Previous Next Contents

1. Introduction

This document covers some of the main security issues that affect linux security. General philosophy and net born resources are discussed.

A number of other HOWTO documents overlap with security issues, and those have been pointed to wherever appropriate.

This document is NOT meant to be a up to date exploits document. Large numbers of new exploits happen all the time. This document will tell you where to look for such up to date information, and some general methods to prevent such exploits from taking place.

1.1 New versions of this document

New versions of this document will be periodically posted to comp.os.linux.answers. They will also be added to the various anonymous FTP sites who archive such information, including:

ftp://sunsite.unc.edu/pub/Linux/docs/HOWTO

In addition, you should generally be able to find this document on the Linux Worldwide Web home page via:

http://sunsite.unc.edu/mdw/linux.html

Finally, the very latest version of this document should also be available in various formats from:

http://scrye.com/~kevin/lsh/

1.2 Feedback

All comments, error reports, additional information and criticism of all sorts should be directed to:

kevin@scrye.com

NOTE: I use the despam filter to filter all my mail. This means that if you are not known to me, your mail will bounce with a notice to re-send with a provided "key" in the subject. I regret the trouble this causes, but since I get 20-30 spam mails a day, I have to do something. Please re-send your message with the "key" in the subject and I will read your mail. You can also avoid this step by making sure you put "linux" "security" or "HOWTO" in the subject of your mail.

http://scrye.com/~kevin/

1.3 Disclaimer

No liability for the contents of this documents can be accepted. Use the concepts, examples and other content at your own risk. Additionally, this is an early version, with many possibilities for inaccuracies and errors.

A number of the examples and descriptions use the RedHat(tm) package layout and system setup. Your mileage may vary.

As far as I know, only programs that under certain terms may be used or evaluated for personal purposes will be described. Most of the programs will be available complete with source under GNU-like terms.

1.4 Copyright information

This document is copyrighted (c)1998 Kevin Fenzi and distributed under the following terms:

gregh@sunsite.unc.edu Finger for phone number and snail mail address.


Previous Next Contents