Table of Contents
Introduction.......................................................................................................................................... i
1. Document Conventions.........................................................................................................ii
2. More to Come ...................................................................................................................... iv
2.1. Send in Your Feedback ......................................................................................... iv
I. A General Introduction to Security ................................................................................................ i
1. Security Overview................................................................................................................. 1
1.1. What is Computer Security? .................................................................................. 1
1.2. Security Controls ................................................................................................... 5
1.3. Conclusion ............................................................................................................. 6
2. Attackers and Vulnerabilities ................................................................................................ 7
2.1. A Quick History of Hackers .................................................................................. 7
2.2. Threats to Network Security .................................................................................. 7
2.3. Threats to Server Security...................................................................................... 8
2.4. Threats to Workstation and Home PC Security ................................................... 10
II. Configuring Red Hat Enterprise Linux for Security................................................................ 11
3. Security Updates ................................................................................................................. 13
3.1. Updating Packages............................................................................................... 13
4. Workstation Security........................................................................................................... 19
4.1. Evaluating Workstation Security ......................................................................... 19
4.2. BIOS and Boot Loader Security .......................................................................... 19
4.3. Password Security................................................................................................ 22
4.4. Administrative Controls....................................................................................... 27
4.5. Available Network Services................................................................................. 33
4.6. Personal Firewalls ................................................................................................ 35
4.7. Security Enhanced Communication Tools........................................................... 36
5. Server Security.................................................................................................................... 37
5.1. Securing Services With TCP Wrappers and xinetd .......................................... 37
5.2. Securing Portmap................................................................................................. 40
5.3. Securing NIS........................................................................................................ 40
5.4. Securing NFS ....................................................................................................... 42
5.5. Securing the Apache HTTP Server...................................................................... 43
5.6. Securing FTP ....................................................................................................... 44
5.7. Securing Sendmail ............................................................................................... 47
5.8. Verifying Which Ports Are Listening .................................................................. 48
6. Virtual Private Networks..................................................................................................... 51
6.1. VPNs and Red Hat Enterprise Linux ................................................................... 51
6.2. Crypto IP Encapsulation (CIPE).......................................................................... 51
6.3. Why Use CIPE? ................................................................................................... 52
6.4. CIPE Installation.................................................................................................. 53
6.5. CIPE Server Configuration .................................................................................. 53
6.6. Configuring Clients for CIPE .............................................................................. 54
6.7. Customizing CIPE ............................................................................................... 56
6.8. CIPE Key Management ....................................................................................... 57
6.9. IPsec..................................................................................................................... 57
6.10. IPsec Installation................................................................................................ 58
6.11. IPsec Host-to-Host Configuration...................................................................... 58
6.12. IPsec Network-to-Network configuration.......................................................... 60
7. Firewalls.............................................................................................................................. 65
7.1. Netfilter and IPTables .......................................................................................... 66
7.2. Using IPTables ..................................................................................................... 66
7.3. Common iptables Filtering.............................................................................. 68
7.4. FORWARD and NAT Rules..................................................................................... 69
7.5. DMZs and iptables .......................................................................................... 70