old-www/HOWTO/Security-HOWTO/x21.html

360 lines
5.8 KiB
HTML

<HTML
><HEAD
><TITLE
>Introduction</TITLE
><META
NAME="GENERATOR"
CONTENT="Modular DocBook HTML Stylesheet Version 1.7"><LINK
REL="HOME"
TITLE="Linux Security HOWTO"
HREF="index.html"><LINK
REL="PREVIOUS"
TITLE="Linux Security HOWTO"
HREF="index.html"><LINK
REL="NEXT"
TITLE="Overview"
HREF="x82.html"></HEAD
><BODY
CLASS="sect1"
BGCOLOR="#FFFFFF"
TEXT="#000000"
LINK="#0000FF"
VLINK="#840084"
ALINK="#0000FF"
><DIV
CLASS="NAVHEADER"
><TABLE
SUMMARY="Header navigation table"
WIDTH="100%"
BORDER="0"
CELLPADDING="0"
CELLSPACING="0"
><TR
><TH
COLSPAN="3"
ALIGN="center"
>Linux Security HOWTO</TH
></TR
><TR
><TD
WIDTH="10%"
ALIGN="left"
VALIGN="bottom"
><A
HREF="index.html"
ACCESSKEY="P"
>Prev</A
></TD
><TD
WIDTH="80%"
ALIGN="center"
VALIGN="bottom"
></TD
><TD
WIDTH="10%"
ALIGN="right"
VALIGN="bottom"
><A
HREF="x82.html"
ACCESSKEY="N"
>Next</A
></TD
></TR
></TABLE
><HR
ALIGN="LEFT"
WIDTH="100%"></DIV
><DIV
CLASS="sect1"
><H1
CLASS="sect1"
><A
NAME="AEN21"
></A
>1. Introduction</H1
><P
>&#13;This document covers some of the main issues that affect
Linux security. General philosophy and net-born resources are
discussed.
</P
><P
>&#13;A number of other HOWTO documents overlap with security issues, and
those documents have been pointed to wherever appropriate.
</P
><P
>&#13;This document is <EM
>not</EM
> meant to be a up-to-date exploits document. Large
numbers of new exploits happen all the time. This document will tell
you where to look for such up-to-date information, and will give some general
methods to prevent such exploits from taking place.
</P
><DIV
CLASS="sect2"
><H2
CLASS="sect2"
><A
NAME="AEN27"
></A
>1.1. New Versions of this Document</H2
><P
>&#13;New versions of this document will be periodically posted to
<EM
>comp.os.linux.answers</EM
>. They will also be added to the
various sites that archive such information, including:
</P
><P
>&#13;<TT
CLASS="literal"
><A
HREF="http://www.linuxdoc.org/"
TARGET="_top"
>http://www.linuxdoc.org/</A
></TT
>
</P
><P
>&#13;The very latest version of this document should also be
available in various formats from:
</P
><P
>&#13;
<P
></P
><UL
><LI
><P
>&#13;<TT
CLASS="literal"
><A
HREF="http://scrye.com/~kevin/lsh/"
TARGET="_top"
>http://scrye.com/~kevin/lsh/</A
></TT
>
</P
></LI
><LI
><P
>&#13;<TT
CLASS="literal"
><A
HREF="http://www.linuxsecurity.com/docs/Security-HOWTO"
TARGET="_top"
>http://www.linuxsecurity.com/docs/Security-HOWTO</A
></TT
>
</P
></LI
><LI
><P
>&#13;<TT
CLASS="literal"
><A
HREF="http://www.tummy.com/security-howto"
TARGET="_top"
>http://www.tummy.com/security-howto</A
></TT
>
</P
></LI
></UL
>
</P
></DIV
><DIV
CLASS="sect2"
><H2
CLASS="sect2"
><A
NAME="AEN49"
></A
>1.2. Feedback</H2
><P
>&#13;All comments, error reports, additional information and criticism
of all sorts should be directed to:
</P
><P
>&#13;<TT
CLASS="literal"
><A
HREF="mailto:kevin-securityhowto@tummy.com"
TARGET="_top"
>kevin-securityhowto@tummy.com</A
></TT
>
</P
><P
>&#13;and
</P
><P
>&#13;<TT
CLASS="literal"
><A
HREF="mailto:dave@linuxsecurity.com"
TARGET="_top"
>dave@linuxsecurity.com</A
></TT
>
</P
><P
>&#13;<EM
>Note</EM
>: Please send your feedback to <EM
>both</EM
> authors. Also, be sure and
include "Linux" "security", or "HOWTO" in your subject to avoid Kevin's
spam filter.
