HP-UX 11i Security
暫譯: HP-UX 11i 安全性

Chris Wong

  • 出版商: Prentice Hall
  • 出版日期: 2001-10-04
  • 定價: $1,400
  • 售價: 5.0$700
  • 語言: 英文
  • 頁數: 480
  • 裝訂: Paperback
  • ISBN: 0130330620
  • ISBN-13: 9780130330628
  • 相關分類: 資訊安全
  • 立即出貨(限量) (庫存=3)

買這商品的人也買了...

商品描述

The total HP-UX 11i security reference and implementation guide

  • Thorough coverage of HP-UX 11i's powerful new host security features
  • Monitoring system access, activity, and change
  • 10 ways to gain root access-what every system administrator needs to know
  • Implementing Kerberos, PAM, IPSec, SCM, SCR, and IDS/9000

No other book offers this much HP-UX-specific security coverage! In this authoritative, comprehensive administrator's guide, leading HP-UX consultant Chris Wong covers every key aspect of HP-UX host security. Wong introduces "hot-off-the-press" HP-UX 11i capabilities and techniques for keeping mission-critical systems safe-even when firewalls fail and backdoors are discovered. Coverage includes:

  • Understanding and addressing your key vulnerabilities
  • 10 ways to gain root access-and what to do about them
  • Managing users, groups, files, and directories from a security perspective
  • Controlling access to the system and securing key services
  • Safely distributing root privileges
  • Using HP-UX software to enhance system security: SCM, SCR, Restricted SAM, IDS/9000, and the Security Patch Check Tool
  • Security techniques for the multi-host environment: Berkeley programs, SSH, NIS, NIS+, LDAP, Kerberos, PAM, and IPSec/9000
  • Tools and techniques for monitoring system activity and change
  • Using public-domain programs: SARA, Tripwire, sudo, and logrotate

HP-UX 11i Security is the essential security resource for every HP-UX system administrator, from novice to advanced level—and for every consultant, manager, security specialist, and e-business professional responsible for protecting HP-UX applications and data.

Table of Contents

Foreword.
Preface.
1. Ready or Not, Here I Come! @AHEADS= Attacks. What Is Needed to Compromise a System? Ten Ways To Become root. What Can Happen When the System Is Compromised? Protection. A Letter to the CIO. Policies.
2. Passwords, Users, and Groups.

The password File. The Group File. Tools. Security Risk of the /etc/passwd File. Trusted System. Trusted Systems and Tools. Password Policies. What Makes a Good Password? Passwords and Multiple Hosts. User Management. Group Maintenance. Writing Scripts. The /etc/default/security File.


3. Disks, File Systems, and Permissions.

Disks. Logical Volume Manager. VERITAS Volume Manager. File Systems. The mount Command. File Permissions. Access Control Lists. The chatr Command and the Executable Stack. Quotas. The NAS and SAN.


4. System Access.

The Internet Daemon. Modems. The /etc/dialups and /etc/d_passwd Files. Secure Web Console. Physical Access and Boot Authentication. Guardian Service Processor. Restrictions for Users.


5. Multi-Host Environments.

The “r” Commands. SSH. NIS. NIS+. LDAP. DNS and BIND. DHCP. NFS. CIFS/9000.


6. Distributing root Privileges.

SUID/SGID Scripts and Programs. Restricted SAM. Sudo. ServiceControl Manager. OpenView. Comparison of Tools.


7. ServiceControl Manager.

Installation of the Central Management Server. Adding Nodes to the SCM Cluster. ServiceControl Manager Graphical User Interface. Adding Users. Role Assignments. Tools. Argument Limitations. Web Interface. SCM Log Files. SCM and Security. Why Use SCM?


8. Internet Daemon Services.

The Internet Daemon Startup. /etc/inetd.conf File. /etc/services File. /etc/protocols File. /var/adm/inetd.sec File. Understanding Socket Connections. Tcpwrappers. Telnet. File Transfer Protocol. Anonymous FTP. Trivial FTP. Finger. Other Internet Services. Running Other Services from inetd.


9. Kerberos.

What is Kerberos Doing? Installing Kerberos. Configuring Kerberos. Kerberos Utilities. Kerberos and HP-UX 10.20. Kerberos and rlogin. Kerberos and the -P Option. More about PAM.


10. IPSec/9000.

IPSec Configuration. What Is Happening? IPSec Tunnel Mode. Using IPSec/9000 as a Firewall. IP Number and Mask. Managing Keys on IPSec/9000.


11. Monitoring System Activity.

syslog Daemon. The syslog File. The btmp File. The wtmp File. The /etc/utmp File. The sulog File. The rc.log File. Shell History. Open Source Log Tools and Utilities. Log Rotation. Auditing. Accounting. Utilizing Performance Data. Monitoring System Resources. Managing System Resources.


12. Monitoring System Changes.

System Configuration Repository. Tripwire.


13. NetAction.

HP VirtualVault. Extranet VPN. HP Speedcard. HP PKI. Intrusion Detection System/9000.


14. Building a Bastion Host by Kevin Steves.

What Is a Bastion Host? Methodology. Sample Blueprint.


