| Part I: SUSE Server Installation and Configuration |
|
|
CHAPTER 1: Installing SUSE LINUX Enterprise Server |
|
|
3 | (28) |
|
Installation Methods and Overview |
|
|
4 | (6) |
|
CD-ROM-Based Installation |
|
|
6 | (1) |
|
|
|
6 | (3) |
|
Network-Based Installation |
|
|
9 | (1) |
|
AutoYaST-Based Installation |
|
|
9 | (1) |
|
Pre-Installation Planning |
|
|
10 | (7) |
|
Ten Easy Steps to SLES 9 Installation |
|
|
17 | (12) |
|
Selecting an Installation Method |
|
|
17 | (1) |
|
|
|
18 | (1) |
|
Choosing Installation Settings |
|
|
18 | (2) |
|
|
|
20 | (2) |
|
|
|
22 | (1) |
|
Specifying Network Settings |
|
|
23 | (1) |
|
|
|
24 | (1) |
|
|
|
24 | (1) |
|
Configuring User Information |
|
|
25 | (3) |
|
|
|
28 | (1) |
|
|
|
29 | (1) |
|
|
|
30 | (1) |
|
CHAPTER 2: Updating the Server |
|
|
31 | (34) |
|
Maintaining Your System Configuration |
|
|
31 | (5) |
|
|
|
32 | (1) |
|
YaST (Yet another Setup Tool) |
|
|
33 | (3) |
|
Adding and Removing Packages |
|
|
36 | (8) |
|
|
|
36 | (5) |
|
Removing a Package or Subcomponents |
|
|
41 | (3) |
|
Adding and Removing Hardware |
|
|
44 | (13) |
|
|
|
44 | (1) |
|
|
|
45 | (12) |
|
Changing Network Configuration |
|
|
57 | (6) |
|
|
|
58 | (1) |
|
Using YaST to Manage the Network Configuration |
|
|
59 | (4) |
|
|
|
63 | (2) |
|
CHAPTER 3: Booting and Shutting Down the Server |
|
|
65 | (16) |
|
|
|
65 | (6) |
|
|
|
67 | (1) |
|
|
|
68 | (3) |
|
|
|
71 | (1) |
|
init and Understanding Runlevels |
|
|
72 | (2) |
|
|
|
74 | (1) |
|
Emergency Boot and Recovery |
|
|
75 | (2) |
|
|
|
77 | (4) |
| Part II: User Access and Security Management |
|
|
CHAPTER 4: User and Group Administration |
|
|
81 | (44) |
|
|
|
81 | (7) |
|
User and Group Data Files |
|
|
88 | (7) |
|
|
|
89 | (2) |
|
|
|
91 | (2) |
|
|
|
93 | (2) |
|
User Account and Group Management Applications |
|
|
95 | (15) |
|
Creating and Editing User Accounts |
|
|
97 | (8) |
|
Setting Default User Account Properties |
|
|
105 | (3) |
|
Creating and Editing Groups |
|
|
108 | (2) |
|
|
|
110 | (12) |
|
|
|
111 | (8) |
|
Auditing Default Accounts |
|
|
119 | (1) |
|
|
|
120 | (2) |
|
|
|
122 | (1) |
|
|
|
122 | (3) |
|
CHAPTER 5: User Environment Management and Security |
|
|
125 | (28) |
|
|
|
126 | (1) |
|
Configuring the User Environment |
|
|
127 | (6) |
|
|
|
127 | (3) |
|
Login Scripts and Environment Variables |
|
|
130 | (3) |
|
|
|
133 | (15) |
|
|
|
133 | (3) |
|
|
|
136 | (1) |
|
|
|
137 | (2) |
|
|
|
139 | (2) |
|
|
|
141 | (7) |
|
|
|
148 | (4) |
|
|
|
152 | (1) |
|
CHAPTER 6: Filesystem Security |
|
|
153 | (40) |
|
A Review of File and Directory Permissions |
