亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? cops and robbers-unix system security.txt

?? 1000 HOWTOs for various needs [WINDOWS]
?? TXT
?? 第 1 頁 / 共 3 頁
字號:
                      COPS and Robbers                    UN*X System Security     In the last few years, computer security has received agreat  deal  more attention than it has in the past.  Compu-terized break-ins and criminal  activity,  once  merely  theproduct  of  the imagination of science fiction writers, hasbecame a fairly common  occurence  in  both  commercial  andacademic  circles.   In this paper, I will go over the prob-lems that face any multiuser computing system, then  discusshow  these  problems  apply  to  UNIX[1]  specifically,  andfinally  present  in  detail  a  suite of programs that weredeveloped in an attempt to address some of the main problemsthat  could  be  solved  via  software.  UNIX, although con-sidered to be a fairly secure operating system  ([Wood  88],[Duff  89], etc), has the advantage of having many publishedworks ([Grampp and Morris 84],  [Bishop  83],  etc)  on  theproblems  that  a computing site can have with security, andin addition, on how a UNIX system administrator  might  makehis/her  system more secure by monitoring various aspects ofhis/her UNIX site.  This, combined with  UNIX's  popularity,make  it  an  ideal target for a software security system tooperate on.     In this report I am not going to discuss specific  waysof  breaking  into a given UNIX machine (for a more detaileddescription on how to compromise UNIX security,  see  either[Baldwin88],  [Bishop83],  [Wood & Kochran 86], or [Grampp &Morris 84]) -- instead, I will concentrate on how to improveand  strengthen  the  potentially good security of a genericUNIX system by means of a software toolkit that examines theweaker  areas  of UNIX that are either traditionally ignored(due to the time constraints  or  ignorance  of  the  systemadministrators) or are simply reoccurring problems that needto be watched over.  In addition, this report is  not  meantfor  UNIX  neophytes -- although a great deal of proficiencyis not needed to read  this  report  and  use  the  programsdescribed  herein, a familiarity with basic UNIX features --the file system and file permission modes for example -- andcommands  such  as awk,grep,sed  as  well  as a workingknowledge of  shell  and  C  programming  are  necessary  to_________________________9  [1] Although originally designed and developed by KenThompson and Dennis Ritchie of AT&T, UNIX has grown farbeyond its' original design and now numerous  companiesmarket their own "flavor" of UNIX.  When I use the termUNIX in this paper, I don't mean merely AT&T's version,but  instead  I  mean  the majority of the most popularvarieties, made by developers at Berkely,  Sun,  and  ahost of other manufacturers.  I believe UNIX is still atrademark of Bell Laboratories.9                     February 19, 1991                           - 2 -understand the internal  workings  of  the  security  systemdescribed in this paper.     Although there is no reasonable way that  all  securityproblems  can  be solved (at least not with a software solu-tion) on any arbitrary UNIX system, administrators and  sys-tem  programs  can  be assisted by a software security tool.The Computer Oracle Password and Security system (COPS) thatwill  be described in this paper is just such a device.  