亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來(lái)到蟲(chóng)蟲(chóng)下載站! | ?? 資源下載 ?? 資源專(zhuān)輯 ?? 關(guān)于我們
? 蟲(chóng)蟲(chóng)下載站

?? unx44.htm

?? Unix Unleashed, Third Edition is written with the power user and system administrator in mind. This
?? HTM
?? 第 1 頁(yè) / 共 5 頁(yè)
字號(hào):
<IMG SRC="warning.gif" WIDTH = 37 HEIGHT = 35><B>WARNING: </B>The chroot system call won't solve all your problems. While it limits the cracker's access to the part of the UNIX file tree you specify in the chroot call, a good cracker may still break in. 
For instance, if a buggy setuid root program allows a cracker to get a shell with superuser permissions inside the chrooted directory, she can create device files with read and write permission on system memory or raw disks. A knowledgeable cracker could 
then add new accounts to the password file or break your system in any number of other ways. The moral is that you shouldn't feel safe just because you're running a setuid root program inside a chrooted directory. setuid root programs should always be 
carefully in-spected for bugs regardless of whether they're running in a restricted environment.

<BR></NOTE>

<HR ALIGN=CENTER>

<H4 ALIGN="CENTER">

<CENTER><A ID="I26" NAME="I26">

<FONT SIZE=3><B>sendmail</B>

<BR></FONT></A></CENTER></H4>

<P>The sendmail program is a mail router that implements the Simple Mail Transfer Protocol (SMTP). Because it is large, complex, and runs with superuser privileges, it has yielded a monotonous string of serious bugs. (The notorious Internet worm of 
November 1988 exploited a sendmail bug.) Worse, vendors often lag several versions behind the state of the art and fail to fix known bugs, or they add new, bug-producing &quot;features.&quot;

<BR></P>

<P>Your most secure option is to toss your vendor's sendmail and run Version 8 sendmail, available from ftp.cs.berkeley.edu and other hosts. Eric Allman, the original author, has resumed work on sendmail and rewritten much of the code, and is actively 
maintaining it. The serious bugs detailed in the CERT/CC advisory of November 4, 1993, were not present in Version 8 sendmail, and would probably have been fixed more promptly by Allman than by vendors, some of whom took up to two months to produce fixes. 

See Chapter 41 for instructions on installing Version 8 sendmail.

<BR></P>

<P>For sites that need very high security, the TIS (Trusted Information Systems, Inc.) toolkit, available from the host ftp.tis.com, circumvents sendmail problems by providing an SMTP client, smap, that runs as an unprivileged user in a chrooted 
environment. smap implements a minimal version of SMTP and writes mail to disk for later delivery by smapd. smap also allows you to refuse mail that's too large, to prevent attackers from filling your disks.

<BR></P>

<H4 ALIGN="CENTER">

<CENTER><A ID="I27" NAME="I27">

<FONT SIZE=3><B>Network File System (NFS)</B>

<BR></FONT></A></CENTER></H4>

<P>NFS was invented by Sun Microsystems, which put the protocol specification in the public domain. This meant that anyone could write an NFS implementation that would interoperate with Sun's, and many vendors did. NFS is useful and popular, but does not 
offer strong security. It opens you to many attacks, and if you don't need it, you shouldn't run it.

<BR></P>

<P>If you run NFS, carefully read your vendor's documentation and make sure you've enabled all security features. Keep exported file systems to a minimum, and export them with the minimal set of permissions. The books mentioned in the section &quot;Finding 

More Information&quot; later in this chapter provide cookbook procedures for safely administering NFS.

<BR></P>

<H4 ALIGN="CENTER">

<CENTER><A ID="I28" NAME="I28">

<FONT SIZE=3><B>Network Information System (NIS)</B>

<BR></FONT></A></CENTER></H4>

<P>Sun Microsystems also created NIS (previously known as YP, or yellow pages). As with NFS, several vendors besides Sun have implemented NIS on their computers.

<BR></P>

<P>NIS allows you to share system administration data over the network, which is convenient if you have many hosts to administer. For instance, if you have a cluster of 50 workstations using the same password file, you can create a single copy and use NIS 

to share it among the workstations.