|
|
153 | (13) |
|
|
|
159 | (4) |
|
Changing User and Group Ownership |
|
|
163 | (1) |
|
|
|
163 | (3) |
|
Default Access Permissions |
|
|
166 | (2) |
|
|
|
168 | (10) |
|
Security Implications of SUID/SGID |
|
|
170 | (2) |
|
|
|
172 | (2) |
|
|
|
174 | (2) |
|
Securing Against SUID Programs |
|
|
176 | (1) |
|
|
|
177 | (1) |
|
|
|
178 | (5) |
|
Data and Filesystem Encryption |
|
|
183 | (5) |
|
|
|
188 | (2) |
|
|
|
190 | (1) |
|
|
|
191 | (2) |
|
CHAPTER 7: System Management and Monitoring |
|
|
193 | (26) |
|
|
|
194 | (2) |
|
|
|
194 | (2) |
|
|
|
196 | (1) |
|
|
|
196 | (2) |
|
Health Checks and System Monitoring |
|
|
198 | (12) |
|
|
|
199 | (1) |
|
|
|
200 | (1) |
|
|
|
201 | (2) |
|
|
|
203 | (1) |
|
|
|
204 | (2) |
|
|
|
206 | (4) |
|
|
|
210 | (6) |
|
|
|
211 | (2) |
|
|
|
213 | (3) |
|
|
|
216 | (3) |
| Part III: Installing and Configuring Networking Services |
|
|
CHAPTER 8: Network Services |
|
|
219 | (86) |
|
|
|
220 | (14) |
|
|
|
221 | (7) |
|
The /etc/xinetd.conf File |
|
|
228 | (4) |
|
|
|
232 | (2) |
|
|
|
234 | (1) |
|
|
|
234 | (15) |
|
Configuring the NTP Client |
|
|
237 | (6) |
|
Configuring an NTP Server |
|
|
243 | (3) |
|
|
|
246 | (3) |
|
|
|
249 | (6) |
|
|
|
255 | (12) |
|
|
|
256 | (6) |
|
|
|
262 | (4) |
|
Using the Standard TFTP Server |
|
|
266 | (1) |
|
Network File-Sharing Services |
|
|
267 | (13) |
|
|
|
268 | (4) |
|
Setting Up a Samba Server |
|
|
272 | (8) |
|
Remote Management Services |
|
|
280 | (7) |
|
|
|
281 | (1) |
|
|
|
281 | (2) |
|
|
|
283 | (1) |
|
Securing System Management Conversations |
|
|
284 | (2) |
|
Restricting Connections by IP Address |
|
|
286 | (1) |
|
A Secure System Management Environment |
|
|
287 | (1) |
|
|
|
287 | (9) |
|
|
|
287 | (1) |
|
Service Location Protocol (SLP) |
|
|
288 | (1) |
|
Domain Name Service (DNS) |
|
|
288 | (4) |
|
Dynamic Host Configuration Protocol (DHCP) |
|
|
292 | (3) |
|
|
|
295 | (1) |
|
|
|
296 | (5) |
|
|
|
301 | (3) |
|
Network Information Services (NIS) |
|
|
301 | (1) |
|
|
|
302 | (1) |
|
Lightweight Directory Access Protocol (LDAP) |
|
|
302 | (1) |
|
|
|
303 | (1) |
|
|
|
304 | (1) |
|
CHAPTER 9: Printing Services |
|
|
305 | (20) |
|
|
|
306 | (7) |
|
|
|
306 | (1) |
|
|
|
307 | (1) |
|
|
|
307 | (3) |
|
|
|
310 | (3) |
|
|
|
313 | (1) |
|
|
|
313 | (1) |
|
|
|
313 | (1) |
|
|
|
314 | (1) |
|
|
|
314 | (10) |
|
|
|
315 | (1) |
|
Command-Line Queue Configuration |
|
|
316 | (2) |
|
|
|
318 | (1) |
|
|
|
319 | (5) |
|
|
|
324 | (1) |
|
CHAPTER 10: Data Backup and Disaster Recovery |
|
|
325 | (50) |
|
A Look at Backup Strategies |
|
|
326 | (2) |
|
