亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? unx44.htm

?? Unix Unleashed, Third Edition is written with the power user and system administrator in mind. This
?? HTM
?? 第 1 頁 / 共 5 頁
字號:
<BR></P>

<P>A .rhosts file lists host/login name pairs that you want to give access to your account. Suppose that your main account mylogin is on the host money.corp.com, but sometimes you first login to the host lucre.corp.com and then use rlogin to get to 
money.corp.com. On money.corp.com you create a .rhosts in your home directory, readable and writable only by you and containing the line

<BR></P>

<PRE>lucre.corp.com mylogin</PRE>

<P>The .rhosts tells the rlogin daemon on money.corp.com that the account mylogin on the host lucre.corp.com should be allowed access without a password. You can add additional lines for other host/login name pairs, and the login name does not have to be 
the same on both hosts.

<BR></P>

<HR ALIGN=CENTER>

<NOTE>

<IMG SRC="imp.gif" WIDTH = 68 HEIGHT = 35><B>TIP: </B>While this is convenient, it carries a risk&#151;if a cracker breaks into your account on lucre.corp.com, she can then break into your account at money.corp.com without a password. The .rhosts file also 

provides cracker clues. If your account on money.corp.com is broken, the cracker will see from your .rhosts the login name of your account on lucre.corp.com. On the other hand, .rhosts authentication avoids the problem of sending clear-text passwords over 

the network, which is an advantage if you're not using one-time passwords. You must decide whether the convenience outweighs the security risks.

<BR></NOTE>

<HR ALIGN=CENTER>

<P>The file /etc/hosts.equiv does on a global level what .rhosts files do on the account level. The 10-workstation site example could create an /etc/hosts.equiv file like this on each workstation:

<BR></P>

<PRE>ws1.corp.com

ws2.corp.com

[_]

ws10.corp.com</PRE>

<P>Now the ten workstations are mutually equivalent with respect to user authentication. Once you log in to one of the workstations, you can log in to any other without a password and without a .rhosts file. Again, while this may be convenient, when a 
single account on one of the 10 workstations is cracked, the other 9 are also compromised.

<BR></P>

<H4 ALIGN="CENTER">

<CENTER><A ID="I20" NAME="I20">

<FONT SIZE=3><B><I>.rhosts</I></B><B> and the superuser account</B>

<BR></FONT></A></CENTER></H4>

<P>The superuser account (root) gets special treatment. Even if a host appears in /etc/hosts.equiv, root at that host is not considered equivalent unless the file /.rhosts also exists and contains a line for that site's root account. While this may be 
convenient for software distribution using rdist, consider carefully the security implications before you create a /.rhosts; passwordless software distribution is also convenient for crackers. For instance, if a cracker gains superuser access on 
ws1.corp.com, he can install a special version of the login program on that host, use rdist to send it to the other nine, and break into those, too. It may be better to forgo /.rhosts files and do your software distribution the hard way with ftp.

<BR></P>

<H4 ALIGN="CENTER">

<CENTER><A ID="I21" NAME="I21">

<FONT SIZE=3><B><I>.netrc</I></B><B> authentication</B>

<BR></FONT></A></CENTER></H4>

<P>The .rhosts and /etc/hosts.equiv files only work with the so-called r-commands (rsh, rlogin, rdist, rcp). The telnet and ftp will still ask for a login name and password. However, you can use the .netrc file to automate ftp access. The .netrc should 
reside in your home directory on the host from which you run ftp. It contains a list of host names, login names, and passwords, all unencrypted. Because it holds clear text passwords, the .netrc file must be readable only by its owner. Because the password 

is unencrypted, a .netrc is a worse security risk than a .rhosts. It is useful for anonymous ftp access, though. For instance, if you often log in to the host ftp.cert.org to look at the CERT/CC advisories, you could create a .netrc containing the 
following lines:

<BR></P>

<PRE>machine ftp.cert.org

login anonymous

password yourlogin@yourhost.domain</PRE>

<P>This is safe since you're not divulging anything that isn't already public knowledge, that ftp.cert.org supports anonymous ftp.

