your IT infrastructure  with GNU/Linux

16

Desktop Replacements

● Replace IE with Firefox

● Replacing Microsoft Office with OpenOffice.org

● Replace Outlook with Thunderbird for simple email functionality

● Replace Photoshop with Gimp● Replace Corel Draw with Inkscape

Page 17: Secure your IT infrastructure  with GNU/Linux

17

Which Distribution

● If you want to run a Server...

– Redhat AS (Commercial)– SuSE Enterprise (Commercial)– CentOS (Redhat AS compatible)– Debian Stable/Testing– Ubuntu Server

Page 18: Secure your IT infrastructure  with GNU/Linux

18

Which Distribution

● If you want to run a desktop client...

– Ubuntu (Gnome based)– Kubuntu (Kde based)– Fedora – Open SUSE– Debian Testing/Unstable

Page 19: Secure your IT infrastructure  with GNU/Linux

19

Software Wars

Page 20: Secure your IT infrastructure  with GNU/Linux

20

Thank You