SUSE's RPM packages are gpg-signed. The key used by SUSE for signing is:
ID:9C800ACA 2000-10-19 SUSE Package Signing Key <[email protected]>
Key fingerprint = 79C1 79B2 E1C8 20C1 890F 9994 A84E DAE8 9C80 0ACA
The command
rpm --checksig package.rpm
shows whether the checksum
and the signature of an uninstalled package are correct. Find the key on the first
CD of the distribution and on most key servers worldwide.
• Check your backups of user and system files regularly. Consider that if you do not
test whether the backup works, it might actually be worthless.
• Check your log files. Whenever possible, write a small script to search for suspicious
entries. Admittedly, this is not exactly a trivial task. In the end, only you can know
which entries are unusual and which are not.
• Use
tcp_wrapper
to restrict access to the individual services running on your
machine, so you have explicit control over which IP addresses can connect to a
service. For further information regarding
tcp_wrapper
, consult the manual
pages of tcpd and hosts_access (
man 8 tcpd
,
man hosts_access
).
• Use SuSEfirewall to enhance the security provided by
tcpd
(
tcp_wrapper
).
• Design your security measures to be redundant: a message seen twice is much
better than no message at all.
• If you use suspend to disk, consider to configure the suspend image encryption
using the
configure-suspend-encryption.sh
script. The program creates
the key, copies it to
/etc/suspend.key
, and modifies
/etc/suspend.conf
to use encryption for suspend images.
Security and Confidentiality
13
Содержание LINUX ENTERPRISE DESKTOP 11
Страница 1: ...SUSE Linux Enterprise Server www novell com 11 March 17 2009 Security Guide...
Страница 9: ...32 7 Managing Audit Event Records Using Keys 433 33 Useful Resources 435...
Страница 10: ......
Страница 29: ...Part I Authentication...
Страница 30: ......
Страница 55: ...Figure 4 2 YaST LDAP Server Configuration LDAP A Directory Service 41...
Страница 126: ......
Страница 127: ...Part II Local Security...
Страница 128: ......
Страница 158: ......
Страница 173: ...Part III Network Security...
Страница 174: ......
Страница 194: ......
Страница 197: ...Figure 16 2 Scenario 2 Figure 16 3 Scenario 3 Configuring VPN Server 183...
Страница 210: ......
Страница 228: ......
Страница 229: ...Part IV Confining Privileges with Novell AppArmor...
Страница 230: ......
Страница 274: ......
Страница 300: ......
Страница 328: ......
Страница 340: ......
Страница 342: ......
Страница 386: ......
Страница 387: ...Part V The Linux Audit Framework...
Страница 388: ......