CloudLinux - CloudLinux Blog - The Symlink Protection patchset is available for free for CentOS 6 & 7, even if you are not running KernelCare
RSS

By accepting you will be accessing a service provided by a third-party external to https://www.cloudlinux.com/

The Symlink Protection patchset is available for free for CentOS 6 & 7, even if you are not running KernelCare

The Symlink Protection patchset is available for free for CentOS 6 & 7, even if you are not running KernelCare

A few weeks ago we released the KernelCare "Extra" Patchset with the security fixes and the symlink protection available to all KernelCare customers running CentOS kernels. Today we are pleased to share that you can get the Symlink Protection Patchset for CentOS 6 and 7 at no cost, even if you don’t have licenses of KernelCare.

We’ve been discussing with the cPanel team on how to help with hardening of their customers' system kernels. This Symlink Protection Patchset will protect CentOS 6 and 7 systems and will help defend shared hosting servers, including the cPanel servers, against symlink attacks.

A symlink race attack is frequently used against shared hosting servers. It allows a malicious user to serve files that belong to other users by creating a symbolic link to those files. It is often used to access config.php files that belong to others. This patchset helps protect against such attacks.

Note that this patchset includes only the symlink protection, and does not include the security fixes (those are available to KernelCare customers) - you will still need to update kernel and REBOOT each time new CentOS kernel is released to keep your kernel secure.

We recommend the installation of this patchset on CentOS 6 and CentOS 7 to make your servers more secure.

How to install the free symlink protection patchset:

Below we provide instructions on how to install KernelCare and run this patchset for free. Though this symlink protection patchset is part of KernelCare, it does not require you to purchase a license or even register for the KernelCare free trial (if you choose to purchase a license at a later date, information on how to upgrade will be published in the documentation soon).

To enable the symlink protection, perform the following steps:

First, install KernelCare client:

curl -s https://repo.cloudlinux.com/kernelcare/kernelcare_install.sh | bash

Enable free patch type, this patch type doesn't require a license

kcarectl --set-patch-type free --update

The ‘free’ patch will be applied on the next update.

. . .

During the installation, you should see something similar to:


OS: CentOS6
kernel: kernel-2.6.32-696.el6
time: 2017-06-22 16:13:40
uname: 2.6.32-642.15.1.el6

kpatch-name: 2.6.32/symlink-protection.patch
kpatch-description: symlink protection // If you see this patch, it mean that you can enable symlink protection.
kpatch-kernel: kernel-2.6.32-279.2.1.el6
kpatch-cve: N/A
kpatch-cvss: N/A
kpatch-cve-url: N/A
kpatch-patch-url: https://gerrit.cloudlinux.com/#/c/16508/

kpatch-name: 2.6.32/symlink-protection.kpatch-1.patch
kpatch-description: symlink protection (kpatch adaptation)
kpatch-kernel: kernel-2.6.32-279.2.1.el6
kpatch-cve: N/A
kpatch-cvss: N/A
kpatch-cve-url: N/A
kpatch-patch-url: https://gerrit.cloudlinux.com/#/c/16508/


Edit the file /etc/sysconfig/kcare/sysctl.conf (or create it if it doesn't exist) - add the lines:

fs.enforce_symlinksifowner = 1
fs.symlinkown_gid = 48


Execute:

sysctl -w fs.enforce_symlinksifowner=1
sysctl -w fs.symlinkown_gid=48

Note: On standard RPM Apache installation, Apache is usually running under GID 48. On cPanel servers, Apache is running under user nobody, GID 99.

Click here to learn more about KernelCare.
 

Beta: EasyApache 4 updated
Beta: LVE Manager updated
 

Комментарии 95

Thank you,
But it doesn't work for me.

..
Running Transaction
Installing : kernelcare-2.13-1.x86_64 1/1
Requesting trial license for 89.x.x.x, please wait...
HTTP Error 403: Forbidden, Retrying in 3 seconds...
Requesting trial license for 89.x.x.x, please wait...
HTTP Error 403: Forbidden, Retrying in 6 seconds...
Verifying : kernelcare-2.13-1.x86_64 1/1

Installed:
kernelcare.x86_64 0:2.13-1

Complete!
[[email protected] src]# kcarectll --set-patch-type free
-bash: kcarectll: command not found

Thank you, But it doesn't work for me. .. Running Transaction Installing : kernelcare-2.13-1.x86_64 1/1 Requesting trial license for 89.x.x.x, please wait... [b]HTTP Error 403: Forbidden[/b], Retrying in 3 seconds... Requesting trial license for 89.x.x.x, please wait... [b]HTTP Error 403: Forbidden[/b], Retrying in 6 seconds... Verifying : kernelcare-2.13-1.x86_64 1/1 Installed: kernelcare.x86_64 0:2.13-1 Complete! [[email protected] src]# kcarectll --set-patch-type free [b]-bash: kcarectll: command not found[/b]

sorry, it should have been:
kcarectl --set-patch-type free

sorry, it should have been: kcarectl --set-patch-type free

Thank you for this support.

