( /LYNX/SECURITY/securityfaq.txt )


  • Improving the security of your Unix system. 1993
  • CONTENTS

  • 1.2 THE INTERNET WORM
  • 1.4 OTHER BREAK-INS
  • 1.5 SECURITY IS IMPORTANT

  • 2.1 ACCOUNT SECURITY
  • 2.1.1 Passwords
  • 2.1.1.1 Selecting Passwords
  • 2.1.1.2 Password Policies
  • 2.1.1.3 Checking Password Security
  • 2.1.2 Expiration Dates
  • 2.1.3 Guest Accounts
  • 2.1.4 Accounts Without Passwords
  • 2.1.5 Group Accounts and Groups
  • 2.1.6 Yellow Pages
  • 2.2 NETWORK SECURITY
  • 2.2.1 Trusted Hosts
  • 2.2.1.1 The hosts.equiv File
  • 2.2.1.2 The .rhosts File
  • 2.2.2 Secure Terminals
  • 2.2.3 The Network File System
  • 2.2.3.1 The exports File
  • 2.2.3.3. The access= keyword specifies the list of hosts
  • 2.2.3.2 The netgroup File
  • 2.2.3.3 Restricting Super-User Access
  • 2.2.4 FTP
  • 2.2.4.1 Trivial FTP
  • 2.2.5 Mail
  • 2.2.6 Finger
  • 2.2.7 Modems and Terminal Servers
  • 2.2.8 Firewalls
  • 2.3 FILE SYSTEM SECURITY
  • 2.3.1 Setuid Shell Scripts
  • 2.3.2 The Sticky Bit on Directories
  • 2.3.3 The Setgid Bit on Directories
  • 2.3.4 The umask Value
  • 2.3.5 Encrypting Files
  • 2.3.6 Devices
  • 2.4 SECURITY IS YOUR RESPONSIBILITY

  • 3.1 ACCOUNT SECURITY
  • 3.1.1 The lastlog File
  • 3.1.2 The utmp and wtmp Files
  • 3.1.3 The acct File
  • 3.2 NETWORK SECURITY
  • 3.2.1 The syslog Facility
  • 3.2.2 The showmount Command
  • 3.3 FILE SYSTEM SECURITY
  • 3.3.1 The find Command
  • 3.3.1.1 Finding Setuid and Setgid Files
  • 3.3.1.2 Finding World-Writable Files
  • 3.3.1.3 Finding Unowned Files
  • 3.3.1.4 Finding .rhosts Files
  • 3.3.2 Checklists
  • 3.3.3 Backups
  • 3.4 KNOW YOUR SYSTEM
  • 3.4.1 The ps Command
  • 3.4.2 The who and w Commands
  • 3.4.3 The ls Command
  • 3.5 KEEP YOUR EYES OPEN

  • 4.1 OBTAINING FIXES AND NEW VERSIONS
  • 4.1.1 Sun Fixes on UUNET
  • 4.1.2 Berkeley Fixes
  • 4.1.3 Simtel-20 and UUNET
  • 4.1.4 Vendors
  • 4.2 THE NPASSWD COMMAND
  • 4.3 THE COPS PACKAGE
  • 4.4 SUN C2 SECURITY FEATURES
  • 4.5 KERBEROS

  • 5.1 THE COMPUTER EMERGENCY RESPONSE TEAM
  • 5.2 DDN MANAGEMENT BULLETINS
  • 5.3 SECURITY-RELATED MAILING LISTS
  • 5.3.1 Security
  • 5.3.2 RISKS
  • 5.3.3 TCP-IP
  • 5.3.4 SUN-SPOTS, SUN-NETS, SUN-MANAGERS
  • 5.3.5 VIRUS-L

  • REFERENCES
  • APPENDIX A - SECURITY CHECKLIST

  • Size: 122997 bytes
    Last-modified: Sun, 01 Jun 1997 16:03:48 GMT

    40: [1][2][3][4]