Linux security
Considerable effort has been put into making Linux a very secure network operating system, and those efforts are evident. When it is configured correctly, Linux is a very secure operating system, and therefore it is often used as a company's firewall server. The following are a few highlights of Linux security:
- Resource access-As in the other network operating systems, access to resources on a Linux network is controlled through permissions. Access control lists identifying which systems and who can access what resources are held in text files such as hosts.deny and hosts.allow. Permissions for network resources and services can be assigned to an individual user or to a group of users.
- User authentication-To access the local system resources or any network
resources, user authentication, in the form of a username and a
password, is required. The user account information is kept in a text file
known as the /etc/passwd file in the Linux system.
Remember To log on to a Linux server, the user must supply a valid username and password. Both of these values are case-sensitive. - File and directory security-The default file system used by Linux is the EXT2 file system. Like NTFS, which is used with Windows servers, EXT2 allows administrators to assign permissions to individual files and folders. These permissions are used to control who is allowed access to specific data on the server. A secure server should have permissions set on the important data in the system.
As Linux continues to grow in popularity, it will become an increasingly common sight in server rooms of organizations of all sizes. As a network administrator, you should prepare yourself for when you encounter a Linux system-not if.
Of the platforms discussed in this chapter, Unix and Linux have the most simplistic approach to file system security, although for most environments, this approach is more than sufficient. File permissions can be assigned to either the creator of a file or directory, a group, or the entity "everyone," which includes any authenticated user.
Unix and Linux have only three rights that can be assigned. These rights are listed in Table below.
File Permissions on Unix/Linux
Right | Description |
Read | Allows files to be listed, opened, and read |
Write | Allows files to be created, written to, or modified |
Execute | Allows files to be executed (that is, run) |
The file permissions are listed to the right of the file. There first value specifies whether the file is a file (-) or a directory (d). The next three values specify the file rights for the user, the next three for the group, and the next three for the "everyone" assignment.
In this tutorial:
- Network Operating Systems and Clients
- Network operating systems
- Windows NT 4
- Domains and workgroups
- Windows NT 4 authentication
- Windows NT 4 file and print services
- Windows NT 4 application support
- Windows NT 4 security
- Windows NT 4 and Windows 2000 file system security
- Windows 2000
- Windows 2000 Active Directory and domains
- Windows 2000 authentication
- Windows 2000 file and print services
- Windows 2000 application support
- Novell NetWare
- NDS (Novell Directory Services)
- NetWare authentication
- NetWare file and print services
- NetWare application support
- NetWare security
- Linux
- Linux file and print services
- Linux application support
- Linux security
- Operating system interoperability
- Using Windows with NetWare
- Using Windows and Linux servers
- Using NetWare and Linux servers
- Operating system client support
- NetWare server client support
- Linux server client support
- Client operating systems
- Local security mechanisms for Windows 95, Windows 98, and Windows Me
- Windows NT Workstation, Windows 2000 Professional, and Windows XP Professional
- Client connectivity for Windows NT Workstation, Windows 2000 Professional, and Windows XP Professional
- Applications for Linux
- Local security mechanisms for Linux
- Macintosh
- Application support for Macintosh
- Selecting a NIC and network configuration settings
- Connecting the PC to the network
- Testing and troubleshooting the NIC
- Configuring the NIC settings
- Configuring client systems for TCP/IP
- Configuring DNS server information
- Configuring WINS server information
- Using DHCP (Dynamic Host Control Protocol)
- Configuring clients to access servers
- Client software for Microsoft networks on Windows 95/98/Me
- Novell client software
- Unix/Linux client software