Are patches disabled in kernel updates we made manually?

Thank you for this support. Are patches disabled in kernel updates we made manually?

I am sorry, I don't know what you mean.

I am sorry, I don't know what you mean.

Should we install this on CloudLinux ? When I tried to install it says

'free' patch type is unavailable for current kernel

Should we install this on CloudLinux ? When I tried to install it says 'free' patch type is unavailable for current kernel

CloudLinux kernel has it built in out of the box / it is not needed on CloudLinux servers.

CloudLinux kernel has it built in out of the box / it is not needed on CloudLinux servers.

If we use CloudLinux OS, is this already enabled? or we have to enable it as CentOS?

If we use CloudLinux OS, is this already enabled? or we have to enable it as CentOS?

CloudLinux kernel has it built in out of the box / it is not needed on CloudLinux servers.

CloudLinux kernel has it built in out of the box / it is not needed on CloudLinux servers.

Something is not working properly (using latest cpanel on CentOS 7)

[[email protected] ~]# nano /etc/sysconfig/kcare/sysctl.conf (file did not exist)
[[email protected] ~]# sysctl -w fs.enforce_symlinksifowner=1
sysctl: cannot stat /proc/sys/fs/enforce_symlinksifowner: No such file or directory

Also, i didn't het any mesg as per your "During the installation, you should see something similar to"

Something is not working properly (using latest cpanel on CentOS 7) [[email protected] ~]# nano /etc/sysconfig/kcare/sysctl.conf (file did not exist) [[email protected] ~]# sysctl -w fs.enforce_symlinksifowner=1 sysctl: cannot stat /proc/sys/fs/enforce_symlinksifowner: No such file or directory Also, i didn't het any mesg as per your "During the installation, you should see something similar to"

please, provide output of: kcarectl --info
and
uname -r

please, provide output of: kcarectl --info and uname -r

[[email protected] ~]# kcarectl --info
Update available, run 'kcarectl --update'.
kpatch-state: patch is applied
kpatch-for: Linux version 3.10.0-693.2.2.el7.x86_64 ([email protected]) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-16) (GCC) ) #1 SMP Tue Sep 12 22:26:13 UTC 2017
kpatch-build-time: Fri Sep 15 08:40:24 2017
kpatch-description: 3-;3.10.0-693.2.2.el7

[[email protected] ~]# uname -r
3.10.0-693.2.2.el7.x86_64

[[email protected] ~]# kcarectl --info Update available, run 'kcarectl --update'. kpatch-state: patch is applied kpatch-for: Linux version 3.10.0-693.2.2.el7.x86_64 ([email protected]) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-16) (GCC) ) #1 SMP Tue Sep 12 22:26:13 UTC 2017 kpatch-build-time: Fri Sep 15 08:40:24 2017 kpatch-description: 3-;3.10.0-693.2.2.el7 [[email protected] ~]# uname -r 3.10.0-693.2.2.el7.x86_64

you are running 'default' patchset, probably because of the trial license.

Make sure you switch to free patchset by running:
kcarectl --set-patch-type free

Or you can do extra (includes kernel security patches):
kcarectl --set-patch-type extra
Yet, that will expire as trial runs out.

you are running 'default' patchset, probably because of the trial license. Make sure you switch to free patchset by running: kcarectl --set-patch-type free Or you can do extra (includes kernel security patches): kcarectl --set-patch-type extra Yet, that will expire as trial runs out.

