summaryrefslogtreecommitdiffstats
path: root/share/man/man7
diff options
context:
space:
mode:
authorphantom <phantom@FreeBSD.org>1999-09-04 14:55:22 +0000
committerphantom <phantom@FreeBSD.org>1999-09-04 14:55:22 +0000
commit15f87e7569697e75679e09f5b5bd41c200cbcf4d (patch)
tree7eb6cae044764c734e8ab9233dd79bbcf7525fe0 /share/man/man7
parentcfad9dd22be241e46c79bea7497c3c31eb870efd (diff)
downloadFreeBSD-src-15f87e7569697e75679e09f5b5bd41c200cbcf4d.zip
FreeBSD-src-15f87e7569697e75679e09f5b5bd41c200cbcf4d.tar.gz
mdoc(7) style fixes:
.Bx Free -> .Fx Cross references to ports splited into different subsection PR: 13256 Submitted by: Alexey Zelkin <phantom@cris.net> Reviewed by: mpp
Diffstat (limited to 'share/man/man7')
-rw-r--r--share/man/man7/security.716
1 files changed, 10 insertions, 6 deletions
diff --git a/share/man/man7/security.7 b/share/man/man7/security.7
index 6eecd3d..c664a08 100644
--- a/share/man/man7/security.7
+++ b/share/man/man7/security.7
@@ -208,7 +208,7 @@ virtually every server ever run as root, including basic system servers.
If you are running a machine through which people only login via sshd and
never login via telnetd or rshd or rlogind, then turn off those services!
.Pp
-.Bx Free
+.Fx
now defaults to running ntalkd, comsat, and finger in a sandbox.
Another program which may be a candidate for running in a sandbox is
.Xr named 8 .
@@ -288,7 +288,7 @@ below
If an attacker breaks root he can do just about anything, but there
are certain conveniences. For example, most modern kernels have a
packet sniffing device driver built in. Under
-.Bx Free
+.Fx
it is called
the
.Sq bpf
@@ -503,7 +503,7 @@ a couple of services or that you will add a new internal
service and forget to update the firewall. You can still open up the
high-numbered port range on the firewall to allow permissive-like operation
without compromising your low ports. Also take note that
-.Bx Free
+.Fx
allows you to
control the range of port numbers used for dynamic binding via the various
net.inet.ip.portrange sysctl's
@@ -534,7 +534,7 @@ saturate a server's incoming network and cause the server to saturate its
outgoing network with ICMP responses. This type of attack can also crash the
server by running it out of mbuf's, especially if the server cannot drain the
ICMP responses it generates fast enough. The
-.Bx Free
+.Fx
kernel has a new kernel
compile option called ICMP_BANDLIM which limits the effectiveness of these
sorts of attacks. The last major class of springboard attacks is related to
@@ -574,11 +574,15 @@ table from attack.
.Xr find 1 ,
.Xr kerberos 1 ,
.Xr md5 1 ,
-.Xr ssh 1 ,
-.Xr sshd 1 ,
+.Xr netstat 1 ,
.Xr syslogd 1 ,
.Xr xdm 1 ,
.Xr sysctl 8
+
+The following are part of security ports collection:
+
+.Xr ssh 1 ,
+.Xr sshd 1
.Sh HISTORY
The
.Nm
OpenPOWER on IntegriCloud