YOU ARE DOWNLOADING DOCUMENT

Please tick the box to continue:

Transcript
Page 1: Linux and network security

LINUX AND NETWORK SECURITY

A short two-part talk introducing:

•Basic Linux/Unix system administration (CentOS/RHEL5)•General Computer/Network security

… for the G53SEC module.

Nick Reynolds.

CentOS 5

Page 2: Linux and network security

Adding AccountsNeed entry in

/etc/passwdNeed password in

/etc/shadowNeed home directory

/home/[username]Correct Permissions

$ man adduser$ adduser <username>

$ man passwd$ passwd <username>

Gui Alternative:redhat-config-users

Page 3: Linux and network security

The Telnet Server (telnetd)Runs on receiving a connection man xintedStart with:

chkconfig krb5-telnet onStop with:chkconfig krb5-telnet off

Page 4: Linux and network security

Configuring the Telnet ServerRead manual page:man telnetd

Set up accounts using:adduser

Change account shell:chsh <username>

(Tip: man ssh, chkconfig sshd on/off)

Page 5: Linux and network security

Other Services ftp server httpd server (apache) ssh server …

Page 6: Linux and network security

Network Configuration (Optional)redhat-config-network-gui

Page 7: Linux and network security

Software Installs – DistributionSearching:yum search [string]

Installing:yum install [package]

Staying up to date:yum update

Lots more!:man yum man yum.conf

Page 8: Linux and network security

Monitoring The SystemCheck logs:/var/log/*

Monitor network activity:tcpdump

Monitor processes:pstop

Page 9: Linux and network security

Useful CommandsMove between accounts:/bin/su – [username]

Permissions and ownership:chmod <mode> <filename>chgrp <group> <filename>chown <user> <filename>

Manual pages:man <command>

Page 10: Linux and network security

Useful ResourcesCentOS5 (RedHat EE) Documentation

http://netlab-gw.cs.nott.ac.uk/centos/5/docs/http://ftp.cs.nott.ac.uk/centos/5/docs/

Linux Documentation Projecthttp://newton.ex.ac.uk/LDP/

Search Engines!

Page 11: Linux and network security

Final CentOS NotesMany ways to achieve the same result.Experiment within a user account.Don’t make to many changes in one go.Stay up to date (yum update)Advanced methods to configure servers:man pam

Page 12: Linux and network security

General Network/Computer SecurityEncryptionAccess PermissionsWho/what do you trust?Network Infrastructure

Page 13: Linux and network security

Encryption

Page 14: Linux and network security

EncryptionUse secure Protocols

Insecure Secure

telnet sshftp scpimap imapshttp https

Page 15: Linux and network security

Access Permissions

Page 16: Linux and network security

Access Permissions File/directory permissions

Firewalls

Page 17: Linux and network security

Who/What do you trust?

Page 18: Linux and network security

Who/What do you trust? DHCP?

IP Addresses?

Page 19: Linux and network security

Network Infrastructure

Page 20: Linux and network security

Network Infrastructure Where does your data go?

Switches? Hubs? Which route?

Wi-fi

Page 21: Linux and network security

The End!


Related Documents