1 | <?xml version="1.0" encoding="ISO-8859-1"?>
|
---|
2 | <!DOCTYPE chapter PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
|
---|
3 | "http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd" [
|
---|
4 | <!ENTITY % general-entities SYSTEM "../../general.ent">
|
---|
5 | %general-entities;
|
---|
6 | ]>
|
---|
7 |
|
---|
8 | <chapter id="postlfs-security">
|
---|
9 | <?dbhtml filename="security.html"?>
|
---|
10 | <title>Security</title>
|
---|
11 |
|
---|
12 | <para>Security takes many forms in a computing environment. This chapter
|
---|
13 | gives examples of three different types of security: access, prevention
|
---|
14 | and detection.</para>
|
---|
15 |
|
---|
16 | <para>Access for users is usually handled by <command>login</command> or an
|
---|
17 | application designed to handle the login function. In this chapter, we show
|
---|
18 | how to enhance <command>login</command> by setting policies with
|
---|
19 | <application><acronym>PAM</acronym></application> modules. Access via networks
|
---|
20 | can also be secured by policies set by <application>iptables</application>,
|
---|
21 | commonly referred to as a firewall. For applications that don't offer the
|
---|
22 | best security, you can use the <application>Stunnel</application> package to
|
---|
23 | wrap an application daemon inside an <acronym>SSL</acronym> tunnel.</para>
|
---|
24 |
|
---|
25 | <para>Prevention of breaches, like a trojan, are assisted by applications like
|
---|
26 | <application>GnuPG</application>, specifically the ability to confirm signed
|
---|
27 | packages, which recognizes modifications of the <acronym>TAR</acronym> ball
|
---|
28 | after the packager creates it.</para>
|
---|
29 |
|
---|
30 | <para> Finally, we touch on detection with a package that stores "signatures"
|
---|
31 | of critical files (defined by the administrator) and then regenerates those
|
---|
32 | "signatures" and compares for files that have been changed.</para>
|
---|
33 |
|
---|
34 | <xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="openssl.xml"/>
|
---|
35 | <xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="cracklib.xml"/>
|
---|
36 | <xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="linux_pam.xml"/>
|
---|
37 | <xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="shadow.xml"/>
|
---|
38 | <xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="iptables.xml"/>
|
---|
39 | <xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="firewalling.xml"/>
|
---|
40 | <xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="gnupg.xml"/>
|
---|
41 | <xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="tripwire.xml"/>
|
---|
42 | <xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="heimdal.xml"/>
|
---|
43 | <xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="mitkrb.xml"/>
|
---|
44 | <xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="cyrus-sasl.xml"/>
|
---|
45 | <xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="stunnel.xml"/>
|
---|
46 |
|
---|
47 | </chapter>
|
---|