source: postlfs/security/security.xml@ 707c46a

6.3-rc2
Last change on this file since 707c46a was 618aef19, checked in by Randy McMurchy <randy@…>, 16 years ago

Added new package GnuPG-2.0.8

git-svn-id: svn://svn.linuxfromscratch.org/BLFS/trunk/BOOK@7206 af4574ff-66df-0310-9fd7-8a98e5e911e0

  • Property mode set to 100644
File size: 3.0 KB
Line 
1<?xml version="1.0" encoding="ISO-8859-1"?>
2<!DOCTYPE chapter PUBLIC "-//OASIS//DTD DocBook XML V4.5//EN"
3 "http://www.oasis-open.org/docbook/xml/4.5/docbookx.dtd" [
4 <!ENTITY % general-entities SYSTEM "../../general.ent">
5 %general-entities;
6]>
7
8<!--
9$LastChangedBy$
10$Date$
11-->
12
13<chapter id="postlfs-security">
14 <?dbhtml filename="security.html"?>
15
16 <title>Security</title>
17
18 <para>Security takes many forms in a computing environment. This chapter
19 gives examples of three different types of security: access, prevention
20 and detection.</para>
21
22 <para>Access for users is usually handled by <command>login</command> or an
23 application designed to handle the login function. In this chapter, we show
24 how to enhance <command>login</command> by setting policies with
25 <application>PAM</application> modules. Access via networks
26 can also be secured by policies set by <application>iptables</application>,
27 commonly referred to as a firewall. The Network Security Services (NSS) and
28 Netscape Portable Runtime (NSPR) libraries can be installed and shared among
29 the many applications requiring them. For applications that don't offer the
30 best security, you can use the <application>Stunnel</application> package to
31 wrap an application daemon inside an SSL tunnel.</para>
32
33 <para>Prevention of breaches, like a trojan, are assisted by applications like
34 <application>GnuPG</application>, specifically the ability to confirm signed
35 packages, which recognizes modifications of the tarball
36 after the packager creates it.</para>
37
38 <para> Finally, we touch on detection with a package that stores "signatures"
39 of critical files (defined by the administrator) and then regenerates those
40 "signatures" and compares for files that have been changed.</para>
41
42 <xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="openssl.xml"/>
43 <xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="gnutls.xml"/>
44 <xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="cracklib.xml"/>
45 <xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="linux-pam.xml"/>
46 <xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="shadow.xml"/>
47 <xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="iptables.xml"/>
48 <xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="firewalling.xml"/>
49 <xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="gnupg.xml"/>
50 <xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="gnupg2.xml"/>
51 <xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="tripwire.xml"/>
52 <xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="heimdal.xml"/>
53 <xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="mitkrb.xml"/>
54 <xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="cyrus-sasl.xml"/>
55 <xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="stunnel.xml"/>
56 <xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="sudo.xml"/>
57 <xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="nss.xml"/>
58
59</chapter>
Note: See TracBrowser for help on using the repository browser.