DataMuseum.dk

Presents historical artifacts from the history of:

DKUUG/EUUG Conference tapes

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about DKUUG/EUUG Conference tapes

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - metrics - download
Index: T t

⟦0b96a3005⟧ TextFile

    Length: 2927 (0xb6f)
    Types: TextFile
    Names: »toc.t«

Derivation

└─⟦4f9d7c866⟧ Bits:30007245 EUUGD6: Sikkerheds distributionen
    └─⟦eed360c96⟧ »./papers/SRI-report/sri-report.troff.tar.Z« 
└─⟦9ae75bfbd⟧ Bits:30007242 EUUGD3: Starter Kit
    └─⟦eed360c96⟧ »EurOpenD3/security-doc.tar.Z« 
        └─⟦53b1903f6⟧ 
            └─⟦this⟧ »security-doc/toc.t« 

TextFile

.sp |5.5i
.ce 2
This page intentionally left blank.
Just throw it out.
.af % i
.bp 3
.de HD
.SH
CONTENTS (continued)
.RT
.sp .5i
.nf
.ta \w'X.X.X.X'u 6iR
..
.SH
CONTENTS
.sp .5i
.RT
.nf
.ta \w'X.X.X.X'u 6.25i 6.5iR
.ne 3
.ft HB
1	INTRODUCTION▶01◀	1
.ft R
1.1	\s-1UNIX\s0 Security▶01◀	1
1.2	The Internet Worm▶01◀	2
1.3	Spies and Espionage▶01◀	2
1.4	Other Break-Ins▶01◀	3
1.5	Security is Important▶01◀	3
.sp
.ne 3
.ft HB
2	IMPROVING SECURITY▶01◀	5
.ft R
2.1	Account Security▶01◀	5
2.1.1	Passwords▶01◀	5
2.1.1.1	Selecting Passwords▶01◀	6
2.1.1.2	Password Policies▶01◀	7
2.1.1.3	Checking Password Security▶01◀	7
2.1.2	Expiration Dates▶01◀	8
2.1.3	Guest Accounts▶01◀	8
2.1.4	Accounts Without Passwords▶01◀	9
2.1.5	Group Accounts and Groups▶01◀	9
2.1.6	Yellow Pages▶01◀	10
2.2	Network Security▶01◀	11
2.2.1	Trusted Hosts▶01◀	11
2.2.1.1	The hosts.equiv File▶01◀	11
2.2.1.2	The .rhosts File▶01◀	12
2.2.2	Secure Terminals▶01◀	12
2.2.3	The Network File System▶01◀	13
2.2.3.1	The exports File▶01◀	13
2.2.3.2	The netgroup File▶01◀	14
2.2.3.3	Restricting Super-User Access▶01◀	16
2.2.4	\s-1FTP\s0▶01◀	16
2.2.4.1	Trivial \s-1FTP\s0▶01◀	17
2.2.5	Mail▶01◀	18
2.2.6	Finger▶01◀	19
2.2.7	Modems and Terminal Servers▶01◀	19
2.2.8	Firewalls▶01◀	20
2.3	File System Security▶01◀	20
2.3.1	Setuid Shell Scripts▶01◀	21
2.3.2	The Sticky Bit on Directories▶01◀	22
2.3.3	The Setgid Bit on Directories▶01◀	22
2.3.4	The umask Value▶01◀	22
2.3.5	Encrypting Files▶01◀	23
2.3.6	Devices▶01◀	23
2.4	Security Is Your Responsibility▶01◀	24
.sp
.ne 3
.ft HB
3	MONITORING SECURITY▶01◀	25
.ft R
3.1	Account Security▶01◀	25
3.1.1	The lastlog File▶01◀	25
3.1.2	The utmp and wtmp Files▶01◀	25
3.1.3	The acct File▶01◀	26
3.2	Network Security▶01◀	27
3.2.1	The syslog Facility▶01◀	27
3.2.2	The showmount Command▶01◀	28
3.3	File System Security▶01◀	29
3.3.1	The find Command▶01◀	29
3.3.1.1	Finding Setuid and Setgid Files▶01◀	29
3.3.1.2	Finding World-Writable Files▶01◀	31
3.3.1.3	Finding Unowned Files▶01◀	31
3.3.1.4	Finding .rhosts Files▶01◀	31
3.3.2	Checklists▶01◀	32
3.3.3	Backups▶01◀	33
3.4	Know Your System▶01◀	33
3.4.1	The ps Command▶01◀	33
3.4.2	The who and w Commands▶01◀	34
3.4.3	The ls Command▶01◀	34
3.5	Keep Your Eyes Open▶01◀	34
.sp
.ne 3
.ft HB
4	SOFTWARE FOR IMPROVING SECURITY▶01◀	35
.ft R
4.1	Obtaining Fixes and New Versions▶01◀	35
4.1.1	Sun Fixes on \s-1UUNET\s0▶01◀	35
4.1.2	Berkeley Fixes▶01◀	36
4.1.3	Simtel-20 and \s-1UUNET\s0▶01◀	37
4.1.4	Vendors▶01◀	37
4.2	The npasswd Command▶01◀	37
4.3	The \s-1COPS\s0 Package▶01◀	38
4.4	Sun C2 Security Features▶01◀	38
4.5	Kerberos▶01◀	39
.sp
.de HD
.SH
CONTENTS (concluded)
.RT
.sp .5i
.nf
.ta \w'X.X.X.X'u 6iR
..
.ne 3
.ft HB
5	KEEPING ABREAST OF THE BUGS▶01◀	41
.ft R
5.1	The Computer Emergency Response Team▶01◀	41
5.2	\s-1DDN\s0 Management Bulletins▶01◀	41
5.3	Security-Related Mailing Lists▶01◀	42
5.3.1	Security▶01◀	42
5.3.2	\s-1RISKS\s0▶01◀	42
5.3.3	\s-1TCP-IP\s0▶01◀	42
5.3.4	SUN-SPOTS, SUN-NETS, SUN-MANAGERS▶01◀	42
5.3.5	\s-1VIRUS-L\s0▶01◀	43
.sp
.ne 3
.ft HB
6	SUGGESTED READING▶01◀	45
.ft R
.sp
.ne 3
.ft HB
7	CONCLUSIONS▶01◀	47
.ft R
.sp
.ne 3
.ft HB
REFERENCES▶01◀	49
.ft R
.sp
.ne 3
.ft HB
APPENDIX A - SECURITY CHECKLIST▶01◀	51
.ft R
.de HD
..
.bp