Linux Security Cookbook

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]

packet filtering

    Linux, website for 

    stateful 

    stateless 

packet sniffers

    dsniff, for switched networks 

    enabling unconfigured network interfaces with ifconfig 

    network intrusion detection system (NIDS) 

    ngrep, using for 

    observing network traffic with 

        promiscuous mode on network interfaces 

        unconfigured interface for stealth sniffer 

    Snort, using as 

packets, refusing with DROP or REJECT 

PAM (Pluggable Authentication Modules) 

    access control lists (ACLs), creating  2nd 

    controlling imapd password validation 

    creating PAM-aware application 

    enforcing password strength 

    imapd validation of passwords, controlling 

    Kerberos, using with 

    Linux Developers Guide 

    Linux-PAM, web site 

    modules 

pam_stack module 

passphrases

    backing up for GnuPG private keys 

    caching SSH private keys to avoid typing 

    forcing erasure by Mailcrypt with mc-deactivate-passwd 

    secret, for GnuPG public keys 

    SSH 

passwd file, DES-based crypt( ) hashes in 

passwd program 

passwords

    authorizing changes via sudo 

    dsniff program

        captured from FTP and Telnet sessions 

        using libnids to reassemble 

    encrypting files with 

    enforcing strength with PAM 

    interactive authentication without (ssh-agent) 

    keeping track of 

    Kerberos (kpasswd command) 

    local, authentication via (Kerberos with PAM) 

    login, testing for strength 

        CrackLib, using 

        John the Ripper, using 

    mail servers (IMAP/POP), protection by SSL 

    master password for KDC database 

        storage of 

    protection with SSH 

    root 

    sudo command

        bypassing password authentication 

        forcing authentication with 

    testing and monitoring on system 

PATH environment variable, splitting with Perl script 

pathnames

    mutation in attacks against protocols 

    in remote file copying 

paths

    search path, testing 

    to server executable (inetd.conf) 

pattern matching  [See regular expressions]

payload, observing 

PEM format (certificates) 

    converting DER format to 

per_source keyword (xinetd) 

performance, effects of promiscuous mode 

period (.), in search path 

Perl scripts

    CA.pl 

    canonical hostname for SSH client, finding 

    CrackLib, using with module 

    functions provided by system logger API 

    merging lastlog databases from several systems 

    merging log files 

    process accounting records, reading and unpacking 

    writing system log entries  2nd 

permissions  2nd 

    changes since last Tripwire check 

    examining carefully for security 

    inability to track with manual integrity check 

    log files 

    preventing directory listings 

    Snort logging directory 

    world-writable files and directories, finding 

PermitRootLogin (sshd_config) 

PGP (Pretty Good Privacy) 

    Evolution mailer, using with 

    integrating with MH 

    keys, using in GnuPG operations 

    setting in mutt mailer headers 

PID (process ID)

    adding to system log messages 

    looking up 

pidof command, killing all processes with given name 

Pine

    securing POP/IMAP with SSH and Pine 

    securing POP/IMAP with SSL and 

    sending/receiving encrypted email 

PinePGP 

pings

    nmap, use of TCP and ICMP pings for host discovery 

    preventing responses to 

plaintext keys 

    including in system backups, security risks of 

    using with forced command 

Pluggable Authentication Modules  [See PAM]

policies

    default, for ipchains and iptables 

    Tripwire 

        displaying 

        generating in human-readable format and adding file to 

        modifying 

        signing with site key 

POP

    capturing messages from with dsniff mailsnarf command 

    enabling POP daemon within xinetd or inetd 

    Kerberos authentication, using with 

    mail server, running with SSL 

    running mail server with SSL 

    securing email session with SSL and mutt 

    securing mail server with SSH 

    securing mail server with SSH and Pine 

    securing mail server with stunnel and SSL 

    securing with SSL and pine 

    STLS command 

    testing SSL connection to server 

port forwarding

    disabling for authorized keys 

    SSH 

    tunneling TCP session through SSH 

port numbers, conversion to service names by netstat and lsof 

port scanners, presence evidenced by SYN_RECV state 

portmappers

    displaying registrations with lsof +M 

    querying from a different machine 

ports

    assigned to RPC services 

    default, IMAP and POP over SSL 

    nonstandard, used by network protocols 

    SSL-port on mail servers 

    testing for open 

        nc command, using 

        nmap command, port scanning capabilities 

        port scans with nmap 

        TCP port, testing with telnet connection 

        TCP RST packets returned by firewalls blocking ports 

        UDP ports, problems with 

preprocessors, Snort

    alert messages produced by 

    enabling or tuning 

prerotate and postrotate scripts 

Pretty Good Privacy  [See PGP]

principals, Kerberos 

    adding another principal to your ~/.k5login file 

    adding new with ank command 

    adding to IMAP service on server host 

    database for

        records for users and hosts 

    database, creating for KDC 

    host principal, testing for new host 

    ksu authentication 

    new host, adding to KDC database 

    POP, adding to 

    setting up with admin privileges and host principal for KDC host 

priority

    levels for Snort alerts 

    for system messages 

private keys  [See cryptographic authentication]2nd 

    GnuPG, backing up 

    PGP, exporting and using in GnuPG 

process accounting 

    displaying all executed commands 

        lastcomm utility, using 

    dump-acct command 

    enabling with accton command 

process IDs

    adding to system log messages 

    looking up 

process substitution 

processes

    /proc/<pid> directories 

    killing

        with pidof command 

        with sudo command 

    listing

        all open files (and network connections) for all processes 

        all open files for specific 

        command name (lsof -c) 

        by ID (lsof -p) 

        network connections for all 

        by username (lsof -u) 

    owned by others, examination by superuser 

    that use RPC services, examining with losf +M 

    tracing 

        strace command, using 

promiscuous mode (for network interfaces) 

    enabling for specific interfaces with ifconfig 

    performance and 

    setting for Snort 

prosum (integrity checker) 

protocol tree for selected packet (Ethereal) 

protocols

    attacks on, detection by Snort preprocessors 

    insecure, detecting use of with ngrep 

    matching a filter expression, searching network traffic for 

    network, detecting insecure 

ps command, reading /proc files 

psacct RPM  2nd 

pseudo-ttys 

    disabling allocation of for authorized keys 

    forcing ssh to allocate 

PubkeyAuthentication (sshd_config) 

public keys

    adding to GnuPG keyring 

    inserting into current mail buffer with mc-insert-public-key 

    keyserver, storing and retrieving with 

    listing for GnuPG 

    PGP, exporting and using in GnuPG 

public-key authentication  [See cryptographic authentication]

public-key encryption 

    decrypting files encrypted with GNUPG 

    expiration for keys 

    find method, use by 

    GnuPG  2nd 

        bit length of keys 

        generating key pair 

        secret passphrase for keys 

    sharing public keys 

    unique identifier for keys 

Категории