<BR></P>

<P>Although NIS is convenient, it is not secure. A poorly administered NIS may allow crackers to gather information about your site remotely, for instance by requesting your password file for offline cracking. As before, if you don't need it, don't run it. 

If you do need it, make sure that your NIS domain name isn't easily guessed, and refer to your vendor's documentation and one of the &quot;nuts and bolts&quot; books for detailed instructions on safe NIS administration.

<BR></P>

<H4 ALIGN="CENTER">

<CENTER><A ID="I29" NAME="I29">

<FONT SIZE=3><B>finger</B>

<BR></FONT></A></CENTER></H4>

<P>Although the finger program seems innocuous, it may be another you can do without. finger is the client, and fingerd the server. The client program is safe, but the server can give crackers information about your site. In particular, the time of last 
login is often included in finger output, which helps crackers find unused accounts to break. finger's output format may also give clues to the kind of operating system you run. Since many crackers work from checklists of bugs particular to certain 
versions of UNIX, this information is valuable. Also, if your password policy doesn't prevent your users from choosing bad passwords, finger information may provide clues to crackers.

<BR></P>

<P>You should run fingerd as an unprivileged user&#151;the login nobody is a good choice.

<BR></P>

<H4 ALIGN="CENTER">

<CENTER><A ID="I30" NAME="I30">

<FONT SIZE=3><B>The Trivial File Transfer Protocol (TFTP)</B>

<BR></FONT></A></CENTER></H4>

<P>TFTP is used by diskless workstations to load UNIX from a file server. It's called &quot;trivial&quot; because the normal security checks of FTP have been removed&#151;accounts and passwords are not required. Some versions of the TFTP server allow 
crackers to grab any file on the system&#151;for instance the shadow password file for offline cracking. Recent versions of the TFTP server offer better security by only allowing files to be retrieved from a specific directory. If you don't need TFTP 
service, disable it, and if you do, make sure you're using all its security features. Secure versions of the TFTP daemon are available from ftp.uu.net and other hosts.

<BR></P>

<H3 ALIGN="CENTER">

<CENTER><A ID="I31" NAME="I31">

<FONT SIZE=4><B>Intrusion Detection</B>

<BR></FONT></A></CENTER></H3>

<P>Despite your best efforts, your site may be cracked. How will you know when it happens? Sophisticated system crackers go to great lengths to cover their tracks.

<BR></P>

<P>If you administer a single computer, it helps to get to know it and your users. Run ps periodically to get an idea of what jobs are usually running, and look for unusual ones. Use sa to see what typical job mix your users run. Is a user who normally 
does only word processing suddenly compiling programs? Is an account being used while a user is on vacation? Either might indicate a break-in.

<BR></P>

<P>This kind of monitoring is very limited, though. You can't be logged in all the time, and if you have more than one computer to administer, this approach is impractical. How can you detect the telltale signs of crackers automatically?

<BR></P>

<P>Account auditing helps detect whether crackers have created new accounts. If you run a small system you may be able to print the entire password file and periodically compare it to the system password file. If you have too many users for this to be 
practical, you can store the current password file on a read-only medium (for example, a floppy disk that you can write-protect) and use diff to look for new, unauthorized accounts. Account auditing should also ensure that inactive or idle accounts are 
removed.

<BR></P>

<H4 ALIGN="CENTER">

<CENTER><A ID="I32" NAME="I32">

<FONT SIZE=3><B>Message Digests</B>

<BR></FONT></A></CENTER></H4>

<P>Message digests, also known as file signatures, are the preferred way to alert you when crackers alter files. A message digest is a cryptographic signature specific to a file&#151;if the file changes, the signature changes, and if the signature is 
strong enough, it's not possible for a cracker to create another file with the same signature. If you compute a message digest for all your important system files, and a cracker changes one, you'll find out.

<BR></P>

<P>The public-domain Tripwire software automates detection of file system alterations. You can ftp Tripwire from ftp.cs.purdue.edu. Tripwire computes up to five different signatures for each file you specify. It reports deleted files and new files. You can 

configure it to ignore files you know will change, such as system log files.

