Host Security

Your host must be secure. Simple security steps include preventing remote logins and leaving the /etc/hosts.equiv and individual users' ~/.rhosts files empty (or not having them at all). Complex security steps include installing IPSec for VPNs between hosts. Many common security measures are between these two extremes. A few of these follow. See Table C-1 on page 1421 for URLs.

  • Although potentially tricky to implement and manage, Intrusion Detection Systems (IDSs) are an excellent way to keep an eye on the integrity of a device. An IDS can warn of possible attempts at subverting security on the host on which it runs. The great-granddaddy of intrusion detection systems is tripwire. This host-based system checks modification times ...

Get A Practical Guide to Red Hat® Linux® 8 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.