[[email protected] ~]# kcarectl --set-patch-type free
'free' patch type selected

[[email protected] ~]# kcarectl --info
kpatch-state: patch is applied
kpatch-for: Linux version 3.10.0-693.2.2.el7.x86_64 ([email protected] .org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-16) (GCC) ) #1 SMP Tue Sep 12 2 2:26:13 UTC 2017
kpatch-build-time: Fri Sep 15 09:06:46 2017
kpatch-description: 3-free;3.10.0-693.2.2.el7

[[email protected] ~]# uname -r
3.10.0-693.2.2.el7.x86_64

[[email protected] ~]# kcarectl --set-patch-type free 'free' patch type selected [[email protected] ~]# kcarectl --info kpatch-state: patch is applied kpatch-for: Linux version 3.10.0-693.2.2.el7.x86_64 ([email protected] .org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-16) (GCC) ) #1 SMP Tue Sep 12 2 2:26:13 UTC 2017 kpatch-build-time: Fri Sep 15 09:06:46 2017 kpatch-description: 3-free;3.10.0-693.2.2.el7 [[email protected] ~]# uname -r 3.10.0-693.2.2.el7.x86_64

Igor, I have followed your instructions but in cPanel (v66.0.24) security advisor I receive the following alert -

Kernel symlink protection is not enabled for CentOS 6. You do not appear to have any symlink protection enabled through a properly patched kernel on this server, which provides additional protect beyond those solutions employed in userland. Please review the following documentation to learn how to apply this protection.
. How can I resolve this issue?

Output of kcarectl --info
Unknown kernel (CentOS 2.6.32-696.13.2.el6.x86_64), no patches available

Output of uname -r
2.6.32-696.13.2.el6.x86_64

Igor, I have followed your instructions but in cPanel (v66.0.24) security advisor I receive the following alert - [quote]Kernel symlink protection is not enabled for CentOS 6. You do not appear to have any symlink protection enabled through a properly patched kernel on this server, which provides additional protect beyond those solutions employed in userland. Please review the following documentation to learn how to apply this protection.[/quote]. How can I resolve this issue? [b]Output of kcarectl --info[/b] Unknown kernel (CentOS 2.6.32-696.13.2.el6.x86_64), no patches available [b]Output of uname -r[/b] 2.6.32-696.13.2.el6.x86_64


Hello

Will patch be corrupted if I do kernel update?

[b] Hello Will patch be corrupted if I do kernel update?[/b]

[[email protected] ~]# kcarectl --set-patch-type free
Unknown Kernel (CentOS 2.6.32-696.13.2.el6.x86_64)

[[email protected] ~]# kcarectl --info
Unknown kernel (CentOS 2.6.32-696.13.2.el6.x86_64), no patches available

[[email protected] ~]# kcarectl --set-patch-type free Unknown Kernel (CentOS 2.6.32-696.13.2.el6.x86_64) [[email protected] ~]# kcarectl --info Unknown kernel (CentOS 2.6.32-696.13.2.el6.x86_64), no patches available

Did the instructions for installing this change?

I thought the original instructions had

fs.protected_symlinks_create=1
fs.protected_hardlinks_create=1


in the /etc/sysconfig/kcare/sysctl.conf file.

You may want to make a note if the instructions changed.

Did the instructions for installing this change? I thought the original instructions had [b]fs.protected_symlinks_create=1 fs.protected_hardlinks_create=1 [/b] in the [b]/etc/sysconfig/kcare/sysctl.conf[/b] file. You may want to make a note if the instructions changed.

Hi, i need some question:
1. Is it compatible with this existing kernel server from cPanel ?https://documentation.cpanel.net/display/CKB/How+to+Harden+Your+cPanel+System's+Kernel
[[email protected]]# uname -a
Linux ~server.com 2.6.32-696.299.10.3.cp6.x86_64 #1 SMP Thu Sep 28 21:04:26 UTC 2017 x86_64 x86_64 x86_64 GNU/Linux

2. Is it compatible for VPS virtuozzo or only VPS KVM / Server?

Waiting for your info?

Hi, i need some question: 1. Is it compatible with this existing kernel server from cPanel ?https://documentation.cpanel.net/display/CKB/How+to+Harden+Your+cPanel+System's+Kernel [[email protected]]# uname -a Linux ~server.com 2.6.32-696.299.10.3.cp6.x86_64 #1 SMP Thu Sep 28 21:04:26 UTC 2017 x86_64 x86_64 x86_64 GNU/Linux 2. Is it compatible for VPS virtuozzo or only VPS KVM / Server? Waiting for your info?

Wow, so the instructions changed yet again?

I'm just going to wait a couple of month, perhaps by then all of the details will be ironed out.

Wow, so the instructions changed yet again? I'm just going to wait a couple of month, perhaps by then all of the details will be ironed out.

Well, I can understand that instructions can change. But how are people suppose to know to update their setups if they've already installed this and then never went back to this page?

Well, I can understand that instructions can change. But how are people suppose to know to update their setups if they've already installed this and then never went back to this page?
Уже зарегистрированны? Войти на сайт
Guest
03.06.2020

Изображение капчи