source: postlfs/security/security.xml@ 1f25cea9

10.0 10.1 11.0 11.1 11.2 11.3 12.0 12.1 7.10 7.4 7.5 7.6 7.6-blfs 7.6-systemd 7.7 7.8 7.9 8.0 8.1 8.2 8.3 8.4 9.0 9.1 basic bdubbs/svn elogind gnome kde5-13430 kde5-14269 kde5-14686 kea ken/TL2024 ken/inkscape-core-mods ken/tuningfonts krejzi/svn lazarus lxqt nosym perl-modules plabs/newcss plabs/python-mods python3.11 qt5new rahul/power-profiles-daemon renodr/vulkan-addition systemd-11177 systemd-13485 trunk upgradedb xry111/intltool xry111/llvm18 xry111/soup3 xry111/test-20220226 xry111/xf86-video-removal
Last change on this file since 1f25cea9 was 1f25cea9, checked in by Wayne Blaszczyk <wblaszcz@…>, 14 years ago

Added new package. acl-2.2.48

git-svn-id: svn://svn.linuxfromscratch.org/BLFS/trunk/BOOK@8125 af4574ff-66df-0310-9fd7-8a98e5e911e0

  • Property mode set to 100644
File size: 3.4 KB
RevLine 
[b4b71892]1<?xml version="1.0" encoding="ISO-8859-1"?>
[6732c094]2<!DOCTYPE chapter PUBLIC "-//OASIS//DTD DocBook XML V4.5//EN"
3 "http://www.oasis-open.org/docbook/xml/4.5/docbookx.dtd" [
[b4b71892]4 <!ENTITY % general-entities SYSTEM "../../general.ent">
5 %general-entities;
6]>
7
[276015d2]8<!--
9$LastChangedBy$
10$Date$
11-->
12
[f45b1953]13<chapter id="postlfs-security">
[2dbd7a5f]14 <?dbhtml filename="security.html"?>
15
16 <title>Security</title>
17
18 <para>Security takes many forms in a computing environment. This chapter
19 gives examples of three different types of security: access, prevention
20 and detection.</para>
21
22 <para>Access for users is usually handled by <command>login</command> or an
23 application designed to handle the login function. In this chapter, we show
24 how to enhance <command>login</command> by setting policies with
25 <application>PAM</application> modules. Access via networks
26 can also be secured by policies set by <application>iptables</application>,
[30f88917]27 commonly referred to as a firewall. The Network Security Services (NSS) and
28 Netscape Portable Runtime (NSPR) libraries can be installed and shared among
29 the many applications requiring them. For applications that don't offer the
[2dbd7a5f]30 best security, you can use the <application>Stunnel</application> package to
31 wrap an application daemon inside an SSL tunnel.</para>
32
33 <para>Prevention of breaches, like a trojan, are assisted by applications like
34 <application>GnuPG</application>, specifically the ability to confirm signed
[d2223d8]35 packages, which recognizes modifications of the tarball
[2dbd7a5f]36 after the packager creates it.</para>
37
38 <para> Finally, we touch on detection with a package that stores "signatures"
39 of critical files (defined by the administrator) and then regenerates those
40 "signatures" and compares for files that have been changed.</para>
41
42 <xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="openssl.xml"/>
[d5404360]43 <xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="gnutls.xml"/>
[2dbd7a5f]44 <xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="cracklib.xml"/>
[9ad7046]45 <xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="linux-pam.xml"/>
[2dbd7a5f]46 <xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="shadow.xml"/>
47 <xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="iptables.xml"/>
48 <xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="firewalling.xml"/>
49 <xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="gnupg.xml"/>
[618aef19]50 <xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="gnupg2.xml"/>
[2dbd7a5f]51 <xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="tripwire.xml"/>
52 <xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="heimdal.xml"/>
53 <xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="mitkrb.xml"/>
54 <xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="cyrus-sasl.xml"/>
55 <xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="stunnel.xml"/>
[cf341b4]56 <xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="sudo.xml"/>
[30f88917]57 <xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="nss.xml"/>
[012cdc8]58 <xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="policykit.xml"/>
[9d3d8a8]59 <xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="polkit.xml"/>
[b9df1a8]60 <xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="polkit-gnome.xml"/>
[6d32e7af]61 <xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="consolekit.xml"/>
[2ac4928]62 <xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="attr.xml"/>
[1f25cea9]63 <xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="acl.xml"/>
[f45b1953]64
65</chapter>
Note: See TracBrowser for help on using the repository browser.