Implementing a Backup Strategy |
|
|
328 | (9) |
|
Grandfather-Father-Son Rotation Method |
|
|
330 | (2) |
|
Tower of Hanoi Rotation Method |
|
|
332 | (1) |
|
|
|
333 | (3) |
|
Database Backups: Cold or Hot? |
|
|
336 | (1) |
|
|
|
337 | (32) |
|
|
|
339 | (4) |
|
|
|
343 | (2) |
|
Converting and Copying Data Using dd |
|
|
345 | (3) |
|
|
|
348 | (10) |
|
Data Mirroring Using rsync |
|
|
358 | (2) |
|
YaST's System Backup and Restore Modules |
|
|
360 | (4) |
|
|
|
364 | (2) |
|
|
|
366 | (1) |
|
Commercial Backup Products |
|
|
367 | (2) |
|
SLES Boot and Rescue Disks |
|
|
369 | (2) |
|
|
|
371 | (4) |
| Part IV: Securing Your SUSE Server |
|
|
CHAPTER 11: Network Security Concepts |
|
|
375 | (28) |
|
Corporate Security Policies |
|
|
376 | (25) |
|
|
|
379 | (3) |
|
|
|
382 | (2) |
|
|
|
384 | (7) |
|
|
|
391 | (1) |
|
|
|
392 | (4) |
|
|
|
396 | (1) |
|
|
|
397 | (2) |
|
|
|
399 | (2) |
|
|
|
401 | (2) |
|
CHAPTER 12: Intrusion Detection |
|
|
403 | (38) |
|
|
|
403 | (2) |
|
Reducing Your Target Size |
|
|
405 | (2) |
|
Vulnerability Assessments |
|
|
407 | (11) |
|
|
|
407 | (3) |
|
|
|
410 | (8) |
|
Detecting a Network-based Intrusion |
|
|
418 | (10) |
|
Know Your Traffic, Tune Your Firewall |
|
|
418 | (1) |
|
Network Intrusion Detection Systems |
|
|
419 | (1) |
|
|
|
420 | (2) |
|
Analysis Console for Intrusion Databases |
|
|
422 | (6) |
|
Detecting a Host Intrusion |
|
|
428 | (8) |
|
|
|
429 | (1) |
|
|
|
429 | (2) |
|
Advanced Intrusion Detection Environment (AIDE) |
|
|
431 | (5) |
|
|
|
436 | (3) |
|
|
|
436 | (1) |
|
|
|
437 | (1) |
|
|
|
438 | (1) |
|
|
|
439 | (2) |
|
CHAPTER 13: System Security |
|
|
441 | (44) |
|
System Hardening Principles |
|
|
442 | (2) |
|
Using a Central syslog Server |
|
|
444 | (7) |
|
Hardening the Central Syslog Host |
|
|
447 | (3) |
|
|
|
450 | (1) |
|
|
|
451 | (1) |
|
Securing Network Services |
|
|
452 | (25) |
|
Hardening Remote Services |
|
|
453 | (2) |
|
Limiting Rights of Services |
|
|
455 | (2) |
|
Using chroot Jails and User Mode Linux |
|
|
457 | (3) |
|
Packet Filtering Using iptables |
|
|
460 | (3) |
|
Hardening Your Physical Network Infrastructure |
|
|
463 | (3) |
|
|
|
466 | (11) |
|
System Hardening Packages |
|
|
477 | (2) |
|
Automating SLES Hardening |
|
|
479 | (2) |
|
Learning More About Threats |
|
|
481 | (1) |
|
|
|
482 | (3) |
| Part V: Appendixes |
|
|
APPENDIX A: Security Certifications |
|
|
485 | (8) |
|
|
|
493 | (10) |
|
|
|
493 | (5) |
|
|
|
498 | (5) |
|
Security and Linux-Related Websites |
|
|
499 | (1) |
|
SUSE-Specific Newsgroups and Websites |
|
|
500 | (3) |
| Index |
|
503 | |