Chapter 19. Security
Terms you’ll need to understand:
✓ | Chain |
✓ | Firewall |
✓ | Host security |
✓ | Masquerade |
✓ | Rule |
✓ | Secure shell |
✓ | TCP wrappers |
Techniques you’ll need to master:
✓ | Configuring hosts for security |
✓ | Setting and changing user password options |
✓ | Finding security risks |
✓ | Verifying package authenticity |
✓ | Configuring basic ipchains |
✓ | Configuring basic iptables |
✓ | Viewing current iptables’ configurations |
✓ | Setting up and configuring SSH |
✓ | Signing in, copying files, and setting boot options for SSH |
Using TCP Wrappers to Secure a Service
Though covered in detail elsewhere, TCP wrappers are an important part of system security and require a quick review.
The majority of system services or daemons use the libwrap.a
library for TCP wrappers functionality. The concept of TCP wrappers ...
Get LPIC I Exam Cram™ 2: Linux Professional Institute Certification Exams 101 and 102 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.