亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? an architectural overview of unix network security.htm

?? 黑客培訓(xùn)教程
?? HTM
?? 第 1 頁 / 共 4 頁
字號:
<P><PRE>------------------------------------------------------------------|                             POLICY                             |------------------------------------------------------------------                                |                                |---------------------------------------------------|                   PERSONNEL                     |---------------------------------------------------                        |                        |---------------------------------|              LAN              |---------------------------------           Enet |           Enet |        -----------------        |  INTERNAL-D   |        -----------------           Enet |           Enet |-----------------   UNIX server with two Ethernet interfaces and| GATEWAY-SERVER|   custom software and configuration to implement-----------------   security policy (proxy services, auditing).     Enet |     Enet |-----------------| PACKET-FILTER |   cisco IGS router with access lists-----------------          X.25 |               |        -----------------        |   EXTERNAL-D  |     leased DID line to WAN service        -----------------               |               |        + Public Access +</PRE><P><H3>3.1  PUBLIC or NON-PRIVATE CONNECTIVITY</H3><P>     This layer of the model characterizes all external physicalconnectivity to your network.  This normally includes equipment andtelephone lines that you do not own or do not have control over.   The point of illustrating this is to show this part of theconnectivity as part of the overall model.  At some point at thislayer, equipment that you do own or have control of will connect tothe external or public network.  Your own policy and implementationmust take the dynamics of this connectivity into account.<P><H3>3.2  ROUTER (FIREWALL PHYSICAL LAYER)</H3><P>     This layer of the model depicts the point at which yourphysical connectivity and your data stream become one.  Withoutgoing into hysterics about all of what a router is and does; thepoint is that at this layer, your electrical connectivity, whichcontains encapsulated data in some form, becomes information.  Yourrouter will decode the electrical signals from the physicalconnectivity and turn it into packets of encapsulated data for anyone of various networking protocols.  Within this packet ofinformation is contained the source address, destination address,protocol ID, the datagram itself, etc.<P>     Many routers available today include the capability to createaccess control lists (ACL) for either one or both of the outgoingand the incoming data interfaces [1][5].  This normally includesthe capability to filter out or allow in packets based upon sourceaddress, destination address, protocol (such as TCP, UDP, ICMP,etc.) and specific port numbers (TCP and UDP).  This provides youthe flexibility to design your own network access control policy,enforced at the router, before access to your internal networkresources is required or granted.  In this way, routers alone areoften used to provide the firewall functionality.<P>     While the router ACL capability offers a big advantage, itshould not be your only protection because, basically the routeronly provides protection at the first three levels of the OSI model(Physical, Data Link, and Network layers).  The rest of the layersof this firewall model discuss ways to address functional securityof the other four OSI layers (Transport, Session, Presentation, andApplication).<P>     Availability:  I only have personal experience with CISCOrouters, however I've been told that Wellfleet and Proteon routersalso have this feature.  