<BR></P>

<P>If possible you should install Tripwire just after you've installed your vendor's operating system, before you install user accounts and connect it to a network. If you're installing Tripwire on an existing system, put it in single-user mode or detach 
it from the network, and then install Tripwire and compute the file signatures. If you can, keep Tripwire, its configuration file, and its database of file signatures offline or on read-only media.

<BR></P>

<P>Files change all the time on UNIX systems, and if you don't configure it correctly Tripwire may become your UNIX equivalent of &quot;the boy who cried wolf.&quot; For instance, the /etc/password file signature changes whenever a user changes her 
password. The danger is that warnings of illicit changes to files will be buried in the noise of valid changes. Spend some time configuring Tripwire until the signal-to-noise ratio is high enough that you won't miss valid reports.

<BR></P>

<P>Tripwire's message digests vary in their cryptographic strength. Read the documentation carefully and make sure you're using digests strong enough for your site's security needs.

<BR></P>

<H4 ALIGN="CENTER">

<CENTER><A ID="I33" NAME="I33">

<FONT SIZE=3><B>C2 Auditing</B>

<BR></FONT></A></CENTER></H4>

<P>The National Computer Security Center (NCSC) publishes the Trusted Computer Systems Evaluation Criteria (TCSEC, or Orange Book) to specify the security standards computers must meet for certification at various levels for government use. The C2 level is 

one that vendors commonly claim to meet. Among other things, C2 security requires that audit events be logged to help track intrusions. For example, if the user joe runs the su command and becomes root at 14:23 on February 10, 1994, this information is 
recorded in an audit file.

<BR></P>

<P>Many other fairly routine events are audited, and audit logs become huge. The problem on large systems with many users is winnowing the chaff from the wheat, and few tools are available to automate the process. However, if you run a small system and you 

have time to inspect the logs, C2 auditing may help you discover intrusions.

<BR></P>

<P>Note that there is a difference between offering &quot;C2 security features&quot; (as many vendors claim) and actually being certified at a TCSEC level by the NCSC. The former is marketing hype, and the latter a lengthy process that leads to official 
certification. This doesn't mean that uncertified &quot;C2 features&quot; aren't valuable, but you should know the difference.

<BR></P>

<H4 ALIGN="CENTER">

<CENTER><A ID="I34" NAME="I34">

<FONT SIZE=3><B>Program Wrappers</B>

<BR></FONT></A></CENTER></H4>

<P>A wrapper is a program that offers additional security by surrounding a less secure program and running it in a more secure environment, making additional checks before running it, or logging information about who uses it.

<BR></P>

<P>For instance, suppose that you usually log in to your computer yourhost.zorch.com, but sometimes log in to zach.glop.org and then telnet to yourhost.zorch.com. Running a telnet server on yourhost.zorch.com makes it possible for anyone on the Internet to 

attempt a break-in. Since you know that the only Internet host that should have access is zach.glop.org, you can put a wrapper around telnetd that checks incoming connections and refuses ones from other hosts.

<BR></P>

<P>The tcpd wrapper is available from ftp.cert.org and other sites. tcpd sits between the Internet daemon inetd and the programs that inetd runs. For instance, instead of having inetd run telnetd directly, you can configure it to run tcpd. Based on the 
rules you give, tcpd can start telnetd or reject the connection request. For instance, in the previous example it could reject telnet connections from all hosts other than zach.glop.org. In either case it can log the attempt. tcpd can be used for any 
program run by inetd. The TIS firewalls toolkit provides a similar program, netacl (Network Access Control), available from ftp.tis.com.

<BR></P>

<H3 ALIGN="CENTER">

<CENTER><A ID="I35" NAME="I35">

<FONT SIZE=4><B>Disaster Recovery</B>

<BR></FONT></A></CENTER></H3>

<P>If you discover a break-in, what should you do? That depends on what the cracker is doing, whether you intend to catch and prosecute him, and how disruptive he is. You may want to monitor the cracker's activities to see how he got in, and gather 
information about other sites he may be using (or cracking from your site) so you can notify those sites' system administrators. You should also notify CERT/CC. (See the section &quot;Finding More Information&quot; later in this chapter.) Depending on your 

security needs and what you know about how the cracker got in, you may need to restore changed files, change the superuser and system administrator passwords, audit (your password file), install a secure version of a broken program or change system 
configuration files to remove insecurities, or even restore your entire system from the vendor's original distribution media and your own backups.

