mirror of
https://github.com/Zeckmathederg/glfs.git
synced 2025-01-24 23:32:12 +08:00
Tagged security.xml
git-svn-id: svn://svn.linuxfromscratch.org/BLFS/trunk/BOOK@4207 af4574ff-66df-0310-9fd7-8a98e5e911e0
This commit is contained in:
parent
5a5bbbfdb5
commit
2dbd7a5f82
@ -6,42 +6,43 @@
|
|||||||
]>
|
]>
|
||||||
|
|
||||||
<chapter id="postlfs-security">
|
<chapter id="postlfs-security">
|
||||||
<?dbhtml filename="security.html"?>
|
<?dbhtml filename="security.html"?>
|
||||||
<title>Security</title>
|
|
||||||
|
|
||||||
<para>Security takes many forms in a computing environment. This chapter
|
<title>Security</title>
|
||||||
gives examples of three different types of security: access, prevention
|
|
||||||
and detection.</para>
|
|
||||||
|
|
||||||
<para>Access for users is usually handled by <command>login</command> or an
|
<para>Security takes many forms in a computing environment. This chapter
|
||||||
application designed to handle the login function. In this chapter, we show
|
gives examples of three different types of security: access, prevention
|
||||||
how to enhance <command>login</command> by setting policies with
|
and detection.</para>
|
||||||
<application><acronym>PAM</acronym></application> modules. Access via networks
|
|
||||||
can also be secured by policies set by <application>iptables</application>,
|
|
||||||
commonly referred to as a firewall. For applications that don't offer the
|
|
||||||
best security, you can use the <application>Stunnel</application> package to
|
|
||||||
wrap an application daemon inside an <acronym>SSL</acronym> tunnel.</para>
|
|
||||||
|
|
||||||
<para>Prevention of breaches, like a trojan, are assisted by applications like
|
<para>Access for users is usually handled by <command>login</command> or an
|
||||||
<application>GnuPG</application>, specifically the ability to confirm signed
|
application designed to handle the login function. In this chapter, we show
|
||||||
packages, which recognizes modifications of the <acronym>TAR</acronym> ball
|
how to enhance <command>login</command> by setting policies with
|
||||||
after the packager creates it.</para>
|
<application>PAM</application> modules. Access via networks
|
||||||
|
can also be secured by policies set by <application>iptables</application>,
|
||||||
|
commonly referred to as a firewall. For applications that don't offer the
|
||||||
|
best security, you can use the <application>Stunnel</application> package to
|
||||||
|
wrap an application daemon inside an SSL tunnel.</para>
|
||||||
|
|
||||||
<para> Finally, we touch on detection with a package that stores "signatures"
|
<para>Prevention of breaches, like a trojan, are assisted by applications like
|
||||||
of critical files (defined by the administrator) and then regenerates those
|
<application>GnuPG</application>, specifically the ability to confirm signed
|
||||||
"signatures" and compares for files that have been changed.</para>
|
packages, which recognizes modifications of the TAR ball
|
||||||
|
after the packager creates it.</para>
|
||||||
|
|
||||||
<xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="openssl.xml"/>
|
<para> Finally, we touch on detection with a package that stores "signatures"
|
||||||
<xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="cracklib.xml"/>
|
of critical files (defined by the administrator) and then regenerates those
|
||||||
<xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="linux_pam.xml"/>
|
"signatures" and compares for files that have been changed.</para>
|
||||||
<xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="shadow.xml"/>
|
|
||||||
<xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="iptables.xml"/>
|
<xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="openssl.xml"/>
|
||||||
<xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="firewalling.xml"/>
|
<xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="cracklib.xml"/>
|
||||||
<xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="gnupg.xml"/>
|
<xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="linux_pam.xml"/>
|
||||||
<xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="tripwire.xml"/>
|
<xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="shadow.xml"/>
|
||||||
<xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="heimdal.xml"/>
|
<xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="iptables.xml"/>
|
||||||
<xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="mitkrb.xml"/>
|
<xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="firewalling.xml"/>
|
||||||
<xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="cyrus-sasl.xml"/>
|
<xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="gnupg.xml"/>
|
||||||
<xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="stunnel.xml"/>
|
<xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="tripwire.xml"/>
|
||||||
|
<xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="heimdal.xml"/>
|
||||||
|
<xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="mitkrb.xml"/>
|
||||||
|
<xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="cyrus-sasl.xml"/>
|
||||||
|
<xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="stunnel.xml"/>
|
||||||
|
|
||||||
</chapter>
|
</chapter>
|
||||||
|
Loading…
Reference in New Issue
Block a user