Results 1 to 5 of 5
  1. #1
    Senior Member
    Join Date
    May 2006
    Posts
    104

    Thumbs up GrSecurity Kernel Install Script

    Ok here is the script I wrote for downloading the latest kernel and grsecurity patch, patching the kernel, and then building it. It grabs the config file I made up for single processor pentium 4 based servers. Security setting is set to low with proc restrcitions where users can only see their processes. Also all xtables, iptables and other common features are enabled.
    I have tired this on a fedora server and it done great so if everyone else likes it I will make one for amd as well.
    I also will be making and updated howto for those who wish to go over their config manually.
    If anyone has any feedback or suggestions or to report a problem simply post in the forum or come look for us in IRC.
    This is for single processor pentium 4 based machines only with 512mb-2gb ram
    Here is how to get the script going

    For RedHat Based Servers


    Code:
    cd /usr/src
    For Redhat Based Servers (CentOS, Fedora, etc

    Code:
    wget www.evolution-security.com/files/grkern.sh
    Code:
    chmod 755 grkern.sh
    Code:
    ./grkern.sh
    Give it a while to compile and install then when it is done do this

    Code:
    grub
    savedefault --default=0 --once
    quit

    Then reboot or better yet have your datacenter reboot in case the kernel panics.

  2. #2
    Junior Member
    Join Date
    Sep 2006
    Posts
    6
    thanks man for the tip

  3. #3
    Senior Member
    Join Date
    May 2009
    Posts
    179
    After a lil work getting the config right for s hosting/shell server I finally came up with the script that will patch, compile, and install the gresecurity patched kernel. You just run the shell script and it will download the kernel and patch, patch the kernel, download the config, and then compile and install.

    The config I got made up is for Pentium4/Xeon/Celeron based servers. It includes all necessary option for an average pentium based server with single processor. The grsecurity level is set to low along with proc restrictions where users can see only their processes, I find the proc restrictions more of a convenience then actual security procedure because shell users do not have to go through all the processes to find theirs nor do they have to do ps -u so it is a pretty handy feature.

    All xtables, iptables, and such are enabled. Lots of generic options are selected but nothing that is not needed by at least some machines.

    I have ran this script successfully on a fedora and 2 centos servers and it done just fine. As far as stricter security options and pax goes a lot of them do not work well with your typical hosting server. The way it is now it is very secure and protected against local exploits while stoill being totaly functional and not over restrictive..........

  4. #4
    Junior Member
    Join Date
    Sep 2008
    Posts
    7
    Thanks man for the infromation
    LENOVOhost Network Solutions, designs the technology of Tomorrow
    RVSkins, Fantastico, 24/7 Support, FFMPEG, SLA Uptime, Daily Backups, End-User Support & More
    Support Desk Software | Sales, Billing & Tech End-user Support | Hosting Templates

  5. #5
    Registered User
    Join Date
    Nov 2009
    Posts
    1
    All xtables, iptables, and such are enabled. Lots of generic options are selected but nothing that is not needed by at least some machines.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  

  Find Web Hosting      
  Shared Web Hosting UNIX & Linux Web Hosting Windows Web Hosting Adult Web Hosting
  ASP ASP.NET Web Hosting Reseller Web Hosting VPS Web Hosting Managed Web Hosting
  Cloud Web Hosting Dedicated Server E-commerce Web Hosting Cheap Web Hosting


Premium Partners:


Visit forums.thewebhostbiz.com: to discuss the web hosting business, buy and sell websites and domain names, and discuss current web hosting tools and software.