<BR></P>

<P>This list is not exhaustive, but it shows a broad range of post-intrusion options. Some of these options&#151;such as requiring all your users to change their passwords&#151;severely affect your users and staff. Things will go more smoothly if you have 

a written plan. Although you may not create a perfect plan the first time, having one helps keep you calm and provides some structure when things go wrong.

<BR></P>

<P>After your system is secure again, you should assess your security needs and strategies. Could the break-in have been prevented? How bad were the consequences? Should you revise your security policy or devote more staff time to security? Post-intrusion 

may be a good time to approach management with previously rejected security proposals.

<BR></P>

<H3 ALIGN="CENTER">

<CENTER><A ID="I36" NAME="I36">

<FONT SIZE=4><B>Security Tools</B>

<BR></FONT></A></CENTER></H3>

<P>Programmers have developed automated security tools (ASTs) to assess your system security. ASTs are sharp on both sides&#151;if you don't use them to find insecurities, crackers may.

<BR></P>

<P>Many crackers work from checklists of known bugs, methodically trying each in turn until they find a way in or give up and move on to an easier target. ASTs automate this boring job and generate summary reports. If you close those holes, a checklist 
cracker may move on to less secure hosts, preferably ones you don't administer.

<BR></P>

<P>There are two problems with ASTs. First, you may gain a false sense of security when they cheerfully report &quot;all's well.&quot; ASTs only report known insecurities, and new ones are discovered constantly. A second, related problem, is that if 
crackers break 