TheCOPS system is a collection of programs  and  shell  scriptsthat  attempt to address as many of these problems as possi-ble in an efficient, portable, and above all in  a  reliableand  safe  way.  The main goal of COPS is one of prevention;it tries to anticipate and eliminate  security  problems  bymaking sure people don't get a chance to compromise securityin the first place.  Alerting the administrators of a poten-tial  intruder  or  that  a virus has infected the system isbeyond the scope of the present system, although  with  workwith  such  capabilities could be added ([Bauer and Koblentz88] and [Duff 89].)     To understand the reason COPS might check any  specificproblem,  a look at computer security problems in general isin order.  The problems listed below are  not  meant  to  beinclusive,  but  they  are indicative of the myriad types ofdilemmas  a  typical   computer   multiuser   system   mightencounter:     1)  Administrators, system  programmers,  and  computeroperators.   The  very  people  that (should) worry the mostabout security are sometimes the ones  that  are  the  leastconcerned.  Carelessness is one of the main culprits; a mis-take by a user might cause little or no  problem,  but  whensomeone  with no restrictions (or almost none) on their com-puter activity makes a mistake, a security hole can  result."I  can  trust  my users" is a fine statement to make -- butcan you trust your users' friends?  How about the  users  ofcomputers  that  are networked to yours?  New software, sys-tems, or procedures can facilitate extra problems; a comput-ing  staff  is  often  ill  or completely non-trained on newtechniques and software.   Too  often  "RTFM"  is  the  onlytraining  that  they  will  ever receive.  Programs that arecreated for in-house use are often  ill-documented  and  notdebugged  thoroughly,  and  when users other than the authorstart to use/abuse the program, problems can result.   Espe-cially  misunderstood,  even by experienced UNIX system pro-grammers, is the SUID program or, worse yet, the SUID  shellscript ([Bishop 83].) When a user says that his/her passwordwas forgotten (or any other account/security  related  prob-lem),  what  checks  are  made  to verify that the person isreally the owner of that account?  Are users that are  secu-rity  problems kept track of, so that repeated abuses of thesystem will result in punitive action?  Does your site  evenhave  a  security  policy?  And of course, the last straw is                     February 19, 1991                           - 3 -that most system administrators simply have too  much  otherwork to do than to constantly check the system for potentialsecurity flaws -- let alone to double-check  that  any  workdone  by  other  system programmers has been done correctly.These are the actions that often get left unsaid and undone.     A UNIX environment has no special defenses against thiskind  of "attack".  Fortunately, a number of these potentialproblems  (unless  catastrophic  in  scope)  are  not   onlycorrectable,  but are easy to detect with a software toolkitsuch as COPS.  Even the most careful UNIX guru will periodi-cally  make  a  mistake;  COPS  has  been designed to aid inher/his never ending battle against the forces of darkness.     2)  Physical security.  This is perhaps the most  frus-trating of all possible problems because it effects all com-puter systems and is often the hardest to safeguard against.Even  if the software is secure, even if the system adminis-trators are alert to potential problems, what happens  if  auser  walks  up to the root console and starts typing?  