There may be other vendors as well, butthey probably all implement it a little differently.<P><H3>3.3  DUAL-HOMED UNIX GATEWAY SERVER (FIREWALL LOGICAL LAYER)</H3><P>     This layer of the model illustrated the point at which yourvarious IP packets (to and from the router) are used by the networkoperating system (such as TCP/IP under UNIX) to provide theservices identified in the upper four layers of the OSI model.  Ofcourse, this UNIX server is actually doing work at the bottom threeOSI layers also, in order to communicate with:  (a) the router onone side of the server, and (b) the local-area network on the otherside of the server.<P>     At this point the router is already implementing your securitypolicy for the bottom three OSI layers, now it's up to your dual-homed [10] UNIX server (acting as a gateway) to implement yoursecurity policy relating to functions of the network for the upperfour OSI layers.  This can mean a lot of things.  Depending on whatyour security policy says you are supposed to enforce, what you doat this point varies.  The following tools and methods are exampleof some of the tools and methods (functionality) available today:<P><H4>3.3.1  TCP Wrapper</H4><P>     The "TCP WRAPPER" tool [2] provides monitoring and controlof network services.  Essentially, what happens is that youconfigure inetd on your dual-homed gateway to run the TCP WRAPPERsoftware whenever certain services (ports) are connected to.   Depending on how you configure TCP WRAPPER, it will then LOGinformation about the connection and then actually start theintended SERVER program that the connection was intended for.   Since you have the source to the tool, you can modify it to domore depending on what your needs are. For example, you may wantTCP WRAPPER to connect the user to a proxy service instead of theactual program, then have your proxy software handle thetransaction in whatever way your security requirements demand.<P>     Availability:  This is available from several sources, butto ensure that you get the most recent copy that CERT hasverified, you should use anonymous FTP to retrieve it fromcert.org in ~/pub/tools/tcp_wrappers/tcp_wrappers.*.<P><H4>3.3.2  SOCKS library and sockd</H4><P>     The "sockd" and "SOCKS Library" [3] provide another way toimplement a "TCP Wrapper."  It is not intended to make the systemit runs on secure, but rather to centralize ("firewall") allexternal internet services.  The sockd process is started byinetd whenever a connection is requested for certain services,and then only allows connections from approved hosts (listed in aconfiguration file).  The sockd also will LOG information aboutthe connection.  You can use the Socks Library to modify theclient software to directly utilize the sockd for outgoingconnections also, but this is described as very tedious and ofcourse requires you to have the source to those client programs.<P>     Availability:  The socks package, which in addition toincluding both the daemon and the library, has a pre-modified FTPclient and finger client; it is available via anonymous FTP froms1.gov in ~/pub as socks.tar.Z.  Contact the authors for more   information.  David Koblas (koblas@netcom.com) or Michelle R.Koblas (mkoblas@nas.nasa.gov).<P><H4>3.3.3  Kernel_Wrap for SunOS RPC via Shared Libraries</H4><P>     Essentially this is a wrapper for SunOS daemons that use RPC[4], such as portmap, ypserv, ypbind, ypupdated, mountd,pwdauthd, etc.  To utilize this, you must have SunOS 4.1 orhigher and must have the capability to rebuild your sharedlibraries (but, you don't need the source to your entire system).   Essentially what happens is that you modify the function callsthat the kernel uses to establish RPC connections, such asaccept(), recvfrom() and recvmsg().  