?? 快捷鍵說(shuō)明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
色天使久久综合网天天| 免费观看成人av| 欧美一级日韩不卡播放免费| 国产不卡在线播放| 亚洲一区视频在线观看视频| 久久综合精品国产一区二区三区| 波多野结衣中文一区| 爽好久久久欧美精品| 日韩电影在线一区二区三区| 精品盗摄一区二区三区| 在线观看www91| 成人国产精品免费观看| 日韩av一区二区三区| 亚洲另类春色校园小说| 国产三级精品三级在线专区| 欧美一区二区三区性视频| 91麻豆swag| 粉嫩绯色av一区二区在线观看| 日日骚欧美日韩| 亚洲妇女屁股眼交7| 亚洲欧美日韩电影| 国产精品久久777777| 久久只精品国产| 日韩免费电影一区| 精品欧美一区二区三区精品久久 | 亚洲图片欧美色图| 亚洲男人电影天堂| 亚洲欧美日韩国产另类专区| 亚洲日本乱码在线观看| 亚洲黄色小视频| 亚洲网友自拍偷拍| 舔着乳尖日韩一区| 美国欧美日韩国产在线播放| 久久久久久久久久久久久女国产乱| 国产91富婆露脸刺激对白| 高清日韩电视剧大全免费| av在线这里只有精品| 色综合天天综合色综合av | 久久精品免费观看| 国产精品乡下勾搭老头1| av中文一区二区三区| 欧美区一区二区三区| 久久综合色天天久久综合图片| 久久久久久久久免费| 亚洲一区二区五区| 国产麻豆91精品| 欧美三区在线观看| 国产免费成人在线视频| 在线观看区一区二| 日韩一区精品字幕| 日本三级亚洲精品| 亚洲国产你懂的| 国产精品九色蝌蚪自拍| 精品视频999| 91精品在线免费| 欧美变态口味重另类| 国产精品久久久久久久久免费樱桃| 国产精品久久久久久久午夜片| 亚洲成人自拍网| 久久黄色级2电影| 色偷偷一区二区三区| 亚洲精品一线二线三线无人区| 国产精品成人午夜| 精品一区二区成人精品| 色综合色综合色综合色综合色综合| 日韩精品一区二区三区四区视频| 亚洲欧洲三级电影| 风流少妇一区二区| 欧美成人伊人久久综合网| 亚洲国产你懂的| 色诱亚洲精品久久久久久| 欧美国产日韩精品免费观看| 九一九一国产精品| 欧美久久久久免费| 亚洲国产一区二区在线播放| 91久久线看在观草草青青| 亚洲欧美一区二区三区孕妇| 成人免费高清视频在线观看| 国产日产欧美一区二区三区| 精品在线视频一区| 久久综合久久综合亚洲| 久久av老司机精品网站导航| 欧美日韩1区2区| 亚洲自拍另类综合| 精品视频123区在线观看| 樱桃视频在线观看一区| 99久久精品国产毛片| 一区二区三区视频在线观看| 欧洲av在线精品| 亚洲va韩国va欧美va精品 | av欧美精品.com| 亚洲欧美另类久久久精品2019| 成人激情免费视频| 亚洲激情av在线| 欧美肥妇free| 久久er99热精品一区二区| 精品国产乱码久久久久久老虎 | 亚洲色图一区二区| 亚洲在线视频网站| 精品久久久久久久久久久久久久久 | 日韩一区二区不卡| 韩国欧美国产1区| 一区在线观看视频| 884aa四虎影成人精品一区| 久久不见久久见免费视频1| 国产精品久久久久久亚洲毛片| 欧美欧美欧美欧美首页| 国产伦精品一区二区三区在线观看| 中文字幕欧美国产| 678五月天丁香亚洲综合网| 国产在线视频精品一区| 亚洲高清不卡在线观看| 中文av字幕一区| 4438亚洲最大| 欧洲国内综合视频| k8久久久一区二区三区| 青青草成人在线观看| 亚洲黄一区二区三区| 国产精品久久久久久户外露出| 欧美疯狂做受xxxx富婆| 欧美日韩在线不卡| 色婷婷av一区二区三区软件| 国产a级毛片一区| 国产精品影视在线观看| 麻豆视频一区二区| 久久国产剧场电影| 欧美aⅴ一区二区三区视频| 亚洲激情五月婷婷| 国产精品青草久久| 国产精品久久久久久久久久免费看| 777欧美精品| 欧美一区二区成人6969| 欧美日韩aaaaaa| 日韩欧美一级二级| 精品久久久久久久久久久久久久久 | 91国产成人在线| 欧美体内she精高潮| 日本韩国精品在线| 91在线观看免费视频| 成人avav在线| 色哟哟亚洲精品| 欧美精品日韩精品| 日韩美女视频在线| 国产精品三级电影| 国产精品免费视频一区| 中文字幕日韩一区| 亚洲成人综合在线| 蜜桃视频第一区免费观看| 国产一区久久久| 91久久精品一区二区三区| 欧美老肥妇做.爰bbww视频| 久久网站热最新地址| 亚洲成av人片一区二区梦乃| 激情综合色播激情啊| 91福利精品视频| 亚洲国产激情av| 亚洲成人免费视| 粉嫩一区二区三区在线看| 日本高清视频一区二区| 精品日韩99亚洲| 亚洲午夜国产一区99re久久| 国产在线播精品第三| 欧美日韩在线一区二区| 久久久精品日韩欧美| 亚洲激情成人在线| 国产中文字幕一区| 51精品国自产在线| 亚洲色大成网站www久久九九| 理论片日本一区| 欧美日韩在线播| 亚洲免费视频中文字幕| 成人18精品视频| 国产欧美精品在线观看| 久久99国产乱子伦精品免费| 国产精品你懂的在线| 国产激情视频一区二区在线观看| 欧美久久久久久久久中文字幕| 亚洲国产成人av网| 色狠狠色狠狠综合| 亚洲欧洲日韩女同| 不卡大黄网站免费看| 国产精品色眯眯| av亚洲产国偷v产偷v自拍| 中文字幕第一区| 成人福利在线看| 亚洲精品乱码久久久久久久久| 国产91在线|亚洲| 国产精品高潮久久久久无| 成人免费观看男女羞羞视频| 国产精品国产a级| 欧美日韩一区二区三区高清| 日韩成人dvd| 日韩一区二区免费在线观看| 亚洲成人av中文| 91精品国产综合久久久久久久久久 | 99久久久精品| 亚洲成a人片综合在线| 欧美一区二区三区公司| 国模套图日韩精品一区二区| 国产欧美一区二区在线|