360 lines
5.8 KiB
HTML
360 lines
5.8 KiB
HTML
<HTML
|
|
><HEAD
|
|
><TITLE
|
|
>Introduction</TITLE
|
|
><META
|
|
NAME="GENERATOR"
|
|
CONTENT="Modular DocBook HTML Stylesheet Version 1.7"><LINK
|
|
REL="HOME"
|
|
TITLE="Linux Security HOWTO"
|
|
HREF="index.html"><LINK
|
|
REL="PREVIOUS"
|
|
TITLE="Linux Security HOWTO"
|
|
HREF="index.html"><LINK
|
|
REL="NEXT"
|
|
TITLE="Overview"
|
|
HREF="x82.html"></HEAD
|
|
><BODY
|
|
CLASS="sect1"
|
|
BGCOLOR="#FFFFFF"
|
|
TEXT="#000000"
|
|
LINK="#0000FF"
|
|
VLINK="#840084"
|
|
ALINK="#0000FF"
|
|
><DIV
|
|
CLASS="NAVHEADER"
|
|
><TABLE
|
|
SUMMARY="Header navigation table"
|
|
WIDTH="100%"
|
|
BORDER="0"
|
|
CELLPADDING="0"
|
|
CELLSPACING="0"
|
|
><TR
|
|
><TH
|
|
COLSPAN="3"
|
|
ALIGN="center"
|
|
>Linux Security HOWTO</TH
|
|
></TR
|
|
><TR
|
|
><TD
|
|
WIDTH="10%"
|
|
ALIGN="left"
|
|
VALIGN="bottom"
|
|
><A
|
|
HREF="index.html"
|
|
ACCESSKEY="P"
|
|
>Prev</A
|
|
></TD
|
|
><TD
|
|
WIDTH="80%"
|
|
ALIGN="center"
|
|
VALIGN="bottom"
|
|
></TD
|
|
><TD
|
|
WIDTH="10%"
|
|
ALIGN="right"
|
|
VALIGN="bottom"
|
|
><A
|
|
HREF="x82.html"
|
|
ACCESSKEY="N"
|
|
>Next</A
|
|
></TD
|
|
></TR
|
|
></TABLE
|
|
><HR
|
|
ALIGN="LEFT"
|
|
WIDTH="100%"></DIV
|
|
><DIV
|
|
CLASS="sect1"
|
|
><H1
|
|
CLASS="sect1"
|
|
><A
|
|
NAME="AEN21"
|
|
></A
|
|
>1. Introduction</H1
|
|
><P
|
|
> This document covers some of the main issues that affect
|
|
Linux security. General philosophy and net-born resources are
|
|
discussed.
|
|
</P
|
|
><P
|
|
> A number of other HOWTO documents overlap with security issues, and
|
|
those documents have been pointed to wherever appropriate.
|
|
</P
|
|
><P
|
|
> This document is <EM
|
|
>not</EM
|
|
> meant to be a up-to-date exploits document. Large
|
|
numbers of new exploits happen all the time. This document will tell
|
|
you where to look for such up-to-date information, and will give some general
|
|
methods to prevent such exploits from taking place.
|
|
</P
|
|
><DIV
|
|
CLASS="sect2"
|
|
><H2
|
|
CLASS="sect2"
|
|
><A
|
|
NAME="AEN27"
|
|
></A
|
|
>1.1. New Versions of this Document</H2
|
|
><P
|
|
> New versions of this document will be periodically posted to
|
|
<EM
|
|
>comp.os.linux.answers</EM
|
|
>. They will also be added to the
|
|
various sites that archive such information, including:
|
|
</P
|
|
><P
|
|
> <TT
|
|
CLASS="literal"
|
|
><A
|
|
HREF="http://www.linuxdoc.org/"
|
|
TARGET="_top"
|
|
>http://www.linuxdoc.org/</A
|
|
></TT
|
|
>
|
|
</P
|
|
><P
|
|
> The very latest version of this document should also be
|
|
available in various formats from:
|
|
</P
|
|
><P
|
|
>
|
|
<P
|
|
></P
|
|
><UL
|
|
><LI
|
|
><P
|
|
> <TT
|
|
CLASS="literal"
|
|
><A
|
|
HREF="http://scrye.com/~kevin/lsh/"
|
|
TARGET="_top"
|
|
>http://scrye.com/~kevin/lsh/</A
|
|
></TT
|
|
>
|
|
</P
|
|
></LI
|
|
><LI
|
|
><P
|
|
> <TT
|
|
CLASS="literal"
|
|
><A
|
|
HREF="http://www.linuxsecurity.com/docs/Security-HOWTO"
|
|
TARGET="_top"
|
|
>http://www.linuxsecurity.com/docs/Security-HOWTO</A
|
|
></TT
|
|
>
|
|
</P
|
|
></LI
|
|
><LI
|
|
><P
|
|
> <TT
|
|
CLASS="literal"
|
|
><A
|
|
HREF="http://www.tummy.com/security-howto"
|
|
TARGET="_top"
|
|
>http://www.tummy.com/security-howto</A
|
|
></TT
|
|
>
|
|
</P
|
|
></LI
|
|
></UL
|
|
>
|
|
|
|
</P
|
|
></DIV
|
|
><DIV
|
|
CLASS="sect2"
|
|
><H2
|
|
CLASS="sect2"
|
|
><A
|
|
NAME="AEN49"
|
|
></A
|
|
>1.2. Feedback</H2
|
|
><P
|
|
> All comments, error reports, additional information and criticism
|
|
of all sorts should be directed to:
|
|
</P
|
|
><P
|
|
> <TT
|
|
CLASS="literal"
|
|
><A
|
|
HREF="mailto:kevin-securityhowto@tummy.com"
|
|
TARGET="_top"
|
|
>kevin-securityhowto@tummy.com</A
|
|
></TT
|
|
>
|
|
</P
|
|
><P
|
|
> and
|
|
</P
|
|
><P
|
|
> <TT
|
|
CLASS="literal"
|
|
><A
|
|
HREF="mailto:dave@linuxsecurity.com"
|
|
TARGET="_top"
|
|
>dave@linuxsecurity.com</A
|
|
></TT
|
|
>
|
|
</P
|
|
><P
|
|
> <EM
|
|
>Note</EM
|
|
>: Please send your feedback to <EM
|
|
>both</EM
|
|
> authors. Also, be sure and
|
|
include "Linux" "security", or "HOWTO" in your subject to avoid Kevin's
|
|
spam filter.
