Chapter 4. Common Hacking by Subsystem

   


In this chapter, common known weaknesses and important configuration techniques of common subsystems will be discussed. You cannot live without some of these services, such as Sendmail and DNS. Others are inherently insecure, and must not be used outside a secure and controlled environment, if security is to be maintained.

The topics covered in this chapter include:

  • "NFS, mountd, and portmap" on page 172

  • "Sendmail" on page 174

  • "Telnet" on page 190

  • "FTP" on page 190

  • "The rsh, rcp, rexec, and rlogin Services" on page 198

  • "DNS (named, a.k.a. BIND)" on page 201

  • "POP and IMAP Servers" on page 204

  • "Doing the Samba" on page 208

  • "Stop Squid from Inking Out Their Trail" on page 227

  • "The syslogd Service" on page 230

  • "The print Service (lpd)" on page 231

  • "The ident Service" on page 231

  • "INND and News" on page 232

  • "Protecting Your DNS Registration" on page 233


       
    Top


    Real World Linux Security Prentice Hall Ptr Open Source Technology Series
    Real World Linux Security Prentice Hall Ptr Open Source Technology Series
    ISBN: N/A
    EAN: N/A
    Year: 2002
    Pages: 260

    flylib.com © 2008-2017.
    If you may any questions please contact us: flylib@qtcs.net