1 / 21

Linux and network security

A short two-part talk introducing: Basic Linux/Unix system administration ( CentOS /RHEL5) General Computer/Network security … for the G53SEC module. Nick Reynolds. Linux and network security. CentOS 5. Adding Accounts. Need entry in /etc/ passwd Need password in /etc/shadow

jada
Download Presentation

Linux and network security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. A short two-part talk introducing: Basic Linux/Unix system administration (CentOS/RHEL5) General Computer/Network security … for the G53SEC module. Nick Reynolds. Linux and network security CentOS 5

  2. Adding Accounts Need entry in /etc/passwd Need password in /etc/shadow Need home directory /home/[username] Correct Permissions $ man adduser $ adduser <username> $ man passwd $ passwd <username> Gui Alternative: redhat-config-users

  3. The Telnet Server (telnetd) Runs on receiving a connection man xinted Start with: chkconfig krb5-telnet on Stop with: chkconfig krb5-telnet off

  4. Configuring the Telnet Server Read manual page: man telnetd Set up accounts using: adduser Change account shell: chsh <username> (Tip: man ssh, chkconfig sshd on/off)

  5. Other Services • ftp server • httpd server (apache) • ssh server • …

  6. Network Configuration (Optional) redhat-config-network-gui

  7. Software Installs – Distribution Searching: yum search [string] Installing: yum install [package] Staying up to date: yum update Lots more!: man yum man yum.conf

  8. Monitoring The System Check logs: /var/log/* Monitor network activity: tcpdump Monitor processes: ps top

  9. Useful Commands Move between accounts: /bin/su – [username] Permissions and ownership: chmod <mode> <filename> chgrp <group> <filename> chown <user> <filename> Manual pages: man <command>

  10. Useful Resources CentOS5 (RedHat EE) Documentation http://netlab-gw.cs.nott.ac.uk/centos/5/docs/ http://ftp.cs.nott.ac.uk/centos/5/docs/ Linux Documentation Project http://newton.ex.ac.uk/LDP/ Search Engines!

  11. Final CentOS Notes Many ways to achieve the same result. Experiment within a user account. Don’t make to many changes in one go. Stay up to date (yum update) Advanced methods to configure servers: man pam

  12. General Network/Computer Security Encryption Access Permissions Who/what do you trust? Network Infrastructure

  13. Encryption

  14. Encryption Use secure Protocols Insecure Secure telnet ssh ftp scp imapimaps http https

  15. Access Permissions

  16. Access Permissions • File/directory permissions • Firewalls

  17. Who/What do you trust?

  18. Who/What do you trust? • DHCP? • IP Addresses?

  19. Network Infrastructure

  20. Network Infrastructure • Where does your data go? • Switches? Hubs? Which route? • Wi-fi

  21. The End!

More Related