Since these calls aremaintained in the shared libraries, you have access to modifythem without rewriting the kernel.<P>     Availability:  The secured C library package to implementthis is available via anonymous FTP from eecs.nwu.edu in~/pub/securelib.<P><H4>3.3.4  Swatch</H4><P>     Simple WATCHER [6] is really two things, it is a programused to parse through the myriad of LOG data generated by thevarious security programs, in particular "syslog."  But, it'smore than that.  It is fully configurable with triggers(actions), so that while it is continuously monitoring the LOG in"real-time," it can take actions based upon certain high-priorityevents that you tell it to watch for.  To get full use of this,you will need to modify your network service daemons such as ftpdand telnetd so that enhanced logging is added to syslog, to feedSWATCH.<P>     Availability:  The SWATCH source and documentation isavailable via anonymous FTP from sierra.stanford.edu in~/pub/sources.<P><H4>3.3.5  Controlled Access Point (CAP)</H4><P>     This is more of a method or protocol definition than aspecific product.  CAP [7] provides a network mechanism intendedto reduce the risk of:  password guessing, probing for well-knownaccounts with default passwords, trusted host rlogin, andpassword capture by network snooping.  It is really a design fora variation or enhancement to the general firewall approach toconnecting two or more networks.  In the paper describing thisthere is an example of two local nets, one a secure segment withan authentication service, and the other an unsecure segment.Both communicate with each other via a CAP, while there is arouter for communication to public networks connected on theunsecure side of the CAP.  The CAP is essentially a router withadditional functionality to detect incoming connection requests,intercept the user authentication process, and invoke theauthentication server.<p>        Availability:  Unknown.  Contact the authors for moreinformation.  J. David Thompson (thompsond@orvb.saic.com) andKate Arndt (karndt@mitre.org).<P><H4>3.3.6  Mail Gateway</H4><P>     This is more of a procedure than a software package(although there are packages designed just to do this).  Iincluded this to maintain continuity with what I'm trying toillustrate in this paper.  This really should be applied to allnetwork services that require external connectivity (meaning anycommunication over non-private or non-secure channels).  In thesimplest implementation of this, you configure your router tofilter packets so that all mail traffic (SMTP protocol forexample) is only allowed to and from one host, the "MailGateway."  Likewise, your DNS and MTA software will need to beconfigured for this as well.<P><H4>3.3.7  Tty Wrapper</H4><P>     This is one of my pet ideas.  I have not seen something likethis around, and I'll probably never have time to develop it.   But, essentially this would be like "TCP Wrapper," only it isdesigned specifically for serial communications.  After that, wewill need a "Pseudo-Tty Wrapper," (something more than justfiltering out the telnet port) but that is for another day.<P><H4>3.3.8  HSC-Gatekeeper</H4><P>     The HSC-Gatekeeper from Herve' Schauer Consultants [8], is acomplete solution to both layers 1 and 2 of this firewall model.   It consists of a thorough firewall methodology and authenticationserver, providing pass-thru FTP and TELNET services.  The author(Herve Schauer) noted that HSC-Gatekeeper is alone to be able tooffer fully transparent authentication for these services.  Ihave not had personal experience with HSC's products, so I cannotmake a conclusive statement about it other than to comment thatthe description of it in HSC's paper "An Internet Gatekeeper"(available in the USENIX Proceedings) depicts it (IMHO) as a verycomprehensive solution.