15. Checklist, Security Patches, and Miscellaneous Topics.

The Checklist. The HP-UX Security Patch Check Tool. The HP-UX Security Book Web Site. Continuing Your Knowledge. Mail. Protecting Your System Against “Ten Ways to Become root” . The Bastille Hardening System. IPFilter/9000.


Index.

商品描述(中文翻譯)

HP-UX 11i 安全參考與實作指南

- 徹底涵蓋 HP-UX 11i 強大的新主機安全功能
- 監控系統訪問、活動和變更
- 獲取 root 訪問的 10 種方法 - 每位系統管理員必須知道的
- 實作 Kerberos、PAM、IPSec、SCM、SCR 和 IDS/9000

沒有其他書籍提供如此多的 HP-UX 專屬安全內容!在這本權威且全面的管理指南中,資深 HP-UX 顧問 Chris Wong 涵蓋了 HP-UX 主機安全的每個關鍵方面。Wong 介紹了「最新消息」的 HP-UX 11i 功能和技術,以確保關鍵任務系統的安全,即使在防火牆失效和後門被發現的情況下。內容包括:

- 理解並解決您的關鍵漏洞
- 獲取 root 訪問的 10 種方法 - 以及該如何處理
- 從安全的角度管理用戶、群組、檔案和目錄
- 控制系統訪問並保護關鍵服務
- 安全地分配 root 權限
- 使用 HP-UX 軟體增強系統安全:SCM、SCR、限制性 SAM、IDS/9000 和安全補丁檢查工具
- 多主機環境的安全技術:Berkeley 程式、SSH、NIS、NIS+、LDAP、Kerberos、PAM 和 IPSec/9000
- 監控系統活動和變更的工具和技術
- 使用公共領域程式:SARA、Tripwire、sudo 和 logrotate

《HP-UX 11i 安全》是每位 HP-UX 系統管理員的必備安全資源,無論是初學者還是進階使用者,亦適用於每位顧問、經理、安全專家和負責保護 HP-UX 應用程式及數據的電子商務專業人士。

目錄

前言。
序言。
1. 準備好還是沒準備好,我來了!@AHEADS= 攻擊。妨害系統所需的條件是什麼?成為 root 的十種方法。當系統被妨害時會發生什麼?保護。給 CIO 的信。政策。
2. 密碼、用戶和群組。

密碼檔案。群組檔案。工具。/etc/passwd 檔案的安全風險。受信系統。受信系統和工具。密碼政策。什麼是好密碼?密碼與多主機。用戶管理。群組維護。撰寫腳本。/etc/default/security 檔案。

3. 磁碟、檔案系統和權限。

磁碟。邏輯卷管理器。VERITAS 卷管理器。檔案系統。mount 命令。檔案權限。存取控制清單。chatr 命令和可執行堆疊。配額。NAS 和 SAN。

4. 系統訪問。

網際網路守護進程。調製解調器。/etc/dialups 和 /etc/d_passwd 檔案。安全網頁控制台。物理訪問和啟動身份驗證。守護服務處理器。用戶的限制。

5. 多主機環境。

“r” 命令。SSH。NIS。NIS+。LDAP。DNS 和 BIND。DHCP。NFS。CIFS/9000。

6. 分配 root 權限。

SUID/SGID 腳本和程式。限制性 SAM。Sudo。服務控制管理器。OpenView。工具比較。

7. 服務控制管理器。

中央管理伺服器的安裝。將節點添加到 SCM 集群。服務控制管理器圖形用戶介面。添加用戶。角色分配。工具。參數限制。網頁介面。SCM 日誌檔案。SCM 和安全性。為什麼使用 SCM?

8. 網際網路守護進程服務。

網際網路守護進程啟動。/etc/inetd.conf 檔案。/etc/services 檔案。/etc/protocols 檔案。/var/adm/inetd.sec 檔案。理解套接字連接。Tcpwrappers。Telnet。檔案傳輸協定。匿名 FTP。簡易 FTP。Finger。其他網際網路服務。從 inetd 執行其他服務。

9. Kerberos。

Kerberos 在做什麼?安裝 Kerberos。配置 Kerberos。Kerberos 工具。Kerberos 和 HP-UX 10.20。Kerberos 和 rlogin。Kerberos 和 -P 選項。更多關於 PAM 的資訊。

10. IPSec/9000。

IPSec 配置。發生了什麼?IPSec 隧道模式。將 IPSec/9000 用作防火牆。IP 位址和掩碼。在 IPSec/9000 上管理金鑰。

11. 監控系統活動。

syslog 守護進程。syslog 檔案。btmp 檔案。wtmp 檔案。/etc/utmp 檔案。sulog 檔案。rc.log 檔案。Shell 歷史。開源日誌工具和實用程式。日誌輪替。審計。會計。利用性能數據。監控系統資源。管理系統資源。

12. 監控系統變更。

系統配置庫。Tripwire。

13. NetAction。

HP VirtualVault。Extranet VPN。HP Speedcard。HP PKI。入侵檢測系統/9000。

14. 建立堡壘主機,作者 Kevin Steves。

什麼是堡壘主機?方法論。範本藍圖。

15. 清單、安全補丁和其他主題。

清單。HP-UX 安全補丁檢查工具。HP-UX 安全書籍網站。持續增進您的知識。郵件。保護您的系統免受「成為 root 的十種方法」的影響。Bastille 強化系統。IPFilter/9000。

索引。