<BR></P>

<P>If possible, don't use .rhosts, .netrc, and /etc/hosts.equiv. Your security policy should specify whether your users are allowed to use the .rhosts and .netrc files. The COPS and chkacct programs (covered in the section &quot;Security Tools&quot; later 

in this chapter) check the security of your users' .rhosts and .netrc files.

<BR></P>

<H3 ALIGN="CENTER">

<CENTER><A ID="I22" NAME="I22">

<FONT SIZE=4><B>File System Security</B>

<BR></FONT></A></CENTER></H3>

<P>Despite your best efforts at establishing and implementing a good password security policy, your site may still be broken in to. Once a cracker has gained access to an account on your computer, his goal is to ensure continued access&#151;if he's broken 

a user's password it may be changed to something more secure, or you might close whatever security hole he exploited to gain access. One way for crackers to ensure access is to install new accounts, or trapdoor versions of a system program such as login. 
Good file system security helps you prevent or detect these modifications and recover from a break-in.

<BR></P>

<P>As distributed, most vendors' operating systems are not secure. System configuration files may be writable by users other than root, device files may have insecure file permissions, and programs and configuration files may be owned by users other than 
root. Configuration files writable by non-root accounts may allow a cracker to trick the system into granting additional privileges, or allow him to trick other computers on the same network. Device files that are readable or writable by users other than 
root may allow the cracker to alter system memory to gain additional privileges, snoop terminal or network traffic, or bypass the normal UNIX file protections to read files from or alter information on disk or tape storage. The cracker can alter files 
owned by users other than root even without breaking the superuser account. These are just a few of the ways vendors help make your life more interesting.

<BR></P>

<P>Ideally you will both ensure that your newly installed UNIX system has proper file system security (intrusion prevention), and have a way to detect unauthorized file system changes (intrusion detection). There are several good tools for these jobs. You 

can use the COPS and TAMU Tiger programs to detect insecurities in newly installed systems, and the Tripwire and TAMU tiger packages can both detect subsequent file system modifications. These programs are covered later in this chapter in the section 
&quot;Security Tools.&quot;

<BR></P>

<H4 ALIGN="CENTER">

<CENTER><A ID="I23" NAME="I23">

<FONT SIZE=3><B>Backup Policies</B>

<BR></FONT></A></CENTER></H4>

<P>You may not think of your system backups as a security tool. However, if crackers modify programs or destroy files, how will you recover? If you don't run Tripwire you may detect a break-in but not be able to tell which files the crackers changed. Your 

only recourse is to restore the system to its clean state from your backups. Even if you run Tripwire you must still be able to restore files that were removed or changed. Good backups are essential to both tasks. Backups may also be important as evidence 

in court proceedings.

<BR></P>

<P>You should answer the following questions about your backup strategy:

<BR></P>

<UL>

<LI>Are your backups physically safe? Can a cracker get your backup tapes and alter them or get information from them? Shadow passwords are useless if a cracker can retrieve the encrypted passwords from a backup tape and crack them offline. A cracker who 
can alter a backup and trick you into reloading it can cause his own programs to be installed on your system.

<BR>

<BR></LI>

<LI>Do you test your backups? Are you certain that you can restore your system? The worst time to find out there's a problem with your backup procedures is when you really need them. A good system administrator will periodically test-restore random files 
or entire file systems from her backup tapes to ensure that they will work in an emergency. This is especially important with 8mm helical scan tape systems because the tapes wear out after a few dozen passes.

