Linux Security Cookbook [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Linux Security Cookbook [Electronic resources] - نسخه متنی

Daniel J. Barrett, Robert G. Byrnes, Richard Silverman

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید

[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]

packet filtering

Linux, website for

stateful

stateless

packet sniffers

dsniff, for switched networks

enabling unconfigured network interfaces with ifconfig

network intrusion detection system (NIDS)

ngrep, using for

observing network traffic with

promiscuous mode on network interfaces

unconfigured interface for stealth sniffer

Snort, using as

packets, refusing with DROP or REJECT

PAM (Pluggable Authentication Modules)

access control lists (ACLs), creating
2nd

controlling imapd password validation

creating PAM-aware application

enforcing password strength

imapd validation of passwords, controlling

Kerberos, using with

Linux Developers Guide

Linux-PAM, web site

modules

pam_stack module

passphrases

backing up for GnuPG private keys

caching SSH private keys to avoid typing

forcing erasure by Mailcrypt with mc-deactivate-passwd

secret, for GnuPG public keys

SSH

passwd file, DES-based crypt( ) hashes in

passwd program

passwords

authorizing changes via sudo

dsniff program

captured from FTP and Telnet sessions

using libnids to reassemble

encrypting files with

enforcing strength with PAM

interactive authentication without (ssh-agent)

keeping track of

Kerberos (kpasswd command)

local, authentication via (Kerberos with PAM)

login, testing for strength

CrackLib, using

John the Ripper, using

mail servers (IMAP/POP), protection by SSL

master password for KDC database

storage of

protection with SSH

root

sudo command

bypassing password authentication

forcing authentication with

testing and monitoring on system

PATH environment variable, splitting with Perl script

pathnames

mutation in attacks against protocols

in remote file copying

paths

search path, testing

to server executable (inetd.conf)

pattern matching
[See regular expressions]

payload, observing

PEM format (certificates)

converting DER format to

per_source keyword (xinetd)

performance, effects of promiscuous mode

period (.), in search path

Perl scripts

CA.pl

canonical hostname for SSH client, finding

CrackLib, using with module

functions provided by system logger API

merging lastlog databases from several systems

merging log files

process accounting records, reading and unpacking

writing system log entries
2nd

permissions
2nd

changes since last Tripwire check

examining carefully for security

inability to track with manual integrity check

log files

preventing directory listings

Snort logging directory

world-writable files and directories, finding

PermitRootLogin (sshd_config)

PGP (Pretty Good Privacy)

Evolution mailer, using with

integrating with MH

keys, using in GnuPG operations

setting in mutt mailer headers

PID (process ID)

adding to system log messages

looking up

pidof command, killing all processes with given name

Pine

securing POP/IMAP with SSH and Pine

securing POP/IMAP with SSL and

sending/receiving encrypted email

PinePGP

pings

nmap, use of TCP and ICMP pings for host discovery

preventing responses to

plaintext keys

including in system backups, security risks of

using with forced command

Pluggable Authentication Modules
[See PAM]

policies

default, for ipchains and iptables

Tripwire

displaying

generating in human-readable format and adding file to

modifying

signing with site key

POP

capturing messages from with dsniff mailsnarf command

enabling POP daemon within xinetd or inetd

Kerberos authentication, using with

mail server, running with SSL

running mail server with SSL

securing email session with SSL and mutt

securing mail server with SSH

securing mail server with SSH and Pine

securing mail server with stunnel and SSL

securing with SSL and pine

STLS command

testing SSL connection to server

port forwarding

disabling for authorized keys

SSH

tunneling TCP session through SSH

port numbers, conversion to service names by netstat and lsof

port scanners, presence evidenced by SYN_RECV state

portmappers

displaying registrations with lsof +M

querying from a different machine

ports

assigned to RPC services

default, IMAP and POP over SSL

nonstandard, used by network protocols

SSL-port on mail servers

testing for open

nc command, using

nmap command, port scanning capabilities

port scans with nmap

TCP port, testing with telnet connection

TCP RST packets returned by firewalls blocking ports

UDP ports, problems with

preprocessors, Snort

alert messages produced by

enabling or tuning

prerotate and postrotate scripts

Pretty Good Privacy
[See PGP]

principals, Kerberos

adding another principal to your ~/.k5login file

adding new with ank command

adding to IMAP service on server host

database for

records for users and hosts

database, creating for KDC

host principal, testing for new host

ksu authentication

new host, adding to KDC database

POP, adding to

setting up with admin privileges and host principal for KDC host

priority

levels for Snort alerts

for system messages

private keys
[See cryptographic authentication]2nd

GnuPG, backing up

PGP, exporting and using in GnuPG

process accounting

displaying all executed commands

lastcomm utility, using

dump-acct command

enabling with accton command

process IDs

adding to system log messages

looking up

process substitution

processes

/proc/<pid> directories

killing

with pidof command

with sudo command

listing

all open files (and network connections) for all processes

all open files for specific

command name (lsof -c)

by ID (lsof -p)

network connections for all

by username (lsof -u)

owned by others, examination by superuser

that use RPC services, examining with losf +M

tracing

strace command, using

promiscuous mode (for network interfaces)

enabling for specific interfaces with ifconfig

performance and

setting for Snort

prosum (integrity checker)

protocol tree for selected packet (Ethereal)

protocols

attacks on, detection by Snort preprocessors

insecure, detecting use of with ngrep

matching a filter expression, searching network traffic for

network, detecting insecure

ps command, reading /proc files

psacct RPM
2nd

pseudo-ttys

disabling allocation of for authorized keys

forcing ssh to allocate

PubkeyAuthentication (sshd_config)

public keys

adding to GnuPG keyring

inserting into current mail buffer with mc-insert-public-key

keyserver, storing and retrieving with

listing for GnuPG

PGP, exporting and using in GnuPG

public-key authentication
[See cryptographic authentication]

public-key encryption

decrypting files encrypted with GNUPG

expiration for keys

find method, use by

GnuPG
2nd

bit length of keys

generating key pair

secret passphrase for keys

sharing public keys

unique identifier for keys

/ 247