Авторизация
Поиск по указателям
Bauer M.D. — Linux Server Security
Обсудите книгу на научном форуме
Нашли опечатку? Выделите ее мышкой и нажмите Ctrl+Enter
Название: Linux Server Security
Автор: Bauer M.D.
Аннотация: Linux consistently appears high up in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services such as DNS and delivering mail. But security is the foremost concern of anyone providing such a service. Any server experiences casual probe attempts dozens of time a day, and serious break-in attempts with some frequency as well. This highly regarded book, originally titled Building Secure Servers with Linux, combines practical advice with a firm knowledge of the technical tools needed to ensure security. The book focuses on the most common use of Linux — as a hub offering services to an organization or the Internet — and shows readers how to harden their hosts against attacks. An all-inclusive resource for Linux users who wish to harden their systems, Linux Server Security covers general security such as intrusion detection and firewalling a hub, as well as key services such as DNS, the Apache Web server, mail, and secure shell. Author Michael D. Bauer, a security consultant, network architect, and lead author of the popular Paranoid Penguin column in the Linux Journal, carefully outlines the security risks, defines precautions that can minimize those risks, and offers recipes for robust security. He is joined on several chapters by administrator and developer Bill Lubanovic. A number of new security topics have been added for this edition, including:
* Database security, with a focus on MySQL
* Using OpenLDAP for authentication
* An introduction to email encryption
* The Cyrus IMAP service, a popular mail delivery agent
* The vsftpd FTP server
Язык:
Рубрика: Технология /
Статус предметного указателя: Готов указатель с номерами страниц
ed2k: ed2k stats
Издание: 2-nd
Год издания: 2005
Количество страниц: 542
Добавлена в каталог: 14.06.2007
Операции: Положить на полку |
Скопировать ссылку для форума | Скопировать ID
Предметный указатель
.htaccess file
.htaccess file, in Apache configuration
.htaccess files
.htaccess files, preventing users from installing
.swatchrc file
/etc/mail/certs directory
3DES (Triple-DES) 2nd
<Anonymous ~ftp> configuration block, ProFTPD
<applet> configuration block, web security
<embed> configuration block, web security
<object> configuration block, web security
<script> configuration block, web security
A-records (address records) 2nd
Access control 2nd
access control, access control mechanisms
access control, ACLs in
access control, TCPwrappers
access database in Sendmail 2nd 3rd 4th
access restriction
access restriction, client-certificate authentication
access restriction, SSH and
access-control mechanisms
access.conf file
accounts
accounts, deleting unnecessary
accounts, restricting access to known users
AccountSecurity.pm, InteractiveBastille module
ACID (Analysis Console for Intrusion Databases) 2nd
ACID, up-to-date details on
ACK scanning
acl{} sections in named.conf file
actions allowed in access database (Sendmail)
actions, syslog
actions, syslog, chart summary
Active queue (Postfix)
active-mode FTP
address records (A-records) 2nd
Advanced Intrusion Detection Environment (AIDE)
ALEs (Annualized Loss Expectancies)
Aliases 2nd
aliases, converting to map file
aliases, creating IP aliases
aliases, mailing lists 2nd
Allman, Eric
allow-query, BIND global option
allow-recursion, BIND global option
allow-transfer, BIND global option
AllowRetrieveRestart, ProFTPD setting
AllowTcpForwarding, sshd_config parameter
Amoroso, Ed
Analysis Console for Intrusion Databases [See ACID]
Annualized Loss Expectancies (ALEs)
anomaly detection systems 2nd
Anonymous ftp 2nd
Anonymous FTP Abuses
Anonymous FTP Configuration Guidelines
anonymous FTP, chroot jail, building
anonymous FTP, configuring FTP user accounts
anonymous FTP, ProFTPD
anonymous FTP, proftpd.conf settings
anonymous FTP, proftpd.conf settings, <Anonymous ~ftp> configuration block, ProFTPD
anonymous FTP, proftpd.conf settings, <Directory> configuration block, ProFTPD
anonymous FTP, proftpd.conf settings, <Limit LOGIN> configuration block, ProFTPD
anonymous FTP, proftpd.conf settings, <Limit READ DIRS CWD> configuration block, ProFTPD