<BR>

<BR></LI></UL>

<HR ALIGN=CENTER>

<NOTE>

<IMG SRC="warning.gif" WIDTH = 37 HEIGHT = 35><B>WARNING: </B>8mm helical scan tape backups (e.g., Exabyte) are based on video recording technology. If you drop a few bits on your video of Johnny's fourth birthday party, it's no big deal, but a few missing 

bits on your backup tape may render the remainder unreadable. Helical scan technology may result in data loss after only a few dozen passes over a tape. This includes reads, writes, and even retensioning passes&#151;in fact, anything that moves the tape 
over the capstan.

<BR>

<BR>Further, tape formulations vary among manufacturers and even between production runs as vendors change their formulations. To make matters worse, buying &quot;data grade&quot; 8mm tapes may not guarantee better quality. Your best bet is to experiment 
with different brands of tapes to see which work the most reliably with your drives. Once you've found a brand that works well for you, buy it in bulk. You should also experiment to see how many read and write passes you can achieve before a tape goes bad. 

Cycle in new tapes as the old ones near their life expectancies.

<BR>

<BR>4mm digital auto tape (DAT) drives were designed from the ground up for date recording, and the prices of DAT drives are dropping. You can now buy a DAT drive that will hold up to 8 GB of compressed data for about $1,500. If you're thinking about 
replacing your existing 8mm helical scan drives you should go with 4mm DAT.

<BR></NOTE>

<HR ALIGN=CENTER>

<UL>

<LI>Do you keep your tapes forever? Tapes and other media wear out and should be replaced on a set schedule and disposed of in a way that thwarts dumpster-diving attacks.

<BR>

<BR></LI>

<LI>Are your backups kept onsite? What will you do if there's a fire or other natural disaster? Consider storing archival backups offsite in a safe-deposit vault.

<BR>

<BR></LI>

<LI>Is your backup schedule sufficient for your security needs? How often do you run partial and full backups, and what is the chance that a file you create Monday and remove Tuesday will appear on a backup tape? Depending on the value of the information 
you back up, you may want to revise your schedule to run backups more frequently.

<BR>

<BR></LI>

<LI>Should you make periodic archival backups of the entire system on a read-only medium like a WORM (write-once, read-many) drive?

<BR>

<BR></LI></UL>

<H3 ALIGN="CENTER">

<CENTER><A ID="I24" NAME="I24">

<FONT SIZE=4><B>Network Security</B>

<BR></FONT></A></CENTER></H3>

<P>Attaching your computer to a network presents a host of new security threats&#151;networked computers may be attacked from any host on the network or by tapping into the physical network, and if you are connected to the Internet your computer can be 
attacked from sites anywhere in the world. Networking software also introduces new threats. Most Internet software protocols were not designed with security in mind, and network server programs often run with superuser privileges that make them fruitful 
grounds for system cracking.

<BR></P>

<P>If you don't need a software service, do away with it. For instance, if you don't plan to use the UUCP software, remove both it and the UUCP account. However, you will want some network services, and you must ensure that those are as secure as you can 
make them. A few of the most important services are discussed in the following sections.

<BR></P>

<H4 ALIGN="CENTER">

<CENTER><A ID="I25" NAME="I25">

<FONT SIZE=3><B>FTP</B>

<BR></FONT></A></CENTER></H4>

<P>FTP is the Internet File Transfer Protocol, implemented on UNIX systems by the client program ftp and the server program ftpd. The ftpd server runs with superuser privileges and has been a rich source of bugs.

<BR></P>

<P>The ftpd server allows ftp clients to connect to a computer and transfer files back to the client computer. While the ftp protocol requires user authentication, most implementations also allow anonymous logins. There are two problems. First, normal ftp 

authentication sends passwords over the network in the clear, where they can be snooped. Second, if you run ftpd&#151;and especially if you allow anonymous logins&#151;crackers have a program to exploit that might give them superuser privileges.

<BR></P>

<P>If you run ftpd, make sure you're running a fairly recent version. If your vendor doesn't provide a sufficiently bug-free ftpd, you may want to get a public-domain replacement. The BSD and Washington University (WU) replacements are available on 
ftp.uu.net and other hosts. The WU ftpd is based on the BSD version with many additional features, but new features sometimes mean new bugs&#151;if you don't need the features, the BSD version may be better.

