Security System
Security System
(Topic 110)
Topic objectives
• The following Exam objectives
– 110.1 Perform security administration tasks
– 110.2 Setup host security
– 110.3 Securing data with encryption
Topic agenda
• Administering Network Security
• Administering Local Security
• Configuring SSH
• Using GPG
Administering Network Security
• Configuring xinetd
– Xinetd: extended super daemon
• functionality of the legacy inetd
• security options that are similar to those of TCP
wrappers
– Setting Up xinetd
• /etc/xinetd.conf
• /etc/xinetd.d/
Administering Network Security
• Configuring xinetd
– $ cat /etc/xinetd.d/rsync
# default: off
[...]
service rsync
{
disable = yes
flags = IPv6
socket_type = stream
wait = no
user = root
server = /usr/bin/rsync
server_args = --daemon
log_on_failure += USERID
}
Administering Network Security
• Configuring xinetd
Administering Network Security
• Using fuser:
– Determining the processes currently using a
particular network port.
– what process is currently using network port
22, -v option on the fuser command to see all
of the processes’ information
$fuser 22/tcp
$fuser -v 22/tcp
Administering Local Security
• Securing Passwords
• Limiting root Access
• Auditing User Access
• Setting Login, Process, and Memory
Limits
• Locating SUID/SGID Files
Administering Local Security
• Securing Passwords
– Looking at Password Risks
– Change Passwords Frequently
– Use Shadow Passwords
• pwconv
– Keep Passwords Secret
– Use Secure Remote Login Protocols
• telnet, ftp, ssh, sftp
– Be Alert to Shoulder Surfing
• Using public terminals
– Use Each Password on Just One System
– Be Alert to Social Engineering
Administering Local Security
• Securing Passwords
• Limiting root Access
• Auditing User Access
• Setting Login, Process, and Memory
Limits
• Locating SUID/SGID Files
Administering Local Security
• Securing Passwords
• Limiting root Access
• Auditing User Access
• Setting Login, Process, and Memory
Limits
• Locating SUID/SGID Files
Administering Local Security
• Securing Passwords
• Limiting root Access
• Auditing User Access
• Setting Login, Process, and Memory
Limits
• Locating SUID/SGID Files
Administering Local Security
• Securing Passwords
• Limiting root Access
• Auditing User Access
• Setting Login, Process, and Memory
Limits
• Locating SUID/SGID Files
Administering Local Security
• Generating Keys
• Importing Keys
• Revoking a Key
• Encrypting and Decrypting Data
• Signing Messages and Verifying
Signatures
Using GPG
• Generating Keys
– To generate keys, you use the gpg program
with its --gen-key option:
• $ gpg --gen-key
– Once you’ve generated your keys, you can
export your public key:
• $ gpg --export name > gpg.pub
Using GPG
• Importing Keys
– To encrypt a fi le you send to others, you must
obtain their public keys:
• $ gpg --import filename
• $ gpg --list-keys
– Once you’ve generated your keys, you can
export your public key:
• $ gpg --export name > gpg.pub
Using GPG
• Importing Keys
– Sometimes, you might have cause to revoke
a public key:
• $ gpg --gen-revoke [email protected]
• Encrypting and Decrypting Data
– To encrypt data
• $ gpg --out encrypted-file --recipient uid --
armor --encrypt original-file
– you can reverse the encryption
• $ gpg --out decrypted-file --decrypt encrypted-
file
Using GPG
service
systemctl
chkconfig
update-rc.d
init
Checkpoint
Which of the following is true concerning
passwords on Linux? (Choose all that apply.)
A. Passwords should be stored in the /etc/shadow file.
B. Passwords should be stored in the /etc/passwd file.
C. Passwords are stored as salted hashes.
D. Use the pwconv utility to move passwords to the
/etc/shadow file.
E. Use the passwd command to change your password.
Checkpoint
Yoyo is a new system administrator for Virgin
Galactic. She needs to use super user privileges to
perform several of her duties. What should be
done?Give Yoyo the root account password
shared by the system admin team and have her
log into the root account via the GUI.Give Yoyo the
root account password shared by the system
admin team and have her log into the root account
via the su - command.Give Yoyo the root account
password shared by the system admin team and
have her issue commands that need super user
privileges via the su -c command.Set Yoyo up in
the /etc/sudoers file and have her issue commands