7.6. Additional Resources......................................................................................... 109
II. Security Reference ..................................................................................................................... 111
8. Pluggable Authentication Modules (PAM)....................................................................... 113
8.1. Advantages of PAM ........................................................................................... 113
8.2. PAM Configuration Files ................................................................................... 113
8.3. PAM Modules .................................................................................................... 114
8.4. PAM Module Control Flags............................................................................... 115
8.5. PAM Module Paths ............................................................................................ 116
8.6. PAM Module Arguments ................................................................................... 116
8.7. Sample PAM Configuration Files ...................................................................... 116
8.8. PAM and Device Ownership.............................................................................. 118
8.9. Additional Resources......................................................................................... 119
9. TCP Wrappers and xinetd .............................................................................................. 121
9.1. Purpose of TCP Wrappers ................................................................................. 121
9.2. Host-Based Access Control Lists....................................................................... 121
9.3. Access Control Using xinetd .......................................................................... 124
9.4. Additional Resources......................................................................................... 128
10. SSH Protocol................................................................................................................... 131
10.1. Introduction...................................................................................................... 131
10.2. Event Sequence of an SSH Connection ........................................................... 132
10.3. Layers of SSH Security.................................................................................... 132
10.4. OpenSSH Configuration Files ......................................................................... 134
10.5. More Than a Secure Shell................................................................................ 135
10.6. Requiring SSH for Remote Connections ......................................................... 136
11. Kerberos.......................................................................................................................... 139
11.1. Advantages of Kerberos................................................................................... 139
11.2. Kerberos Disadvantages................................................................................... 139
11.3. Kerberos Terminology ..................................................................................... 139
11.4. How Kerberos Works ....................................................................................... 141
11.5. Kerberos and PAM........................................................................................... 142
11.6. Configuring a Kerberos 5 Server ..................................................................... 142
11.7. Configuring a Kerberos 5 Client ...................................................................... 144
11.8. Additional Resources ....................................................................................... 144
12. Installing and Configuring Tripwire ............................................................................... 147
12.1. How to Use Tripwire........................................................................................ 147
12.2. Installation Instructions.................................................................................... 149
12.3. File Locations................................................................................................... 150
12.4. Tripwire Components ...................................................................................... 150
12.5. Modifying the Policy File ................................................................................ 151
12.6. Selecting Passphrases....................................................................................... 152
12.7. Initializing the Database .................................................................................. 152
12.8. Running an Integrity Check ............................................................................. 152
12.9. Printing Reports ............................................................................................... 152
12.10. Updating the Database after an Integrity Check ............................................ 155
12.11. Updating the Policy File ................................................................................ 155
12.12. Tripwire and Email ........................................................................................ 156
12.13. Additional Resources ..................................................................................... 157
Commenti su questo manuale