Broken and outdated external links are updated.

This commit is contained in:
fl0 2004-04-03 18:47:28 +00:00
parent 04ca6d17ac
commit b6645120c1
1 changed files with 12 additions and 6 deletions

View File

@ -28,6 +28,12 @@
2000-05-02
</pubdate>
<revhistory>
<revision>
<revnumber>0.9</revnumber>
<date>2004-04-03</date>
<authorinitials>fl</authorinitials>
<revremark>updated external links</revremark>
</revision>
<revision>
<revnumber>0.8</revnumber>
<date>2003-02-20</date>
@ -508,7 +514,7 @@
<sect2>
<title>Password-cracking tools</title>
<para>
While password-cracking tools can be used by attackers to compromise a system, they can also be used by system administrators as proactive tool to ensure the strength of passwords on their system. The two most commonly used password-cracking tools are "crack" and "John the Ripper". Crack is probably included in your favorite distribution. John the Ripper can be obtained from <ulink url="http://www.false.com/security/john/index.html">http://www.false.com/security/john/index.html</ulink>. Run the tools against your password database and you'll probably be surprised with what they come up with.
While password-cracking tools can be used by attackers to compromise a system, they can also be used by system administrators as proactive tool to ensure the strength of passwords on their system. The two most commonly used password-cracking tools are "crack" and "John the Ripper". Crack is probably included in your favorite distribution. John the Ripper can be obtained from <ulink url="http://www.openwall.com/john/">http://www.openwall.com/john/</ulink>. Run the tools against your password database and you'll probably be surprised with what they come up with.
</para>
<para>
Additionally, there is a PAM module which utilizes the crack library to check the strength of a users password whenever it changed. When this module is installed, the user can only change their password to one which meets the minimum password strength.
@ -517,7 +523,7 @@
<sect2>
<title>Shadow and MD5 passwords</title>
<para>
As was discussed in the first section of this document, Shadow and MD5 passwords can make your system more secure. During the installation procedure, most modern distributions will ask whether you want to install MD5 and/or Shadow passwords. Unless you have a good reason not to, you should enable these. The process of converting from non-shadowed/non-MD5 passwords is a complicated process, and is beyond the scope of this document. The <ulink url="http://www.linuxdoc.org/HOWTO/Shadow-Password-HOWTO.html">Shadow Password HOWTO</ulink> is outdated, but it might be of some help.
As was discussed in the first section of this document, Shadow and MD5 passwords can make your system more secure. During the installation procedure, most modern distributions will ask whether you want to install MD5 and/or Shadow passwords. Unless you have a good reason not to, you should enable these. The process of converting from non-shadowed/non-MD5 passwords is a complicated process, and is beyond the scope of this document. The <ulink url="http://www.tldp.org/HOWTO/Shadow-Password-HOWTO.html">Shadow Password HOWTO</ulink> is outdated, but it might be of some help.
</para>
</sect2>
</sect1>
@ -540,7 +546,7 @@
<sect2>
<title>Installing mod_auth_pam</title>
<para>
First, you'll want to download mod_auth_pam from <ulink url="http://blank.pages.de/pam/mod_auth_pam/">http://blank.pages.de/pam/mod_auth_pam/</ulink>. The following commands will compile mod_auth_pam (you must be logged in as root):
First, you'll want to download mod_auth_pam from <ulink url="http://pam.sourceforge.net/mod_auth_pam/">http://pam.sourceforge.net/mod_auth_pam/</ulink>. The following commands will compile mod_auth_pam (you must be logged in as root):
</para>
<programlisting>
<prompt>~#</prompt> <userinput>tar xzf mod_auth_pam.tar.gz</userinput>
@ -621,7 +627,7 @@
<ulink url="http://www.kernel.org/pub/linux/libs/pam/Linux-PAM-html/pam_modules.html">Linux-PAM Module Writer's Manual</ulink>
</para></listitem>
<listitem><para>
<ulink url="http://www.kernel.org/pub/linux/libs/pam/Linux-PAM-html/pam_modules.html">Linux-PAM Application Developer's Manual</ulink>
<ulink url="http://www.kernel.org/pub/linux/libs/pam/Linux-PAM-html/pam_appl.html">Linux-PAM Application Developer's Manual</ulink>
</para></listitem>
</itemizedlist>
</sect2>
@ -635,10 +641,10 @@
<ulink url="http://www.securitywatch.com">securitywatch.com</ulink>
</para></listitem>
<listitem><para>
<ulink url="http://www.linuxdoc.org/HOWTO/Security-HOWTO.html">Security HOWTO</ulink>
<ulink url="http://www.tldp.org/HOWTO/Security-HOWTO.html">Security HOWTO</ulink>
</para></listitem>
<listitem><para>
<ulink url="http://packetstorm.securify.com">Packetstorm</ulink>
<ulink url="http://www.packetstormsecurify.org">Packetstorm</ulink>
</para></listitem>
</itemizedlist>
</sect2>