
not the case, further reading is strongly recommended.
The principles that will guide us in our quest are:
There is no magic bullet. There is no one single thing we can do to make us secure. It is not that
simple.
•
Security is a process that requires maintenance, not an objective to be reached. •
There is no 100% safe program, package or distribution. Just varying degrees of insecurity. •
The steps we will be taking to get there are:
Step 1: Turn off, and perhaps uninstall, any and all unnecessary services. •
Step 2: Make sure that any services that are installed are updated and patched to the current, safe
version −− and then stay that way. Every server application has potential exploits. Some have just not
been found yet.
•
Step 3: Limit connections to us from outside sources by implementing a firewall and/or other
restrictive policies. The goal is to allow only the minimum traffic necessary for whatever our
individual situation may be.
•
Awareness. Know your system, and how to properly maintain and secure it. New vulnerabilities are
found, and exploited, all the time. Today's secure system may have tomorrow's as yet unfound
weaknesses.
•
If you don't have time to read everything, concentrate on Steps 1, 2, and 3. This is where the meat of the
subject matter is. The Appendix has a lot of supporting information, which may be helpful, but may not be
necessary for all readers.
1.2. Notes
This is a Red Hat specific version of this document. The included examples are compatible with Red Hat 7.0
and later. Actually, most examples should work with earlier versions of Red Hat as well. Also, this document
should be applicable to other distributions that are Red Hat derivatives, such as Mandrake, Conectiva, etc.
Overwhelmingly, the content of this document is not peculiar to Red Hat. The same rules and methodologies
apply to other Linuxes. And indeed, to other Operating Systems as well. But each may have their own way of
doing things −− the file names and locations may differ, as may the system utilities that we rely on. It is these
differences that make this document a "Red Hat" version.
1.3. Copyright
Security−Quickstart HOWTO for Red Hat Linux
Copyright © 2001 Hal Burgiss.
This document is free; you can redistribute it and/or modify it under the terms of the GNU General Public
License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any
later version.
Security Quick−Start HOWTO for Red Hat Linux
1.2. Notes 2
Commenti su questo manuale