1 0 Access Control Lists in Linux
131
10.1
Traditional File Permissions . . . . . . . . . . . . . . . . . . . .
131
10.2
Advantages of ACLs . . . . . . . . . . . . . . . . . . . . . . .
133
10.3
Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . .
133
10.4
Handling ACLs . . . . . . . . . . . . . . . . . . . . . . . . . .
134
10.5
ACL Support in Applications . . . . . . . . . . . . . . . . . . . .
142
10.6
For More Information . . . . . . . . . . . . . . . . . . . . . .
143
1 1 Encrypting Partitions and Files
145
11.1
Setting Up an Encrypted File System with YaST . . . . . . . . . . . .
146
11.2
Using Encrypted Home Directories . . . . . . . . . . . . . . . . .
149
11.3
Using vi to Encrypt Single ASCII Text Files . . . . . . . . . . . . . .
150
1 2 Certificate Store
151
12.1
Activating Certificate Store . . . . . . . . . . . . . . . . . . . .
151
12.2
Importing Certificates . . . . . . . . . . . . . . . . . . . . . .
152
1 3 Intrusion Detection with AIDE
153
13.1
Setting Up a AIDE Database . . . . . . . . . . . . . . . . . . . .
153
13.2
Local AIDE Checks . . . . . . . . . . . . . . . . . . . . . . . .
156
13.3
System Independent Checking . . . . . . . . . . . . . . . . . . .
157
13.4
For More Information . . . . . . . . . . . . . . . . . . . . . .
158
Part III
Network Security
159
1 4 SSH: Secure Network Operations
161
14.1
The OpenSSH Package . . . . . . . . . . . . . . . . . . . . . .
161
14.2
The ssh Program . . . . . . . . . . . . . . . . . . . . . . . . .
162
14.3
scp—Secure Copy . . . . . . . . . . . . . . . . . . . . . . . .
162
14.4
sftp—Secure File Transfer . . . . . . . . . . . . . . . . . . . . .
163
14.5
The SSH Daemon (sshd)—Server-Side . . . . . . . . . . . . . . . .
163
14.6
SSH Authentication Mechanisms . . . . . . . . . . . . . . . . . .
164
14.7
X, Authentication, and Forwarding Mechanisms . . . . . . . . . . . .
166
14.8
Configuring An SSH Daemon with YaST . . . . . . . . . . . . . . .
167
1 5 Masquerading and Firewalls
169
15.1
Packet Filtering with iptables . . . . . . . . . . . . . . . . . . . .
169
15.2
Masquerading Basics . . . . . . . . . . . . . . . . . . . . . . .
172
15.3
Firewalling Basics . . . . . . . . . . . . . . . . . . . . . . . .
173
Содержание LINUX ENTERPRISE DESKTOP 11
Страница 1: ...SUSE Linux Enterprise Server www novell com 11 March 17 2009 Security Guide...
Страница 9: ...32 7 Managing Audit Event Records Using Keys 433 33 Useful Resources 435...
Страница 10: ......
Страница 29: ...Part I Authentication...
Страница 30: ......
Страница 55: ...Figure 4 2 YaST LDAP Server Configuration LDAP A Directory Service 41...
Страница 126: ......
Страница 127: ...Part II Local Security...
Страница 128: ......
Страница 158: ......
Страница 173: ...Part III Network Security...
Страница 174: ......
Страница 194: ......
Страница 197: ...Figure 16 2 Scenario 2 Figure 16 3 Scenario 3 Configuring VPN Server 183...
Страница 210: ......
Страница 228: ......
Страница 229: ...Part IV Confining Privileges with Novell AppArmor...
Страница 230: ......
Страница 274: ......
Страница 300: ......
Страница 328: ......
Страница 340: ......
Страница 342: ......
Страница 386: ......
Страница 387: ...Part V The Linux Audit Framework...
Страница 388: ......