Changeset 64d97b7c for postlfs/security
- Timestamp:
- 04/01/2003 07:52:38 PM (20 years ago)
- Branches:
- 10.0, 10.1, 11.0, 11.1, 11.2, 11.3, 6.0, 6.1, 6.2, 6.2.0, 6.2.0-rc1, 6.2.0-rc2, 6.3, 6.3-rc1, 6.3-rc2, 6.3-rc3, 7.10, 7.4, 7.5, 7.6, 7.6-blfs, 7.6-systemd, 7.7, 7.8, 7.9, 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, basic, bdubbs/svn, elogind, gnome, kde5-13430, kde5-14269, kde5-14686, ken/inkscape-core-mods, krejzi/svn, lazarus, nosym, perl-modules, plabs/python-mods, qt5new, systemd-11177, systemd-13485, trunk, upgradedb, v1_0, v5_0, v5_0-pre1, v5_1, v5_1-pre1, xry111/intltool, xry111/soup3, xry111/test-20220226
- Children:
- d67b774
- Parents:
- 0a9287a
- Location:
- postlfs/security
- Files:
-
- 5 edited
Legend:
- Unmodified
- Added
- Removed
-
postlfs/security/firewalling/busybox.xml
r0a9287a r64d97b7c 13 13 setup more complex and your box less secure: You induce the risks of 14 14 misconfigured services or running a service with an exploitable bug, both risks 15 that a firewall princip ially should be immune of. See the introduction to15 that a firewall principally should be immune of. See the introduction to 16 16 <xref linkend="postlfs-security-fw-masqRouter"/> for some more details.</para> 17 17 -
postlfs/security/firewalling/intro.xml
r0a9287a r64d97b7c 13 13 to aim no harm, you wouldn't need to do firewalling! 14 14 In the real world however, daemons may be misconfigured, 15 exploits against essential services are freely avail iable, you15 exploits against essential services are freely available, you 16 16 may wish to choose which services are accessible by certain machines, 17 17 you may wish to limit which machines or applications are allowed … … 47 47 <sect3><title><xref linkend="postlfs-security-fw-masqRouter"/></title> 48 48 <para>This is a box placed between the internet and an intranet. 49 To minimize the risk of compromi zing the firewall itself it49 To minimize the risk of compromising the firewall itself it 50 50 should generally have only one role, that of protecting the intranet. 51 51 Although not completely riskless, the tasks of doing the routing … … 53 53 of the packets it routes from clients with private IP-addresses onto 54 54 the internet so that they seem to come from the firewall 55 itself</para></footnote> are commonly consider d harmless.</para></sect3>55 itself</para></footnote> are commonly considered harmless.</para></sect3> 56 56 57 57 <sect3><title><xref linkend="postlfs-security-fw-busybox"/></title> -
postlfs/security/iptables/iptables-desc.xml
r0a9287a r64d97b7c 15 15 16 16 <sect3><title>iptables-save, ~-restore</title> 17 <para>to save and to restore your elabo urated set of chains and rules.17 <para>to save and to restore your elaborated set of chains and rules. 18 18 Until iptables-1.2.5 they were declared experimental.</para> 19 19 </sect3> -
postlfs/security/iptables/iptables-intro.xml
r0a9287a r64d97b7c 24 24 is checked (if it is available at <filename>/usr/src/linux</filename> to 25 25 see which features are available. Support will only be compiled into 26 iptables for the features recogni sed at compile-time. Applying a kernel26 iptables for the features recognized at compile-time. Applying a kernel 27 27 patch may result in errors, often because the hooks for the patches 28 28 have changed or because the runme script doesn't recognize that a patch -
postlfs/security/shadow/shadow-inst.xml
r0a9287a r64d97b7c 1 1 <sect2> 2 <title>Re installation of shadow to utilize PAM</title>2 <title>Re-installation of shadow to utilize PAM</title> 3 3 4 4 <para>Download the patch for shadow from <ulink url="&hfile-root;"/></para>
Note:
See TracChangeset
for help on using the changeset viewer.