<P>     Availability:  For more information, contact Herve Schauervia e-mail at Herve.Schauer@hsc-sec.fr.<P><H4>3.3.9  AT&T Inet</H4><P>     Since I discussed HSC's firewall solution, I thought it onlyfair to mention AT&T's INET Gateway.  For a complete descriptionof AT&T's internal solution, you should read Bill Cheswick'spaper [9] "The Design of a Secure Internet Gateway."  Foradditional information, contact the author via e-mail atches@research.att.com.  I do not believe that AT&T is in thebusiness of selling this solution to anyone, but the paperdescribes in good detail how it was done.  It should provide the   puritan firewaller additional depth to the problems and possiblesolutions to an Internet firewall approach.<P><H3>3.4  COMPUTERS ON THE LOCAL-AREA NETWORK</H3><P>     This layer of the model depicts the place where you you arepotentially at the greatest risk.  The previous layers discussedways to protect access to this layer of the network.  This layerincludes all of you local-area network, workstations, fileservers, data bases, and other network resources.  This is alsothe point at which your user community sits at their desks anduse the network.<P>     There are several things to be concerned about here, accessto this layer in the first place notwithstanding.  Just because

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲免费在线视频一区 二区| 一片黄亚洲嫩模| 在线观看av不卡| 美女一区二区视频| 亚洲视频中文字幕| 精品动漫一区二区三区在线观看| 欧洲一区二区三区免费视频| 国产黑丝在线一区二区三区| 亚洲福利视频三区| 国产精品免费免费| 欧美精品一区二区在线观看| 欧美日韩免费观看一区二区三区| 成人午夜视频在线观看| 热久久一区二区| 亚洲一区二区三区在线看| 国产精品三级av在线播放| 日韩精品一区二区三区蜜臀| 欧美日韩国产一级片| 91同城在线观看| 丁香另类激情小说| 国产精品自产自拍| 激情综合网激情| 麻豆一区二区三| 丝袜亚洲另类丝袜在线| 亚洲制服丝袜在线| 亚洲视频精选在线| 国产精品女主播av| 亚洲国产高清不卡| 日本一区二区三区四区| 久久久久久久久蜜桃| 欧美变态tickle挠乳网站| 日韩欧美一区二区不卡| 日韩精品最新网址| 欧美一级搡bbbb搡bbbb| 91精品国产综合久久久蜜臀图片| 欧美在线你懂得| 欧美色大人视频| 欧美日韩亚洲综合| 欧美日韩一区二区在线视频| 精品视频一区二区三区免费| 欧美三电影在线| 欧美麻豆精品久久久久久| 欧美视频在线观看一区二区| 色婷婷综合激情| 日本乱码高清不卡字幕| 在线观看欧美日本| 欧美二区乱c少妇| 日韩一区二区免费在线电影| 日韩欧美国产1| 精品sm在线观看| 国产情人综合久久777777| 国产精品久久毛片av大全日韩| 欧美国产日产图区| 亚洲欧美一区二区三区孕妇| 亚洲精品视频免费看| 亚洲第一会所有码转帖| 日韩电影一区二区三区| 久久99国产精品久久99 | 韩国v欧美v日本v亚洲v| 精品一区二区三区日韩| 国产东北露脸精品视频| 成人激情小说乱人伦| 色婷婷激情久久| 日韩一卡二卡三卡国产欧美| 久久蜜桃av一区精品变态类天堂| 久久青草国产手机看片福利盒子| 国产精品午夜久久| 亚洲乱码国产乱码精品精98午夜 | 国产欧美日韩中文久久| 亚洲欧洲精品一区二区三区| 亚洲国产日韩一区二区| 青青草国产精品97视觉盛宴| 成人在线一区二区三区| 色嗨嗨av一区二区三区| 欧美一区二区久久| 国产精品嫩草影院com| 天堂午夜影视日韩欧美一区二区| 国产在线精品一区二区夜色| 99久精品国产| 欧美大度的电影原声| 一区在线中文字幕| 日本不卡1234视频| 成人v精品蜜桃久久一区| 欧美猛男gaygay网站| 国产蜜臀97一区二区三区| 亚洲动漫第一页| 国产精品1区二区.| 欧美日韩一区精品| 国产精品无码永久免费888| 天堂一区二区在线免费观看| 成人美女视频在线观看18| 欧美高清dvd| 亚洲欧洲精品一区二区三区不卡| 青娱乐精品在线视频| av在线播放不卡| 欧美成人vps| 亚洲成av人片观看| 波多野结衣中文字幕一区| 日韩午夜三级在线| 亚洲一级在线观看| 丁香婷婷综合激情五月色| 欧美精选午夜久久久乱码6080| 亚洲国产精品精华液2区45| 天堂久久久久va久久久久| www.亚洲免费av| 欧美精品一区二区三区蜜臀| 日韩影院免费视频| 色婷婷狠狠综合| 国产精品网友自拍| 国产在线国偷精品产拍免费yy| 欧美日韩久久不卡| 一区二区三区中文在线| 成人福利在线看| 欧美精品一区视频| 美腿丝袜在线亚洲一区| 色婷婷综合在线| 综合久久国产九一剧情麻豆| 国产精品66部| 欧美精品一区二区三区一线天视频 | 欧美激情一区二区三区蜜桃视频 | 一区二区高清视频在线观看| 成人午夜av影视| 久久久久久99久久久精品网站| 日韩精品免费视频人成| 在线一区二区三区四区| 最新欧美精品一区二区三区| 国产成人免费在线观看| 久久久精品免费观看| 久久成人羞羞网站| 日韩欧美国产综合在线一区二区三区 | 在线看国产一区| 亚洲精品免费在线| 一本在线高清不卡dvd| 国产精品国产成人国产三级| 风流少妇一区二区| 国产精品无人区| 波多野洁衣一区| 中文字幕亚洲在| 波多野结衣在线aⅴ中文字幕不卡| 久久精品男人天堂av| 国产成人8x视频一区二区| 国产欧美精品日韩区二区麻豆天美| 激情综合五月婷婷| 国产网站一区二区| av色综合久久天堂av综合| 国产精品毛片久久久久久| 91在线免费看| 一区二区理论电影在线观看| 欧美日韩中文另类| 免费在线观看不卡| 国产午夜亚洲精品羞羞网站| 成人免费福利片| 一区二区三区四区在线| 欧美午夜宅男影院| 日韩成人免费看| 欧美成人午夜电影| 国产a精品视频| 亚洲色图视频免费播放| 欧美日韩精品三区| 麻豆成人免费电影| 国产性天天综合网| 色999日韩国产欧美一区二区| 亚洲国产日韩综合久久精品| 欧美大片在线观看一区二区| 另类的小说在线视频另类成人小视频在线 | 精品无码三级在线观看视频| 国产女同互慰高潮91漫画| 91蝌蚪porny| 日韩电影在线免费| 欧美国产1区2区| 欧美日韩国产大片| 国产精品18久久久久久vr| 国产精品人妖ts系列视频| 欧美男生操女生| 成人午夜又粗又硬又大| 亚洲成a人v欧美综合天堂下载| 欧美精品一区二区三区在线播放| 99视频一区二区| 日本不卡一区二区三区高清视频| 日本一二三不卡| 91麻豆精品国产91久久久久| 成人激情黄色小说| 日韩高清在线电影| 国产精品人妖ts系列视频| 91精品国产色综合久久不卡电影| 国产精品66部| 天天色 色综合| 国产精品乱人伦中文| 欧美一级在线视频| 日本精品裸体写真集在线观看| 免费一级欧美片在线观看| 日韩理论片一区二区| 欧美成人精精品一区二区频| 日本道色综合久久| 国产一区二区女| 日韩精品一级中文字幕精品视频免费观看 | 欧美三级日韩三级国产三级| 国产激情偷乱视频一区二区三区| 亚洲成人自拍偷拍| 亚洲视频在线观看一区|