Doesthe night janitorial staff let anyone into the machine  roomwithout  proper  identification?  Who  has access to the keythat opens up the computing center?  Are terminals that  arelogged on left unguarded or unlocked?  Are passwords writtenon or near a users terminal or desk?   No  software  in  theworld   can  help  against  human  nature  or  carelessness.Reiterating to your staff and users  that  terminals  shouldnot  be  left  alone  or unguarded and that passwords (espe-cially root) should not be typed in front of unfriendly (andin this case, _everyone_ is your enemy) eyes would be a goodstart.  A simple analogy: since you  would  never  give  thekeys  to  the  company car away, why on earth would you giveaway the keys to your computer, which is certainly  worth  ahell  of  a lot more time and money (although it may not getas good mileage on the interstate.)   Common  sense  goes  along ways to help prevent this kind of risk.     3)   Authentication.   What  is  authentication?    Allmodern computing systems that have capabilities for multipleusers have a means of identifying who is using the  computerat  any  given time.  A common means of identification is byusing a password; and since the inception of this idea, poorpasswords have been a perennial problem.  People have a ten-dency to use  their  own  name,  or  their  social  securitynumber,  or  some  other  common word, name, or phrase for apassword.  The problem then arises when an unauthorized userwants to access clandestine information, he/she simply triesone of these simple passwords until a  successful  match  isfound.     Other  problems  with  authentication?   What  computerhosts  are  "trusted"  and  allow users to log in from othermachines without any further authentication?  Are  incorrectlogin   attempts  kept  and/or  monitored  so  as  to  allow                     February 19, 1991                           - 4 -administrators to keep track of any unusual activity?   Whatabout  "Trojan  horses" -- programs that can steal passwordsand the privileges that a user owns -- is there a program ora administrative method that detects a potential 'horse?     Fortunately UNIX systems again have  some  fairly  goodtools  to  aid in this fight.  Although finding simple pass-words is indeed a trivial task, forcing the users on a  sys-tem  to  use  passwords  that  are  harder  to guess is alsotrivial, by either modifying the mechanism  that  gets/givesthe  password  to  the  user,  and/or  by  having the systemadministrators run a simple password detector  periodically,and notifying users if their password is deemed too obvious.The crypt command, although proven  to  be  insecure  for  aknowledgeable and resourceful attacker ([Reed and Weinberger84], [Baldwin 86]), does offer an added shield against  mostunauthorized  users.   Logs  can  be kept of incorrect loginattempts, but as with most security measures, to  be  effec-tive  someone (usually the site administrator) must take thetime to examine the evidence.     4)  Bugs/Features.  Massive software designs  (such  asan  operating system) are usually the result of a team or ofteams of developers working together.   It  only  takes  oneprogrammer to make a mistake, and it will almost always hap-pen.  "Back doors" that  allow  unauthorized  entrances  aresometimes  purposefully  coded  in -- for debugging, mainte-nance, or other reasons.  