Linux Security Cookbook

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]

kadmin utility 

    adding Kerberos principals to IMAP mail server 

    adding users to existing realm 

    modifying KDC database for host 

    running on new host 

    setting server to start at boot 

kadmind command (Kerberos) 

kaserver (Andrew Filesystem) 

kdb5_util command (Kerberos) 

KDC  [See Key Distribution Center]

KDE applications, certificate storage 

Kerberos authentication 

    in /etc/pam.d startup file 

    hosts, adding to existing realm 

    IMAP, using with 

    Key Distribution Centers (KDCs) 

    ksu 

    ksu command 

    PAM, using with 

    without passwords 

    POP, using with 

    setting up MIT Kerberos-5 KDC 

    sharing root privileges via 

    SSH, using with 

        debugging 

        SSH-1 protocol 

    Telnet, using with 

    users, adding to existing realm 

    web site (MIT) 

KerberosTgtPassing (in sshd_config) 

kernel

    /proc files and 

    collection of messages from by system logger 

    enabling source address verification 

    IP forwarding flag 

    ipchains (Versions 2.2 and up) 

    iptables (Versions 2.4 and up) 

    process information recorded on exit 

    runtime integrity checkers 

    source address verification, enabling 

Key Distribution Center (KDC), setting up for MIT Kerberos-5 

keyring files (GnuPG) 

    adding keys to 

    viewing keys on 

        information listed for keys 

keys, cryptographic  [See also cryptographic authentication]

    adding to GnuPG keyring 

    backing up GnuPG private key 

    dummy keypairs for imapd and pop3d 

    encrypting files for others with GnuPG 

    generating key pair for GnuPG 

    GnuPG, viewing on your keyring 

    key pairs in public-key encryption 

    keyring files for GnuPG keys 

    obtaining from keyserver and verifying 

    OpenSSH programs for creating/using 

    PGP keys, using in GnuPG 

    revoking a public key 

    sharing public keys securely 

    Tripwire 

    viewing on GnuPG keyring 

keyserver

    adding key to 

    informing that a public keys is no longer valid 

    obtaining keys from 

    uploading new signatures to 

killing processes

    authorizing users to kill via sudo command 

    pidof command, using 

    terminating SSH agent on logout 

kinit command (Kerberos)  2nd  3rd 

    -f option (forwardable credentials) 

klist command (Kerberos)  2nd 

known hosts database (OpenSSH server) 

kpasswd command (Kerberos) 

krb5.conf file, copying to new Kerberos host 

krb5.keytab file 

krb5kdc 

kstat (integrity checker) 

ksu (Kerberized su)

    authentication via Kerberos 

    sharing root privileges via 

Категории