_ RU.UNIX (2:5077/15.22) _____________________________________________ RU.UNIX _
From : Konstantin Kolomiychuke 2:463/147 Mon 22 Sep 97 10:40
Subj : Re: Почитать бы про программирование, да это взять ?
________________________________________________________________________________
*** Answering a msg posted in area PERS_KK (Personal Echomail for KK).
Hello Dmitry!
Wednesday September 17 1997 16:49, Dmitry the Zuryanovich wrote to Vadim
Kostoglodoff:
DtZ> Пpо fork() пpоцитиpyйте, пожалyйста. И пpо ioctl с termio.
Загляни на http://www.immsp.kiev.ua/~kk/books/unix
DtZ> Чао! http://mir.glas.apc.org/~dz/730.html /73!O! B
Sincerely yours, Konstantin <[email protected]>.
--- GoldED 2.50+ * Origin: Logic Beauty $ Mail only station (2:463/147)
_ RU.LINUX (2:5077/15.22) ___________________________________________ RU.LINUX _
From : Alexey Mahotkin 2:5020/433 22 Oct 97 05:14:32
Subj : Нарыл две книжки про безопасность
________________________________________________________________________________
hail
Вот нарыл две книжки про безопасность. Одна старенькая, 1990 года, но, по-моему,
бегает и резвится как котенок.
Вторая -- оранжевая книга министерства обороны.
Обе доступны для фрека с 2:5020/433 00:00-08:00-ZMH и вскорости с
ftp://ftp.nf.ru/pub/techlib под нижеизложенными именами
=== Cut ===
******************************************************************************
* Area: Documentation: UNIX
******************************************************************************
ITSOYUS ARJ 46408 22.10.97 5:12 "Improving The Security Of Your UNIX
System"
ORANGEBK ARJ 75256 22.10.97 5:13 Orange Book: TRUSTED COMPUTER SYSTEM
EVALUATION CRITERIA
UNIXARCH ZIP 449641 30.09.97 0:02 Морис Дж. Бах "Архитектура ОС UNIX"
[Rus]
UNIXTUT ZIP 41517 13.11.96 4:15 UNIX Tutorial [Rus]
UNIX_FAQ ARJ 48387 23.04.97 14:26 UNIX F.A.Q.
=== Cut ===
Вот содержание первой. Скажите, стоит ли на нее тратить время?
=== Cut here ===
1 INTRODUCTION........................................... 1
1.1 UNIX Security.......................................... 1
1.2 The Internet Worm...................................... 2
1.3 Spies and Espionage.................................... 3
1.4 Other Break-Ins........................................ 4
1.5 Security is Important.................................. 4
2 IMPROVING SECURITY..................................... 5
2.1 Account Security....................................... 5
2.1.1 Passwords.............................................. 5
2.1.1.1 Selecting Passwords.................................... 6
2.1.1.2 Password Policies...................................... 8
2.1.1.3 Checking Password Security............................. 8
2.1.2 Expiration Dates....................................... 9
2.1.3 Guest Accounts......................................... 10
2.1.4 Accounts Without Passwords............................. 10
2.1.5 Group Accounts and Groups.............................. 10
2.1.6 Yellow Pages........................................... 11
2.2 Network Security....................................... 12
2.2.1 Trusted Hosts.......................................... 13
2.2.1.1 The hosts.equiv File................................... 13
2.2.1.2 The .rhosts File....................................... 14
2.2.2 Secure Terminals....................................... 15
2.2.3 The Network File System................................ 16
2.2.3.1 The exports File....................................... 16
2.2.3.2 The netgroup File...................................... 17
2.2.3.3 Restricting Super-User Access.......................... 18
2.2.4 FTP.................................................... 19
2.2.4.1 Trivial FTP............................................ 20
2.2.5 Mail................................................... 21
2.2.6 Finger................................................. 22
2.2.7 Modems and Terminal Servers............................ 23
2.2.8 Firewalls.............................................. 23
2.3 File System Security................................... 24
2.3.1 Setuid Shell Scripts................................... 25
2.3.2 The Sticky Bit on Directories.......................... 26
2.3.3 The Setgid Bit on Directories.......................... 26
