0399-0400.html

来自「linux-unix130.linux.and.unix.ebooks130 l」· HTML 代码 · 共 240 行

HTML
240
字号




<HTML>

<HEAD>

<TITLE>Developer.com - Online Reference Library - 0672311739:RED HAT LINUX 2ND EDITION:System Security</TITLE>

<META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW">
<SCRIPT>
<!--
function displayWindow(url, width, height) {
        var Win = window.open(url,"displayWindow",'width=' + width +
',height=' + height + ',resizable=1,scrollbars=yes');
}
//-->
</SCRIPT>
</HEAD>

 -->




<!-- ISBN=0672311739 //-->

<!-- TITLE=RED HAT LINUX 2ND EDITION //-->

<!-- AUTHOR=DAVID PITTS ET AL //-->

<!-- PUBLISHER=MACMILLAN //-->

<!-- IMPRINT=SAMS PUBLISHING //-->

<!-- PUBLICATION DATE=1998 //-->

<!-- CHAPTER=20 //-->

<!-- PAGES=0395-0410 //-->

<!-- UNASSIGNED1 //-->

<!-- UNASSIGNED2 //-->









<P><CENTER>

<a href="0395-0398.html">Previous</A> | <a href="../ewtoc.html">Table of Contents</A> | <a href="0401-0402.html">Next</A>

</CENTER></P>



<A NAME="PAGENUM-399"><P>Page 399</P></A>





<TABLE WIDTH="360">

<TR><TD>

xp-beta

</TD><TD>

An application gateway of X11 protocol. It is designed to

be used at a site that has a firewall and uses SOCKS

and/or CERN WWW Proxy.

</TD></TR>

<TR><TD>

xroute

</TD><TD>

Routes X packets from one machine to another.

</TD></TR>

</TABLE>











<P>There are, as you can see, a few tools for your use. If you want a second reason for looking

at these tools, keep in mind that people trying to break into your system know how to, and

do, use these tools. This is where the knowledge

comes in.

</P>









<H4><A NAME="ch20_ 6">





Knowledge Gathering

</A></H4>









<P>Someone once said a little knowledge goes a long way. As stated in the chapter opening, all

the bells and whistles can be there, but if they are not active, they do no good. It is,

therefore, important that the system staff, the users, and the keepers of the sacred root password all

follow the security procedures put in place&#151;that they gather all the knowledge necessary to

adhere to those procedures.

</P>









<P>I was at the bank the other day, filling out an application for a car loan. The person

assisting me at the bank was at a copy machine in another room (I could see her through the

window). Another banking person, obviously new, could be heard from his office. He was having

problems logging in to the bank's computer. He came out and looked around for the bank

employee helping me. He did not see her. I got his attention and pointed him toward the

copy area. He thanked me and went to her and asked for the system's password because he

could not remember it. She could not remember the password. He went back to his desk, checked

a list of telephone numbers hanging on the wall by his phone, entered something into the

computer, and was in. About that time, my bank person came out of the copy area, stuck her

head in his office, and said that she recalled the password. He said he had it. She asked if he

had done with the password what they normally do. He looked at his phone list and said yes.

She left and returned to me at her desk.

</P>









<P>This scenario is true. The unfortunate thing about it, besides the fact that at least two

customers, the person with the employee trying to log in to the system, and I, saw the whole thing,

is that they didn't know, nor did they care that others might be listening. To them it was

business as usual. What can be learned from this? DON'T WRITE DOWN PASSWORDS!!!!!

</P>









<P>Not only should passwords not be written down, but they should also not

be easily associated with the user. I'll give you two examples that illustrate this point. The first involves a

wonderful man from the Middle East with whom I worked on a client site. He has three boys. As

a proud father, he talks about them often. When referring to them individually, he uses

their first names. When referring to them cumulatively, he calls them &quot;three boys.&quot; His

password (actually, he uses the same password for all his accounts) is

threeboys.

</P>









<P>The second example comes from one of the sweetest people I have met in the industry. She

is an unmarried person with no children. On her desk is a little stuffed cow, named Chelsea. I

do

</P>



<A NAME="PAGENUM-400"><P>Page 400</P></A>











<P>not remember the significance of the name, but I remember that she really likes dairy

cows. Her password is, you guessed it, chelsea. These peoples' passwords are probably

still threeboys and chelsea.

</P>











<P>File security is another big issue. The use of

umask (file creation masks) should be mandated. It should also be set to the maximum amount possible. It is easy to change a particular file to

give someone else access to it. It is difficult, if not impossible, to know who is looking at your

files. The sensitivity of the data, of course, would certainly determine the exact level of security

placed on the file. In extremely sensitive cases, such as employees' personnel records, it might be

necessary to also encrypt the files.

</P>









<P>After an audit has been done, you should have an excellent idea of what security issues

you need to be aware of and which issues you need to track. The next section shows you how

to track intruders.

</P>









<H3><A NAME="ch20_ 7">

Danger, Will Robins, Danger!

</A></H3>









<P>I used to love watching Lost in Space. On that show there was a life-sized robot that

would declare, &quot;Danger, Will Robins, danger!&quot; when there was some danger. Unfortunately, there

is no such robot to declare when there is danger on our systems. (There are some tools, but

they are nowhere near as consistent as the robot was!)

</P>









<P>If you have a lot of extra disk space, you can turn on auditing. Auditing records all user

connects and disconnects from your system. If you don't rely on auditing, you should scan

the logs often. As an alternative, it might be worthwhile to write a quick summary script that

gives an account of the amount of time each user is on the system.

</P>









<P>Unfortunately, there are too many holes to block them all. Measures can be placed to plug

the biggest of them, but locking a computer in a vault, allowing no one access to it and no

connectivity outside of the vault, is the only way to keep a system secure. The bottom line is, if

users want into your system, and they are good enough, they can get in. What you have to do

is prepare for the worst.

</P>









<H4><A NAME="ch20_ 8">





Preparing for the Worst

</A></H4>









<P>There are basically three things that can be done to a system, short of physically removing

it. These are stealing data, destroying data, and providing easier access for next time.

Physically, an intruder can destroy or remove equipment, or, if very creative, could even add

hardware. Short of chaining the system to the desk, there is not much that can be done about theft.

The physical security is beyond the scope of this book, anyway. What is within the scope of

this book is dealing with the data, and dealing with additional access measures.

</P>









<P>Data should be backed up on a regular basis. The backed-up information, depending on

how secure it needs to be, can be kept on a shelf next to the system or kept in a locked vault at

an alternative location. This is the best way of getting back data that has been destroyed.

</P>



<P><CENTER>

<a href="0395-0398.html">Previous</A> | <a href="../ewtoc.html">Table of Contents</A> | <a href="0401-0402.html">Next</A>

</CENTER></P>











</td>
</tr>
</table>

<!-- begin footer information -->





</body></html>

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?