<BR></P>

<P>Another possibility is to run ftpd in a chrooted environment. The chroot system call changes the root of the file tree from the directory / to one you specify. The process is trapped inside the directory tree below the new root, which allows you to 
insulate the rest of your file system from buggy software. You can use wrappers such as tcpd and netacl (described in the section &quot;Program Wrappers&quot; later in this chapter) to run a short program that changes to a secure directory and runs chroot 

before invoking ftpd.

<BR></P>

<P>chroot is not a panacea. A chrooted environment must be set up carefully, or a knowledgeable cracker may break out of it. Device files in the chroot directory are a particular risk since access to raw devices isn't affected by chroot. That is, if you 
create a device file in the chroot directory that allows access to the raw disk, a cracker can still access files outside the chroot file tree.

<BR></P>

<HR ALIGN=CENTER>

<NOTE>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
美女在线观看视频一区二区| 欧美成人激情免费网| 国产精品无遮挡| 粉嫩av一区二区三区| 国产精品美女久久久久久久久| 成人污污视频在线观看| 国产精品色呦呦| 91精品91久久久中77777| 亚洲大片精品永久免费| 欧美mv日韩mv| 丁香亚洲综合激情啪啪综合| 中文字幕一区二区三中文字幕| 色综合久久久久综合体| 99久久99久久综合| 亚洲精品欧美综合四区| 欧美久久一二三四区| 国产真实乱子伦精品视频| 国产精品视频免费| 欧美日韩精品是欧美日韩精品| 九色|91porny| 亚洲视频一二三区| 欧美精品乱码久久久久久 | 一区二区三区久久久| 欧美二区乱c少妇| 国产一区二区三区免费| 国产精品美女久久久久av爽李琼| 欧美亚洲日本一区| 国产一区二区三区四区五区美女 | 日韩电影免费在线| 中文字幕乱码亚洲精品一区| 91高清在线观看| 狠狠色综合色综合网络| 亚洲另类一区二区| 精品国产91亚洲一区二区三区婷婷| 99久久伊人精品| 久久精品国产亚洲a| 一区二区在线看| 精品久久久三级丝袜| 色狠狠av一区二区三区| 国产美女一区二区三区| 亚洲第一成人在线| 亚洲天堂福利av| 亚洲精品在线观看网站| 精品视频在线看| 不卡视频在线看| 久久爱www久久做| 亚洲国产精品天堂| 亚洲欧美日本在线| 国产欧美中文在线| 欧美一二三四在线| 欧美亚洲动漫精品| 国产**成人网毛片九色| 蜜桃在线一区二区三区| 亚洲福利一区二区三区| 亚洲品质自拍视频网站| 中文字幕乱码日本亚洲一区二区 | 久久你懂得1024| 91精品国产欧美一区二区18 | 成人av资源在线| 