2.3.4 The umask Value........................................ 27
2.3.5 Encrypting Files....................................... 27
2.3.6 Devices................................................ 28
2.4 Security Is Your Responsibility........................ 29
3 MONITORING SECURITY.................................... 31
3.1 Account Security....................................... 31
3.1.1 The lastlog File....................................... 31
3.1.2 The utmp and wtmp Files................................ 31
3.1.3 The acct File.......................................... 33
3.2 Network Security....................................... 34
3.2.1 The syslog Facility.................................... 34
3.2.2 The showmount Command.................................. 35
3.3 File System Security................................... 35
3.3.1 The find Command....................................... 36
3.3.1.1 Finding Setuid and Setgid Files........................ 36
3.3.1.2 Finding World-Writable Files........................... 38
3.3.1.3 Finding Unowned Files.................................. 38
3.3.1.4 Finding .rhosts Files.................................. 39
3.3.2 Checklists............................................. 39
3.3.3 Backups................................................ 40
3.4 Know Your System....................................... 41
3.4.1 The ps Command......................................... 41
3.4.2 The who and w Commands................................. 42
3.4.3 The ls Command......................................... 42
3.5 Keep Your Eyes Open.................................... 42
4 SOFTWARE FOR IMPROVING SECURITY........................ 45
4.1 Obtaining Fixes and New Versions....................... 45
4.1.1 Sun Fixes on UUNET..................................... 45
4.1.2 Berkeley Fixes......................................... 46
4.1.3 Simtel-20 and UUNET.................................... 47
4.1.4 Vendors................................................ 47
4.2 The npasswd Command.................................... 48
4.3 The COPS Package....................................... 48
4.4 Sun C2 Security Features............................... 49
4.5 Kerberos............................................... 50
5 KEEPING ABREAST OF THE BUGS............................ 51
5.1 The Computer Emergency Response Team................... 51
5.2 DDN Management Bulletins............................... 51
5.3 Security-Related Mailing Lists......................... 52
5.3.1 Security............................................... 52
5.3.2 RISKS.................................................. 52
5.3.3 TCP-IP................................................. 53
5.3.4 SUN-SPOTS, SUN-NETS, SUN-MANAGERS...................... 53
5.3.5 VIRUS-L................................................ 53
6 SUGGESTED READING...................................... 55
7 CONCLUSIONS............................................ 57
REFERENCES..................................................... 59
APPENDIX A - SECURITY CHECKLIST................................ 63
=== Cut here ===
Пусть тени обходят тебя стороной // carnage of time
* Crossposted in RU.LINUX
* Crossposted in RU.BOOKS.COMPUTING
... But from the forest and the field - here she comes - here she comes
--- GoldED/386 3.00.Alpha5+ * Origin: One of the SouBa group stations // HPG (2:5020/433)
_ RU.LINUX (2:5077/15.22) ___________________________________________ RU.LINUX _
From : Alexei Serebryakov 2:5034/1 30 Jun 98 12:09:52
Subj : Re: Социологический опрос
________________________________________________________________________________
Hi All!
In fido7.ru.linux Ivan Vanin <[email protected]> wrote:
>> 29 Jun 98 20:16, Artem Chuprina wrote to Ivan Vanin:
>> AC> Забей, да? Покупай оригиналы. Hешто в 5030 никто не завозит книжки
>> AC> О'Рылли? Да, в среднем $50 штука. А кому легко?
> Hе, для меня пока уж слишком обременительно. :) Тут раздумываю, может
попробую
Многие из сих книжек лежат на http://www.mcp.com/personal/
Приятно оформлены. :)
--
Alexei Serebryakov
Postmaster of Kostroma State Agricultural Academy
E-mail: [email protected]--- TIN [UNIX 1.3 unoff BETA release 960917] * Origin: Kostroma State Agricultural Academy. (2:5034/1@fidonet)