Skip to Main Content
Linux Server Security, Second Edition
book

Linux Server Security, Second Edition

by Michael D. Bauer
January 2005
Intermediate to advanced content levelIntermediate to advanced
544 pages
23h 44m
English
O'Reilly Media, Inc.
Content preview from Linux Server Security, Second Edition
This is the Title of the Book, eMatter Edition
Copyright © 2007 O’Reilly & Associates, Inc. All rights reserved.
Secure Shell Background and Basic Use
|
123
Be diligent in keeping up with the latest version of OpenSSH and, for
that matter, all other important software on your system! OpenSSH
has had several serious security vulnerabilities in recent years, includ-
ing remote-root vulnerabilities.
If you wish to run the Secure Shell daemon sshd (i.e., you wish to accept ssh connec-
tions from remote hosts), you’ll also need to create startup scripts. This has also been
thought of for you: the source distribution’s contrib directory contains some useful
goodies.
The contrib/redhat directory contains sshd.init, which can be copied to /etc/rc.d and
linked to in the appropriate runlevel directory (/etc/rc.d/rc2.d, etc.). It also contains
sshd.pam, which can be installed in /etc/pam if you use Pluggable Authentication
Modules (assuming you compiled OpenSSH with PAM support), and openssh.spec,
which can be used to create your very own OpenSSH RPM package. These files are
intended for use on Red Hat systems but will probably also work on Red Hat–
derived systems (Mandrake, Yellow Dog, etc.).
The contrib/suse directory also contains an openssh.spec file for creating OpenSSH
RPM packages for SUSE and an rc.sshd file to install in /etc/rc.d. Note, however, that
as of this writing, this particular rc.sshd file ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Linux: Powerful Server Administration

Linux: Powerful Server Administration

Uday Sawant, Oliver Pelz, Jonathan Hobson, William Leemans
Linux Server Hacks

Linux Server Hacks

Rob Flickenger
Linux Server Hacks, Volume Two

Linux Server Hacks, Volume Two

William von Hagen, Brian K. Jones

Publisher Resources

ISBN: 0596006705Supplemental ContentCatalog PageErrata