激情欧美一区二区| 日韩电影在线观看一区| 亚洲综合成人在线| 国产精品理论片在线观看| 精品国产123| 日韩三区在线观看| 一区二区三区日韩欧美精品 | 91精品国产全国免费观看| 91福利视频网站| 91丨九色丨黑人外教| 成人黄色片在线观看| 国产精品一品视频| 国产乱国产乱300精品| 激情五月婷婷综合| 久久国产欧美日韩精品| 久88久久88久久久| 久久精品国产**网站演员| 蜜桃久久av一区| 精品一区二区三区不卡| 久草精品在线观看| 国产精品一区二区在线看| 国产一区二区精品久久99| 国产麻豆精品在线观看| 国产**成人网毛片九色 | 日本一区二区综合亚洲| 国产亚洲一区字幕| 国产精品美女久久久久久久网站| 国产精品视频在线看| 亚洲人成在线观看一区二区| 亚洲免费观看高清完整版在线观看 | av中文字幕不卡| 色综合久久88色综合天天免费| 91片黄在线观看| 欧美亚洲国产怡红院影院| 欧美性生活久久| 欧美一区二区网站| 国产网红主播福利一区二区| 国产精品区一区二区三区| 18成人在线观看| 五月婷婷激情综合网| 久久国产尿小便嘘嘘| 国产成人一区二区精品非洲| 99国内精品久久| 欧美日韩三级一区二区| 精品国产网站在线观看| 欧美韩日一区二区三区四区| 亚洲精品国产品国语在线app| 舔着乳尖日韩一区| 久久爱www久久做| 成人高清视频在线| 欧美日韩国产高清一区二区三区 | 久久精品人人做人人综合 | 韩国欧美一区二区| 色哟哟国产精品免费观看| 欧美一区二区三区播放老司机| 久久精品夜色噜噜亚洲a∨| 亚洲欧美激情在线| 玖玖九九国产精品| 91原创在线视频| 欧美一区二区三区公司| 国产精品热久久久久夜色精品三区| 成人av网址在线| 欧美日韩一区二区三区在线看| 欧美精品一区二区三| 亚洲天堂久久久久久久| 蜜臀精品久久久久久蜜臀 | 婷婷久久综合九色国产成人 | 99re6这里只有精品视频在线观看| 欧美日韩国产一区二区三区地区| 国产亚洲精品资源在线26u| 亚洲一二三区视频在线观看| 国产自产高清不卡| 欧美久久久久中文字幕| 国产精品久久久爽爽爽麻豆色哟哟| 日韩精品成人一区二区在线| 99riav久久精品riav| 欧美性猛交xxxx乱大交退制版 | 色狠狠色噜噜噜综合网| 久久免费的精品国产v∧| 亚洲成人在线观看视频| 99精品国产一区二区三区不卡| 欧美一区二区三区日韩| 亚洲精品免费电影| 狠狠狠色丁香婷婷综合久久五月| 欧美日韩一区二区三区视频| 国产精品免费aⅴ片在线观看| 免费的成人av| 精品视频在线免费看| 亚洲情趣在线观看| kk眼镜猥琐国模调教系列一区二区| 欧美成人精品高清在线播放| 日韩精品亚洲一区二区三区免费| 色呦呦国产精品| 亚洲视频在线一区| 岛国av在线一区| 久久久亚洲高清| 国产综合一区二区| 欧美大片在线观看一区二区| 肉丝袜脚交视频一区二区| 欧美日韩一区在线| 伊人开心综合网| 欧洲一区在线观看| 伊人婷婷欧美激情| 欧美做爰猛烈大尺度电影无法无天| 国产精品久久国产精麻豆99网站| 国产成人综合网| 日本一区二区三区dvd视频在线| 国内精品久久久久影院色| 日韩欧美色综合网站| 精品一区二区三区免费观看| 日韩美女视频一区二区在线观看| 久久精品国产久精国产| 精品国产乱码久久久久久浪潮| 激情六月婷婷综合| 久久久久久久久99精品| 国产精品自拍在线| 亚洲国产激情av| 色综合天天综合网天天狠天天| 亚洲男人电影天堂| 欧美日韩一级大片网址| 日韩 欧美一区二区三区| 日韩视频一区在线观看| 久久99精品久久久| 久久夜色精品一区| 99久免费精品视频在线观看| 一区二区视频在线| 欧美日本一区二区三区四区| 美腿丝袜亚洲三区| 欧美激情在线一区二区| 99国产一区二区三精品乱码| 亚洲一区av在线| 亚洲国产精品尤物yw在线观看| 欧美日韩国产首页在线观看| 麻豆精品新av中文字幕| 国产亚洲一二三区| 色综合视频一区二区三区高清| 性做久久久久久免费观看欧美| 精品国精品国产| 成人黄色一级视频| 日韩精品亚洲专区| 国产农村妇女精品|