diff options
author | dd <dd@FreeBSD.org> | 2001-07-09 09:54:33 +0000 |
---|---|---|
committer | dd <dd@FreeBSD.org> | 2001-07-09 09:54:33 +0000 |
commit | eaa6ee03b8ac1955cc60d99d119a22318d1baa61 (patch) | |
tree | ab3b6200f079a95b6a4418f399032563aa053a74 /share/man/man7/security.7 | |
parent | 8636b161b333b18525b6f5ffc5139079c29c0d63 (diff) | |
download | FreeBSD-src-eaa6ee03b8ac1955cc60d99d119a22318d1baa61.zip FreeBSD-src-eaa6ee03b8ac1955cc60d99d119a22318d1baa61.tar.gz |
mdoc(7) police: remove extraneous .Pp before and/or after .Sh.
Diffstat (limited to 'share/man/man7/security.7')
-rw-r--r-- | share/man/man7/security.7 | 10 |
1 files changed, 0 insertions, 10 deletions
diff --git a/share/man/man7/security.7 b/share/man/man7/security.7 index e375903..705569b 100644 --- a/share/man/man7/security.7 +++ b/share/man/man7/security.7 @@ -11,7 +11,6 @@ .Nm security .Nd introduction to security under FreeBSD .Sh DESCRIPTION -.Pp Security is a function that begins and ends with the system administrator. While all .Bx @@ -134,7 +133,6 @@ Quick detection of inappropriate changes made to the system Paranoia .El .Sh SECURING THE ROOT ACCOUNT AND SECURING STAFF ACCOUNTS -.Pp Don't bother securing staff accounts if you haven't secured the root account. Most systems have a password assigned to the root account. The first thing you do is assume that the password is @@ -232,7 +230,6 @@ be made to timeout after a while, but the kerberos system can require that the user choose a new password after a certain period of time .Pq say, once a month . .Sh SECURING ROOT - ROOT-RUN SERVERS AND SUID/SGID BINARIES -.Pp The prudent sysadmin only runs the servers he needs to, no more, no less. Be aware that third party servers are often the most bug-prone. For example, running an old version of imapd or popper is like giving a universal root @@ -302,7 +299,6 @@ potentially generate a data stream that causes the user's terminal to echo a command, which is then run as that user. .Sh SECURING USER ACCOUNTS -.Pp User accounts are usually the most difficult to secure. While you can impose Draconian access restrictions on your staff and *-out their passwords, you may not be able to do so with any general user accounts you might have. If @@ -313,7 +309,6 @@ more problematic due to the extra administration and technical support required, but still a very good solution compared to a crypted password file. .Sh SECURING THE PASSWORD FILE -.Pp The only sure fire way is to *-out as many passwords as you can and use ssh or kerberos for access to those accounts. Even though the crypted password file @@ -330,7 +325,6 @@ see below .Pc . .Sh SECURING THE KERNEL CORE, RAW DEVICES, AND FILESYSTEMS -.Pp If an attacker breaks root he can do just about anything, but there are certain conveniences. For example, most modern kernels have a packet sniffing device driver built in. Under @@ -372,7 +366,6 @@ mount / and /usr read-only. It should be noted that being too draconian in what you attempt to protect may prevent the all-important detection of an intrusion. .Sh CHECKING FILE INTEGRITY: BINARIES, CONFIG FILES, ETC -.Pp When it comes right down to it, you can only protect your core system configuration and control files so much before the convenience factor rears its ugly head. For example, using chflags to set the schg bit @@ -476,7 +469,6 @@ break-in. One way to keep a permanent record of the log files is to run the system console to a serial port and collect the information on a continuing basis through a secure machine monitoring the consoles. .Sh PARANOIA -.Pp A little paranoia never hurts. As a rule, a sysadmin can add any number of security features as long as they do not effect convenience, and can add security features that do effect convenience with some added @@ -485,7 +477,6 @@ a bit - if you use recommendations such as those given by this manual page verbatim, you give away your methodologies to the prospective hacker who also has access to this manual page. .Sh SPECIAL SECTION ON D.O.S. ATTACKS -.Pp This section covers Denial of Service attacks. A DOS attack is typically a packet attack. While there isn't much you can do about modern spoofed packet attacks that saturate your network, you can generally limit the damage @@ -641,7 +632,6 @@ Never set either parameter to zero Setting both parameters to 2 seconds should be sufficient to protect the route table from attack. .Sh ACCESS ISSUES WITH KERBEROS AND SSH -.Pp There are a few issues with both kerberos and ssh that need to be addressed if you intend to use them. Kerberos V is an excellent authentication protocol but the kerberized telnet and rlogin suck rocks. There are bugs that |