Main index

Introducing UNIX and Linux


Maintaining your Linux OS

Overview
Basic management
      Passwords
      Checking storage space
      Checking processes
      Managing users
      Shutting down and restarting your computer
      Automating tasks
Linux file management
      File compression and archiving tools
      File managers
      File splitters
Linux networking
      Getting started
      MAC and IP addresses
      Domain names
      Adding a Linux host to an existing network
      Building a private network
      Configuring the network interface
Security
Uninstalling Linux
Summary

Security

Whatever anyone tells you about security, unfortunately the only way to be completely sure that your computer is safe from a security breach is to disconnect it from the Internet and never to load any program or document that supports macros. This is clearly not going to be practical and so the answer is to find a number of ways of making security breaches to your networked computer more difficult. A number of possibilities are listed below.

  • It is possible to set up your system so that logins to your machine can only be done from other computers on your own local network and not from machines on the Internet. To do this you need to look at the files /etc/hosts.allow and /etc/hosts.deny.

  • You should make sure that your root password is secure. It is no use using short dictionary words, as these can easily be broken using simple password generator programs. Do not be tempted to set up users with blank passwords; it might seem like a good idea at the time, but this is very insecure. Finally, if you have more than one server, then you should make sure that the passwords are different for each. This ensures that if one machine is breached you do not compromise the whole system.

  • Denying host access will not completely secure your system as it is possible to intercept messages from your machine, strip out the important data such as the identifiers of other machines on your network, and then by a mechanism known as 'spoofing' pretend to be another machine. The best way of getting around this problem is to use the ssh tool when connecting to other machines in your network. This ensures that the data packets sent between machines are encrypted. If you use ssh-level security for all your network traffic, then you make spoofing much harder (ssh can be downloaded for free from www.ssh.com).

  • Another way of maintaining security is to monitor the system log files. In the directory /var/log you will find a number of files in which information regarding all the system and network information on your machine is stored. While this information takes a bit of interpretation, you will find that you can use it to study most of the activity on your system and on your network.

  • Firewalls provide a means of protection between private devices such as computers or local networks and the wider Internet. The simplest form of firewall protection is to set up a Linux machine with a single Internet connection (through an Ethernet card or modem) which acts as a buffer between the Internet and any local network. This machine then blocks direct communication between the local network and the Internet (in either direction). The advantage of this approach is that anything inside the firewall is protected; the disadvantage is that it is a little complicated to set up - you need to configure the machine for two Ethernet cards and then connect the two cards through an IP-chain to filter the data between them.


Copyright © 2002 Mike Joy, Stephen Jarvis and Michael Luck