anonymous FTP, proftpd.conf settings, <Limit STOR> configuration block, ProFTPD
anonymous FTP, proftpd.conf settings, <Limit WRITE> configuration block, ProFTPD
anonymous FTP, proftpd.conf settings, <VirtualHost> configuration block, ProFTPD
anonymous FTP, proftpd.conf settings, AllowFilter directive
anonymous FTP, proftpd.conf settings, DisplayLogin directive
anonymous FTP, proftpd.conf settings, ExtendedLog directive
anonymous FTP, proftpd.conf settings, MaxClients
anonymous FTP, proftpd.conf settings, User, Group directives
anonymous FTP, proftpd.conf settings, UserAlias directive
anonymous FTP, securing
anonymous FTP, setting up secure site
anonymous FTP, setup
anonymous uploads using rsync
anonymous_enable (vsftpd.conf)
anon_max_rate (vsftpd.conf)
anon_mkdir_write_enable (vsftpd.conf)
anon_other_write_enable (vsftpd.conf)
anon_root (vsftpd.conf)
anon_upload_enable (vsftpd.conf)
anon_world_readable_only (vsftpd.conf)
anti-spoofing [See spoofing]
Apache
Apache modules
Apache modules, mod_backhand
Apache modules, mod_bandwidth
Apache modules, mod_choke
Apache modules, mod_dav
Apache modules, mod_perl
Apache modules, mod_php
Apache modules, mod_pubcookie
Apache modules, mod_security
Apache, .htaccess files
Apache, combined access
Apache, configuration files
Apache, configuration options
Apache, configuring
Apache, dynamically linked versions of
Apache, environment variable
Apache, file hierarchy, securing
Apache, file locations
Apache, firewall, setting up
Apache, host-based
Apache, installation defaults
Apache, linking
Apache, log directories
Apache, resource limits
Apache, resource options
Apache, RPM
Apache, running an older version of
Apache, static content and
Apache, statically linked versions of
Apache, user directories
Apache, version checking
Apache.pm, InteractiveBastille module
application gateways
application gateways, versus circuit relay proxies
application-layer proxies [See application gateways]
apt-get 2nd 3rd
arachNIDS
arachNIDS, arachNIDS attack signature database
arachNIDS, project site
ascii_download_enable (vsftpd.conf)
ascii_upload_enable (vsftpd.conf)
Asmann, Claus
asset devaluation
assigning new ports
attackers, detecting
Attacks 2nd 3rd
attacks, buffer-overflow 2nd
attacks, cache poisoning 2nd 3rd
attacks, Code Red
attacks, cost estimates for
attacks, defenses against
attacks, Denial of Service (DoS) 2nd 3rd 4th
attacks, Distributed Denial of Service (DDoS)
attacks, hijacked
attacks, IP spoofing [See spoofing]
attacks, message forgery
attacks, mitigation of
attacks, Nimda
attacks, PORT Theft
attacks, spoofing 2nd 3rd
audit-based IDS
auth facility, syslog
auth users, rsync option
auth-priv facility, syslog
Authentication 2nd
authentication, basic
authentication, certificate-based 2nd [See also CAs]
authentication, certificate-based, Stunnel and
authentication, combining with rhosts access
authentication, mechanisms
authentication, peer-to-peer model for
authentication, rhosts and shosts
authentication, safer
authentication, SSH and
authentication, username/password
Authorization
authorized_keys file 2nd 3rd
automated hardening
axfr-get, djbdns service 2nd 3rd 4th
axfrdns, djbdns service 2nd
axfrdns, djbdns service, running
backups, database
back_log server variable (MySQL)
Baker, Andrew
bare-metal recovery 2nd
Barnyard
Basic Security Profile
Bastille Linux 2nd 3rd
Bastille Linux, download site
Bastille Linux, logs
Bastille Linux, modules
bastion hosts 2nd 3rd 4th 5th
bastion hosts, defined
bastion hosts, documenting configurations
Beale, Jay 2nd 3rd
Berners-Lee, Tim
Bernstein, Daniel J. 2nd 3rd 4th 5th 6th
bind
BIND, getting and installing
BIND, global options
BIND, installing in a nonstandard directory tree
BIND, logging categories related to security
BIND, migrating from
BIND, preparing to run
BIND, resources 2nd
BIND, security advisories
BIND, version differences
BIND, versus djbdns
BIND, weaknesses
Block ciphers 2nd
block ciphers, defined
Blowfish 2nd
bo (Snort preprocessor plug-in)
BootSecurity.pm, InteractiveBastille module
Borland's InterBase
Brauer, Henning
btree, database format
buffer-overflow attacks 2nd
BUGTRAQ
CA-signed certificates
cache poisoning 2nd 3rd 4th
cache poisoning, best defense against
Caching 2nd
caching, caching-only nameservers 2nd 3rd
Campin, Nate
Card, Remy
Carmichael, Martin R.