And there  are  always  unexpectedside effects when thousands of people using the system startdoing strange (stupid?) things.  The best  kind  of  defenseagainst  this  is to report the problems to the developer asthey are discovered, and if possible, to also report  a  wayto fix the problem.  Unfortunately, in many cases the sourcecode is needed to make a bug fix,  and  especially  in  non-academic  areas,  this  is  simply  not available due to theprohibitive costs involved.  Combining this with the  reluc-tance of a (usually) commercial developer to admit any prob-lems with their product, and the end result  is  a  securityhole  that  will not be mended unless some kind of financialloss or gain is at stake -- for the developer  of  the  pro-duct, not yours!     5)  Ignorance.  Users who don't know or care can  be  aproblem  as  well.  Even if someone doesn't care about theirown security, they can  unwittingly  compromise  the  entiresystem   --   especially  if  they  are  a  user  with  highprivileges.  Administrators and  system  operators  are  notimmune to this either, but hopefully are better informed, orat least have access to a means of combating  this  dysfunc-tion.   It  may  also  be due to apathy, an unwillingness tolearn a new system, a lack of time to  explore  all  of  thefeatures  of  a  large system, or simply not enough computersavvy to learn more about a very complex system, and no  onewilling  to teach it to the user.  This problem is much like                     February 19, 1991                           - 5 -illiteracy; it is a never-ending battle that will  never  gocompletely  away.  And while a software toolkit such as COPScan  help  combat  this  problem  by  calling  attention  toneglected  or  misunderstood critical areas, by far and awaythe best weapon against this is education.  An educated userwill simply not make as many mistakes; and while it may seemimpractical to teach _all_ users about (even) the  fundamen-tals  of  computer  security,  think  of  all  the  time andresources wasted tracking down the mistakes that keep recur-ring time and time again.     6)  Unauthorized permissions or privileges.  Are  usersgiven _too much_ freedom?  Do new computer accounts have anydefault security at all, or are the new  users  expected  toknow  what  to do to protect their programs, data, and otherfiles.  System  files,  programs,  and  data  are  sometimesshipped  with  minimal or no protection when gotten straightfrom the manufacturer; someone at the installation site musthave  enough  knowledge to "tune" the system to be effectiveand safe.  Password, memory, and log files especially shouldall be carefully monitored, but unfortunately an experienceduser can often still find out any information they want withperseverance and a little luck.  This is where a system suchas COPS can really shine.  After a new system is configured,some  basic  flaws can be uncovered with just a small amountof effort.  New system problems that  somehow  slip  throughthe cracks of the site installers can be caught and modifiedbefore any serious problems result.   The  key  here  is  toprevent  your system users from getting a denial of computerservice that they need and deserve.  Service could mean any-thing from CPU time, response time, file space, or any othercommodity that a computer has to offer.     7)  Crackers/Hackers/Evil twin brothers.  Not  much  isneeded  on this subject, save to say that they are often notthe main problem.  