|
DataMuseum.dkPresents historical artifacts from the history of: DKUUG/EUUG Conference tapes |
This is an automatic "excavation" of a thematic subset of
See our Wiki for more about DKUUG/EUUG Conference tapes Excavated with: AutoArchaeologist - Free & Open Source Software. |
top - metrics - downloadIndex: T t
Length: 2927 (0xb6f) Types: TextFile Names: »toc.t«
└─⟦4f9d7c866⟧ Bits:30007245 EUUGD6: Sikkerheds distributionen └─⟦eed360c96⟧ »./papers/SRI-report/sri-report.troff.tar.Z« └─⟦9ae75bfbd⟧ Bits:30007242 EUUGD3: Starter Kit └─⟦eed360c96⟧ »EurOpenD3/security-doc.tar.Z« └─⟦53b1903f6⟧ └─⟦this⟧ »security-doc/toc.t«
.sp |5.5i .ce 2 This page intentionally left blank. Just throw it out. .af % i .bp 3 .de HD .SH CONTENTS (continued) .RT .sp .5i .nf .ta \w'X.X.X.X'u 6iR .. .SH CONTENTS .sp .5i .RT .nf .ta \w'X.X.X.X'u 6.25i 6.5iR .ne 3 .ft HB 1 INTRODUCTION▶01◀ 1 .ft R 1.1 \s-1UNIX\s0 Security▶01◀ 1 1.2 The Internet Worm▶01◀ 2 1.3 Spies and Espionage▶01◀ 2 1.4 Other Break-Ins▶01◀ 3 1.5 Security is Important▶01◀ 3 .sp .ne 3 .ft HB 2 IMPROVING SECURITY▶01◀ 5 .ft R 2.1 Account Security▶01◀ 5 2.1.1 Passwords▶01◀ 5 2.1.1.1 Selecting Passwords▶01◀ 6 2.1.1.2 Password Policies▶01◀ 7 2.1.1.3 Checking Password Security▶01◀ 7 2.1.2 Expiration Dates▶01◀ 8 2.1.3 Guest Accounts▶01◀ 8 2.1.4 Accounts Without Passwords▶01◀ 9 2.1.5 Group Accounts and Groups▶01◀ 9 2.1.6 Yellow Pages▶01◀ 10 2.2 Network Security▶01◀ 11 2.2.1 Trusted Hosts▶01◀ 11 2.2.1.1 The hosts.equiv File▶01◀ 11 2.2.1.2 The .rhosts File▶01◀ 12 2.2.2 Secure Terminals▶01◀ 12 2.2.3 The Network File System▶01◀ 13 2.2.3.1 The exports File▶01◀ 13 2.2.3.2 The netgroup File▶01◀ 14 2.2.3.3 Restricting Super-User Access▶01◀ 16 2.2.4 \s-1FTP\s0▶01◀ 16 2.2.4.1 Trivial \s-1FTP\s0▶01◀ 17 2.2.5 Mail▶01◀ 18 2.2.6 Finger▶01◀ 19 2.2.7 Modems and Terminal Servers▶01◀ 19 2.2.8 Firewalls▶01◀ 20 2.3 File System Security▶01◀ 20 2.3.1 Setuid Shell Scripts▶01◀ 21 2.3.2 The Sticky Bit on Directories▶01◀ 22 2.3.3 The Setgid Bit on Directories▶01◀ 22 2.3.4 The umask Value▶01◀ 22 2.3.5 Encrypting Files▶01◀ 23 2.3.6 Devices▶01◀ 23 2.4 Security Is Your Responsibility▶01◀ 24 .sp .ne 3 .ft HB 3 MONITORING SECURITY▶01◀ 25 .ft R 3.1 Account Security▶01◀ 25 3.1.1 The lastlog File▶01◀ 25 3.1.2 The utmp and wtmp Files▶01◀ 25 3.1.3 The acct File▶01◀ 26 3.2 Network Security▶01◀ 27 3.2.1 The syslog Facility▶01◀ 27 3.2.2 The showmount Command▶01◀ 28 3.3 File System Security▶01◀ 29 3.3.1 The find Command▶01◀ 29 3.3.1.1 Finding Setuid and Setgid Files▶01◀ 29 3.3.1.2 Finding World-Writable Files▶01◀ 31 3.3.1.3 Finding Unowned Files▶01◀ 31 3.3.1.4 Finding .rhosts Files▶01◀ 31 3.3.2 Checklists▶01◀ 32 3.3.3 Backups▶01◀ 33 3.4 Know Your System▶01◀ 33 3.4.1 The ps Command▶01◀ 33 3.4.2 The who and w Commands▶01◀ 34 3.4.3 The ls Command▶01◀ 34 3.5 Keep Your Eyes Open▶01◀ 34 .sp .ne 3 .ft HB 4 SOFTWARE FOR IMPROVING SECURITY▶01◀ 35 .ft R 4.1 Obtaining Fixes and New Versions▶01◀ 35 4.1.1 Sun Fixes on \s-1UUNET\s0▶01◀ 35 4.1.2 Berkeley Fixes▶01◀ 36 4.1.3 Simtel-20 and \s-1UUNET\s0▶01◀ 37 4.1.4 Vendors▶01◀ 37 4.2 The npasswd Command▶01◀ 37 4.3 The \s-1COPS\s0 Package▶01◀ 38 4.4 Sun C2 Security Features▶01◀ 38 4.5 Kerberos▶01◀ 39 .sp .de HD .SH CONTENTS (concluded) .RT .sp .5i .nf .ta \w'X.X.X.X'u 6iR .. .ne 3 .ft HB 5 KEEPING ABREAST OF THE BUGS▶01◀ 41 .ft R 5.1 The Computer Emergency Response Team▶01◀ 41 5.2 \s-1DDN\s0 Management Bulletins▶01◀ 41 5.3 Security-Related Mailing Lists▶01◀ 42 5.3.1 Security▶01◀ 42 5.3.2 \s-1RISKS\s0▶01◀ 42 5.3.3 \s-1TCP-IP\s0▶01◀ 42 5.3.4 SUN-SPOTS, SUN-NETS, SUN-MANAGERS▶01◀ 42 5.3.5 \s-1VIRUS-L\s0▶01◀ 43 .sp .ne 3 .ft HB 6 SUGGESTED READING▶01◀ 45 .ft R .sp .ne 3 .ft HB 7 CONCLUSIONS▶01◀ 47 .ft R .sp .ne 3 .ft HB REFERENCES▶01◀ 49 .ft R .sp .ne 3 .ft HB APPENDIX A - SECURITY CHECKLIST▶01◀ 51 .ft R .de HD .. .bp