Changeset 1ef78bc for postlfs


Ignore:
Timestamp:
07/21/2005 08:18:59 PM (19 years ago)
Author:
Randy McMurchy <randy@…>
Branches:
10.0, 10.1, 11.0, 11.1, 11.2, 11.3, 12.0, 12.1, 6.1, 6.2, 6.2.0, 6.2.0-rc1, 6.2.0-rc2, 6.3, 6.3-rc1, 6.3-rc2, 6.3-rc3, 7.10, 7.4, 7.5, 7.6, 7.6-blfs, 7.6-systemd, 7.7, 7.8, 7.9, 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, basic, bdubbs/svn, elogind, gnome, kde5-13430, kde5-14269, kde5-14686, kea, ken/TL2024, ken/inkscape-core-mods, ken/tuningfonts, krejzi/svn, lazarus, lxqt, nosym, perl-modules, plabs/newcss, plabs/python-mods, python3.11, qt5new, rahul/power-profiles-daemon, renodr/vulkan-addition, systemd-11177, systemd-13485, trunk, upgradedb, xry111/intltool, xry111/llvm18, xry111/soup3, xry111/test-20220226, xry111/xf86-video-removal
Children:
91a3570
Parents:
2bc0646
Message:

Fixed minor typos and grammar changes to Firewalling instructions

git-svn-id: svn://svn.linuxfromscratch.org/BLFS/trunk/BOOK@4749 af4574ff-66df-0310-9fd7-8a98e5e911e0

File:
1 edited

Legend:

Unmodified
Added
Removed
  • postlfs/security/firewalling.xml

    r2bc0646 r1ef78bc  
    4646    need to keep applications and daemons on your system properly
    4747    configured and up to date.  A firewall is not a cure all, but should
    48     be an essential part of your overall security startegy.</para>
     48    be an essential part of your overall security strategy.</para>
    4949
    5050  </sect2>
     
    5858      <title><xref linkend="fw-persFw"/></title>
    5959
    60       <para>This is a hardware device or software program commercially
    61       sold by companies such as Symantec which claims that it secures
    62       a home or desktop computer with Internet access. This type of
    63       firewall is highly relevant for users who do not know how their
     60      <para>This is a hardware device or software program commercially sold (or
     61      offered via freeware) by companies such as Symantec which claims that
     62      it secures a home or desktop computer connected to the Internet. This
     63      type of firewall is highly relevant for users who do not know how their
    6464      computers might be accessed via the Internet or how to disable
    6565      that access, especially if they are always online and connected
     
    8888      forgotten, performing masquerading or routing functions, but offering
    8989      non-firewall services such as a web-cache or mail.  This may be used
    90       for home networks, but is not be considered as secure as a firewall
     90      for home networks, but is not to be considered as secure as a firewall
    9191      only machine because the combination of server and router/firewall on
    9292      one machine raises the complexity of the setup.</para>
     
    9999
    100100      <para>This box performs masquerading or routing, but grants public
    101       access to some branch of your network which, because of public IP's
     101      access to some branch of your network which, because of public IPs
    102102      and a physically separated structure, is essentially a separate
    103103      network with direct Internet access. The servers on this network are
     
    113113      <para>This type of firewall does routing or masquerading, but does
    114114      not maintain a state table of ongoing communication streams. It is
    115       fast, but quite limited in its ability to block inappropriate packets
     115      fast, but quite limited in its ability to block undesired packets
    116116      without blocking desired packets.</para>
    117117
     
    141141    </caution>
    142142
    143     <para>The firewall configuration script installed in the last section
     143    <para>The firewall configuration script installed in the iptables section
    144144    differs from the standard configuration script. It only has two of
    145145    the standard targets: start and status. The other targets are clear
    146     and lock. For instance when you run:</para>
     146    and lock. For instance if you issue:</para>
    147147
    148148<screen role="root"><userinput>/etc/rc.d/init.d/iptables start</userinput></screen>
     
    255255
    256256      <para>This script is quite simple, it drops all traffic coming
    257       in into your computer that wasn't initiated from your box, but
     257      into your computer that wasn't initiated from your computer, but
    258258      as long as you are simply surfing the Internet you are unlikely
    259259      to exceed its limits.</para>
    260260
    261261      <para>If you frequently encounter certain delays at accessing
    262       ftp-servers, take a look at <xref linkend="fw-BB-4"/>.</para>
     262      FTP servers, take a look at <xref linkend="fw-BB-4"/>.</para>
    263263
    264264      <para>Even if you have daemons or services running on your system,
     
    280280      servers running on it such as <application>X11</application> et
    281281      al. As a general principle, the firewall itself should not access
    282       any untrusted service (Think of a remote server giving answers that
    283       makes a daemon on your system crash, or, even worse, that implements
     282      any untrusted service (think of a remote server giving answers that
     283      makes a daemon on your system crash, or even worse, that implements
    284284      a worm via a buffer-overflow).</para>
    285285
     
    389389      <note>
    390390        <para>If the interface you're connecting to the Internet
    391         doesn't connect via ppp, you will need to change
    392         <replaceable>ppp+</replaceable> to the name of the interface,
    393         e.g. <emphasis role="strong">eth1</emphasis>, which you are
     391        doesn't connect via PPP, you will need to change
     392        <replaceable>ppp+</replaceable> to the name of the interface
     393        (e.g., <emphasis role="strong">eth1</emphasis>) which you are
    394394        using.</para>
    395395      </note>
     
    420420      <xref linkend="fw-masqRouter"/> for some more details.</para>
    421421
    422       <para>If you want to add services such as internal samba or
     422      <para>If you want to add services such as internal Samba or
    423423      name servers that do not need to access the Internet themselves,
    424424      the additional statements are quite simple and should still be
     
    460460        <listitem>
    461461          <para>Your caching name server (e.g., named) does its
    462           lookups via udp:</para>
     462          lookups via UDP:</para>
    463463
    464464<screen><literal>iptables -A OUTPUT -p udp --dport 53 -j ACCEPT</literal></screen>
     
    466466        </listitem>
    467467        <listitem>
    468           <para>You want to be able to ping your box to
     468          <para>You want to be able to ping your computer to
    469469          ensure it's still alive:</para>
    470470
     
    475475        <listitem>
    476476          <para><anchor id='fw-BB-4' xreflabel="BusyBox example number 4"/>If
    477           you are frequently accessing ftp servers or enjoy chatting, you might
     477          you are frequently accessing FTP servers or enjoy chatting, you might
    478478          notice certain delays because some implementations of these daemons
    479479          have the feature of querying an identd on your system to obtain
     
    555555    <title>Extra Information</title>
    556556
    557     <sect3 id="fw-library" xreflabel="Links for further reading">
    558       <title>Where to Start with Further Reading on Firewalls.</title>
     557    <sect3 id="fw-library" xreflabel="links for further reading">
     558      <title>Where to Start with Further Reading on Firewalls</title>
    559559
    560560      <blockquote>
     
    591591
    592592</sect1>
    593 
Note: See TracChangeset for help on using the changeset viewer.