Professional  evil-users  are  a  rarity;often harmful acts are done by users who "just wanted to seewhat would happen" or had no idea of  the  ramifications  oftheir acts.  Someone who is truly experienced is very diffi-cult to stop, and is certainly  outside  the  realm  of  anysoftware  security  tool  as  discussed in this paper.  For-tunately,  most  evil-doers  are  fairly  inexperienced  andignorant,  and when they make a mistake, a watchful adminis-trator can deal with a problem before it gets out  of  hand.Sometimes  they  can even reveal security problems that werepreviously undiscovered.   COPS  can  help  here  mostly  byreducing  an  attacker's options; the less holes to exploit,the better.     The COPS system attempts to help protect as many of theabove  items  as possible for a generic UNIX system.  In theproper UNIX spirit, instead of having a large  program  thatattempts  to solve every possible problem, it is composed ofseveral small programs that each check one or more potential

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美精品一区二区三区蜜桃| 久久蜜桃一区二区| 韩国av一区二区三区四区| 亚洲国产精华液网站w | 88在线观看91蜜桃国自产| 国产麻豆成人传媒免费观看| 亚洲五码中文字幕| 中文一区二区完整视频在线观看| 欧美日韩国产首页在线观看| 成人免费观看视频| 美美哒免费高清在线观看视频一区二区 | 国产精品1024久久| 亚洲电影欧美电影有声小说| 国产精品日产欧美久久久久| 日韩一区二区在线观看视频 | 中文字幕高清不卡| 日韩欧美二区三区| 欧美综合在线视频| av一区二区三区四区| 久久国产精品一区二区| 亚洲综合图片区| 成人免费一区二区三区视频 | 久久久久久久电影| 日韩欧美中文字幕一区| 欧美在线|欧美| zzijzzij亚洲日本少妇熟睡| 国产麻豆成人传媒免费观看| 久久国产日韩欧美精品| 日本午夜精品一区二区三区电影| 亚洲曰韩产成在线| 国产精品国产精品国产专区不片 | 性久久久久久久久久久久| 亚洲美女偷拍久久| 一色屋精品亚洲香蕉网站| 国产色爱av资源综合区| 久久久亚洲精华液精华液精华液| 日韩精品一区二区三区四区| 欧美精品v日韩精品v韩国精品v| 在线影院国内精品| 色女孩综合影院| 一本色道亚洲精品aⅴ| 91日韩精品一区| 色婷婷久久久亚洲一区二区三区| 91在线丨porny丨国产| 成人黄色综合网站| 99久久夜色精品国产网站| 成人动漫av在线| av电影一区二区| 91在线小视频| 欧美性受xxxx| 欧美三级乱人伦电影| 欧美日韩在线三级| 在线播放一区二区三区| 欧美一级高清片在线观看| 日韩一区二区三区在线| 色综合久久久久| 欧美探花视频资源| 欧美巨大另类极品videosbest| 欧美日韩mp4| 欧美一激情一区二区三区| 精品国产青草久久久久福利| 337p粉嫩大胆噜噜噜噜噜91av | 中文字幕一区二区三区乱码在线 | 国产原创一区二区| 国产 欧美在线| 色综合天天综合色综合av| 欧美日韩一区二区在线观看视频 | 色av综合在线| 91精品国产综合久久精品app| 欧美精品精品一区| 欧美精品一区二区三区在线播放| 亚洲综合清纯丝袜自拍| 丝袜a∨在线一区二区三区不卡| 午夜久久久影院| 国产精品资源网| 97久久超碰国产精品| 欧美日韩视频一区二区| 精品久久99ma| 亚洲天堂2014| 蜜桃av一区二区三区电影| 高清免费成人av| 欧美三级视频在线播放| 久久久亚洲精品一区二区三区 | 卡一卡二国产精品 | 99久久国产免费看| 在线成人午夜影院| 欧美国产激情一区二区三区蜜月| 亚洲精品老司机| 精品一区二区三区久久| 99国产欧美久久久精品| 日韩欧美一区二区三区在线| 欧美国产1区2区| 美国三级日本三级久久99| 91视频在线看| 久久色中文字幕| 亚洲bt欧美bt精品777| 国产aⅴ综合色| 欧美群妇大交群中文字幕| 欧美国产综合一区二区| 日韩avvvv在线播放| 成人小视频免费在线观看| 欧美一区二区视频在线观看2022 | 91精品综合久久久久久| 国产精品美女久久久久久久| 麻豆精品视频在线观看免费| 欧洲精品一区二区| 国产精品私人自拍| 毛片一区二区三区| 欧美日韩国产精选| 中文字幕制服丝袜成人av| 美女性感视频久久| 在线免费av一区| 国产精品久久久久永久免费观看| 免费观看91视频大全| 欧美日韩亚洲综合在线 欧美亚洲特黄一级 | 精品视频资源站| 国产精品久久久久精k8| 国产精品一二一区| 欧美一区二区三区系列电影| 一区二区三区加勒比av| voyeur盗摄精品| 国产欧美日韩在线| 国产一区二区中文字幕| 日韩精品一区二区在线观看| 秋霞成人午夜伦在线观看| 欧美日韩一区 二区 三区 久久精品| 国产精品色在线观看| 国产一区二区免费在线| 精品久久久久久久久久久久包黑料| 亚洲一区国产视频| 91豆麻精品91久久久久久| 亚洲免费视频中文字幕| 91在线视频网址| 亚洲丝袜精品丝袜在线| 99久久久久久| 亚洲欧美日韩国产手机在线| 91丨九色丨黑人外教| 日韩毛片在线免费观看| 色老综合老女人久久久| 一区二区三区自拍| 欧美亚洲免费在线一区| 午夜精品福利久久久| 欧美日韩免费高清一区色橹橹| 亚洲一区日韩精品中文字幕| 在线观看免费亚洲| 亚洲国产欧美日韩另类综合 | 99精品黄色片免费大全| 综合中文字幕亚洲| 色av成人天堂桃色av| 亚洲国产sm捆绑调教视频| 91精品国产综合久久久久久| 美国av一区二区| 国产免费成人在线视频| 91婷婷韩国欧美一区二区| 一区二区三区免费| 欧美日本免费一区二区三区| 五月激情综合色| 日韩精品中文字幕在线一区| 国产乱妇无码大片在线观看| 中文字幕第一页久久| 色婷婷综合久久久中文一区二区 | 欧美国产日本视频| 色综合久久久久网| 日本视频在线一区| 久久久久久久免费视频了| 99久久精品国产精品久久| 一区二区三区视频在线观看| 91精品在线观看入口| 国产精品亚洲а∨天堂免在线| 综合激情成人伊人| 777亚洲妇女| 成人影视亚洲图片在线| 亚洲美女在线一区| 精品久久久三级丝袜| www.欧美.com| 首页国产欧美久久| 久久亚洲春色中文字幕久久久| 91无套直看片红桃| 偷拍与自拍一区| 国产精品污www在线观看| 欧美三级午夜理伦三级中视频| 免费观看日韩电影| 亚洲男人的天堂在线aⅴ视频| 69堂精品视频| 成人av片在线观看| 蜜桃久久久久久| 伊人一区二区三区| 久久久久久日产精品| 3d动漫精品啪啪1区2区免费| 成人精品gif动图一区| 日韩综合小视频| 亚洲天堂福利av| 久久久五月婷婷| 欧美精品精品一区| 一本色道久久综合亚洲精品按摩| 国产精品影视天天线| 五月天网站亚洲| 亚洲人成7777| 欧美国产精品专区| 日韩精品中午字幕|