|
|
</P
|
|
></DIV
|
|
><DIV
|
|
CLASS="sect2"
|
|
><H2
|
|
CLASS="sect2"
|
|
><A
|
|
NAME="AEN62"
|
|
></A
|
|
>1.3. Disclaimer</H2
|
|
><P
|
|
> No liability for the contents of this document can be accepted.
|
|
Use the concepts, examples and other content at your own risk.
|
|
Additionally, this is an early version, possibly with many
|
|
inaccuracies or errors.
|
|
</P
|
|
><P
|
|
> A number of the examples and descriptions use the RedHat(tm) package
|
|
layout and system setup. Your mileage may vary.
|
|
</P
|
|
><P
|
|
> As far as we know, only programs that, under certain terms may be
|
|
used or evaluated for personal purposes will be described. Most
|
|
of the programs will be available, complete with source, under
|
|
<A
|
|
HREF="http://www.gnu.org/copyleft/gpl.html"
|
|
TARGET="_top"
|
|
>GNU</A
|
|
> terms.
|
|
</P
|
|
></DIV
|
|
><DIV
|
|
CLASS="sect2"
|
|
><H2
|
|
CLASS="sect2"
|
|
><A
|
|
NAME="AEN68"
|
|
></A
|
|
>1.4. Copyright Information</H2
|
|
><P
|
|
> This document is copyrighted (c)1998-2000 Kevin Fenzi and Dave Wreski,
|
|
and distributed under the following terms:
|
|
</P
|
|
><P
|
|
>
|
|
<P
|
|
></P
|
|
><UL
|
|
><LI
|
|
><P
|
|
> Linux HOWTO documents may be reproduced and distributed in
|
|
whole or in part, in any medium, physical or electronic, as long
|
|
as this copyright notice is retained on all copies. Commercial
|
|
redistribution is allowed and encouraged; however, the authors
|
|
would like to be notified of any such distributions.
|
|
</P
|
|
></LI
|
|
><LI
|
|
><P
|
|
> All translations, derivative works, or aggregate works
|
|
incorporating any Linux HOWTO documents must be covered under
|
|
this copyright notice. That is, you may not produce a derivative
|
|
work from a HOWTO and impose additional restrictions on its
|
|
distribution. Exceptions to these rules may be granted under
|
|
certain conditions; please contact the Linux HOWTO coordinator at
|
|
the address given below.
|
|
</P
|
|
></LI
|
|
><LI
|
|
><P
|
|
> If you have questions, please contact Tim Bynum, the
|
|
Linux HOWTO coordinator, at
|
|
</P
|
|
></LI
|
|
></UL
|
|
>
|
|
|
|
</P
|
|
><P
|
|
> <TT
|
|
CLASS="literal"
|
|
><A
|
|
HREF="mailto:tjbynum@metalab.unc.edu"
|
|
TARGET="_top"
|
|
>tjbynum@metalab.unc.edu</A
|
|
></TT
|
|
>
|
|
</P
|
|
></DIV
|
|
></DIV
|
|
><DIV
|
|
CLASS="NAVFOOTER"
|
|
><HR
|
|
ALIGN="LEFT"
|
|
WIDTH="100%"><TABLE
|
|
SUMMARY="Footer navigation table"
|
|
WIDTH="100%"
|
|
BORDER="0"
|
|
CELLPADDING="0"
|
|
CELLSPACING="0"
|
|
><TR
|
|
><TD
|
|
WIDTH="33%"
|
|
ALIGN="left"
|
|
VALIGN="top"
|
|
><A
|
|
HREF="index.html"
|
|
ACCESSKEY="P"
|
|
>Prev</A
|
|
></TD
|
|
><TD
|
|
WIDTH="34%"
|
|
ALIGN="center"
|
|
VALIGN="top"
|
|
><A
|
|
HREF="index.html"
|
|
ACCESSKEY="H"
|
|
>Home</A
|
|
></TD
|
|
><TD
|
|
WIDTH="33%"
|
|
ALIGN="right"
|
|
VALIGN="top"
|
|
><A
|
|
HREF="x82.html"
|
|
ACCESSKEY="N"
|
|
>Next</A
|
|
></TD
|
|
></TR
|
|
><TR
|
|
><TD
|
|
WIDTH="33%"
|
|
ALIGN="left"
|
|
VALIGN="top"
|
|
>Linux Security HOWTO</TD
|
|
><TD
|
|
WIDTH="34%"
|
|
ALIGN="center"
|
|
VALIGN="top"
|
|
> </TD
|
|
><TD
|
|
WIDTH="33%"
|
|
ALIGN="right"
|
|
VALIGN="top"
|
|
>Overview</TD
|
|
></TR
|
|
></TABLE
|
|
></DIV
|
|
></BODY
|
|
></HTML
|
|
> |