Improving the security of your Unix system. 1993
CONTENTS
1.2 THE INTERNET WORM
1.4 OTHER BREAK-INS
1.5 SECURITY IS IMPORTANT
2.1 ACCOUNT SECURITY
2.1.1 Passwords
2.1.1.1 Selecting Passwords
2.1.1.2 Password Policies
2.1.1.3 Checking Password Security
2.1.2 Expiration Dates
2.1.3 Guest Accounts
2.1.4 Accounts Without Passwords
2.1.5 Group Accounts and Groups
2.1.6 Yellow Pages
2.2 NETWORK SECURITY
2.2.1 Trusted Hosts
2.2.1.1 The hosts.equiv File
2.2.1.2 The .rhosts File
2.2.2 Secure Terminals
2.2.3 The Network File System
2.2.3.1 The exports File
2.2.3.3. The access= keyword specifies the list of hosts
2.2.3.2 The netgroup File
2.2.3.3 Restricting Super-User Access
2.2.4 FTP
2.2.4.1 Trivial FTP
2.2.5 Mail
2.2.6 Finger
2.2.7 Modems and Terminal Servers
2.2.8 Firewalls
2.3 FILE SYSTEM SECURITY
2.3.1 Setuid Shell Scripts
2.3.2 The Sticky Bit on Directories
2.3.3 The Setgid Bit on Directories
2.3.4 The umask Value
2.3.5 Encrypting Files
2.3.6 Devices
2.4 SECURITY IS YOUR RESPONSIBILITY
3.1 ACCOUNT SECURITY
3.1.1 The lastlog File
3.1.2 The utmp and wtmp Files
3.1.3 The acct File
3.2 NETWORK SECURITY
3.2.1 The syslog Facility
3.2.2 The showmount Command
3.3 FILE SYSTEM SECURITY
3.3.1 The find Command
3.3.1.1 Finding Setuid and Setgid Files
3.3.1.2 Finding World-Writable Files
3.3.1.3 Finding Unowned Files
3.3.1.4 Finding .rhosts Files
3.3.2 Checklists
3.3.3 Backups
3.4 KNOW YOUR SYSTEM
3.4.1 The ps Command
3.4.2 The who and w Commands
3.4.3 The ls Command
3.5 KEEP YOUR EYES OPEN
4.1 OBTAINING FIXES AND NEW VERSIONS
4.1.1 Sun Fixes on UUNET
4.1.2 Berkeley Fixes
4.1.3 Simtel-20 and UUNET
4.1.4 Vendors
4.2 THE NPASSWD COMMAND
4.3 THE COPS PACKAGE
4.4 SUN C2 SECURITY FEATURES
4.5 KERBEROS
5.1 THE COMPUTER EMERGENCY RESPONSE TEAM
5.2 DDN MANAGEMENT BULLETINS
5.3 SECURITY-RELATED MAILING LISTS
5.3.1 Security
5.3.2 RISKS
5.3.3 TCP-IP
5.3.4 SUN-SPOTS, SUN-NETS, SUN-MANAGERS
5.3.5 VIRUS-L
REFERENCES
APPENDIX A - SECURITY CHECKLIST
Size: 122997 bytes
Last-modified: Sun, 01 Jun 1997 16:03:48 GMT
40: [1][2][3][4]