Carnegie Mellon University (CERT Coordination Center)
CAs (Certificate Authorities) 2nd
CAs, how to become small-time CA
CAs, transactions
CAs, what they do
Caswell, Brian
central log server
Central Loghost Mini-HOWTO
cert scheme 2nd
certificate authorities [See CAs]
certificate-based authentication 2nd 3rd
certificate-based authentication, specifying where to keep certificates
certificates
certificates, CA-signed
certificates, client
certificates, how SSL clients, servers, and CAs use certificates
certificates, passphrase-free, danger of
certificates, public
certificates, self-signed
certificates, Stunnel client systems
certificates, X.509 2nd
CERT_DIR (sendmail.mc directive)
CGI (Common Gateway Interface)
CGI, built-in programs
CGI, FastCGI
CGI, languages
CGI, runaway programs
CGI, standalone programs
Cgiwrap
chain_hostnames, syslog-ng global option
challenge-response
challenge-response, mechanisms
channellist, logging option in named.conf file
Check Point, stateful packet filtering firewall
checksums
chkconfig
chkconfig, managing startup services
chkrootkit shell script 2nd
chroot filesystems, running services in
chroot jail 2nd 3rd
chroot jail, BIND v8
chroot jail, BIND v9
chroot jail, chroot jail, building
chroot jail, Sendmail and
chroot jail, subversion
cipher, defined
ciphertext, defined
circuit relay proxies versus application gateways
Cisco PIX
Cleartext
cleartext, administration tools
cleartext, defined
cmds_allowed (vsftpd.conf)
CNAME records
COAST project web site
Code Red attacks
Cohen, Fred 2nd
combined access control
comment, rsync option
Common Gateway Interface [See CGI]
compromised system [See system integrity]
confCACERT (sendmail.mc directive)
confCACERT_PATH (sendmail.mc directive)
confCLIENT_CERT (sendmail.mc directive)
confCLIENT_KEY (sendmail.mc directive)
confDEF_AUTH_INFO definition
confDEF_USER_ID definition (sendmail.mc)
confidentiality of data, overview
ConfigureMiscPAM.pm, InteractiveBastille module
confPRIVACY_FLAGS definition (sendmail.mc)
confSAFE_FILE_ENV definition (sendmail.mc)
confSERVER_CERT (sendmail.mc directive)
confSERVER_KEY (sendmail.mc directive)
confSMTP_LOGIN_MSG variable (sendmail.mc)
confUNSAFE_GROUP_WRITES definition (sendmail.mc)
connection-oriented applications
connect_from_port_20 (vsftpd.conf)
cookies and sessions explained
core.schema file (LDAP)
cosine.schema (LDAP)
cost estimates for attacks
Costales, Bryan
Courier IMAP
Courier IMAP, home page
CPAN (Comprehensive Perl Archive Network)
CRAM-MD5
CRC-32 hashes, caution
Реклама