</P
></DIV
><DIV
CLASS="sect2"
><H2
CLASS="sect2"
><A
NAME="AEN62"
></A
>1.3. Disclaimer</H2
><P
>&#13;No liability for the contents of this document can be accepted.
Use the concepts, examples and other content at your own risk.
Additionally, this is an early version, possibly with many
inaccuracies or errors.
</P
><P
>&#13;A number of the examples and descriptions use the RedHat(tm) package
layout and system setup. Your mileage may vary.
</P
><P
>&#13;As far as we know, only programs that, under certain terms may be
used or evaluated for personal purposes will be described. Most
of the programs will be available, complete with source, under
<A
HREF="http://www.gnu.org/copyleft/gpl.html"
TARGET="_top"
>GNU</A
> terms.
</P
></DIV
><DIV
CLASS="sect2"
><H2
CLASS="sect2"
><A
NAME="AEN68"
></A
>1.4. Copyright Information</H2
><P
>&#13;This document is copyrighted (c)1998-2000 Kevin Fenzi and Dave Wreski,
and distributed under the following terms:
</P
><P
>&#13;
<P
></P
><UL
><LI
><P
>&#13; Linux HOWTO documents may be reproduced and distributed in
whole or in part, in any medium, physical or electronic, as long
as this copyright notice is retained on all copies. Commercial
redistribution is allowed and encouraged; however, the authors
would like to be notified of any such distributions.
</P
></LI
><LI
><P
>&#13; All translations, derivative works, or aggregate works
incorporating any Linux HOWTO documents must be covered under
this copyright notice. That is, you may not produce a derivative
work from a HOWTO and impose additional restrictions on its
distribution. Exceptions to these rules may be granted under
certain conditions; please contact the Linux HOWTO coordinator at
the address given below.
</P
></LI
><LI
><P
>&#13; If you have questions, please contact Tim Bynum, the
Linux HOWTO coordinator, at
</P
></LI
></UL
>
</P
><P
>&#13;<TT
CLASS="literal"
><A
HREF="mailto:tjbynum@metalab.unc.edu"
TARGET="_top"
>tjbynum@metalab.unc.edu</A
></TT
>
</P
></DIV
></DIV
><DIV
CLASS="NAVFOOTER"
><HR
ALIGN="LEFT"
WIDTH="100%"><TABLE
SUMMARY="Footer navigation table"
WIDTH="100%"
BORDER="0"
CELLPADDING="0"
CELLSPACING="0"
><TR
><TD
WIDTH="33%"
ALIGN="left"
VALIGN="top"
><A
HREF="index.html"
ACCESSKEY="P"
>Prev</A
></TD
><TD
WIDTH="34%"
ALIGN="center"
VALIGN="top"
><A
HREF="index.html"
ACCESSKEY="H"
>Home</A
></TD
><TD
WIDTH="33%"
ALIGN="right"
VALIGN="top"
><A
HREF="x82.html"
ACCESSKEY="N"
>Next</A
></TD
></TR
><TR
><TD
WIDTH="33%"
ALIGN="left"
VALIGN="top"
>Linux Security HOWTO</TD
><TD
WIDTH="34%"
ALIGN="center"
VALIGN="top"
>&nbsp;</TD
><TD
WIDTH="33%"
ALIGN="right"
VALIGN="top"
>Overview</TD
></TR
></TABLE
></DIV
></BODY
></HTML
>