[ Team LiB ]

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]

S/MIME
    native support by Mozilla 
    support by Evolution mailer 
sa -s command (truncating process accounting the log file) 
Samhain (integrity checker) 
scp command
    mirroring set of files securely between computers 
    options for remote file copying 
    securely copying files between computers 
    syntax 
scripts, enabling/disabling network interfaces 
search path, testing 
    . (period) in 
    relative directories in, dangers of 
SEC_BIN global variable (Tripwire) 
secret keys
    adding to GnuPG keyring 
    default key for GnuPG operations 
    listing for GnuPG 
secret-key encryption 
secure integrity checks 
    creating bootable CD-ROM securely 
    dual-ported disk array, using 
Secure Sockets Layer  [See SSL]
securetty file, editing to prevent root logins via terminal devices 
security policies  [See policies]
security tests  [See monitoring systems for suspicious activity]
security tools (Insecure.org) 
self-signed certificates 
    creating 
    generating X.509 certificate 
    man-in-the-middle attacks, risk of 
    setting up your own CA to issue certificates 
sending-filters for email (PinePGP) 
sendmail
    accepting mail from other hosts 
    authentication mechanisms accepted as trusted 
    daemons (visible), security risks with 
    restriction on accepting connections from only same host, changing 
    SSL, using to protect entire SMTP session 
sense keyword (PAM, listfile module) 
server arguments (inetd.conf file) 
server authentication  [See Kerberos; PAM; SSH; SSL; trusted-host authentication]
server keyword (xinetd) 
server program, OpenSSH 
service filter configuration file (logwatch) 
service filter executable (logwatch) 
service names
    conversion of port numbers to by netstat and lsof 
    executable 
    modifying to invoke tcpd in /etc/xinetd.d startup file 
    PAM  2nd 
services file, adding service names to inetd.conf 
session protection for mail 
setgid bit on directories 
setgid/setuid programs
    security checks 
setgid/setuid programs, security checks
    finding and interactively fixing 
    listing all files 
    listing scripts only 
    removing setgid/setuid bits from a file 
    setuid programs for hostbased authentication 
setlogsock (Sys::Syslog) 
setuid root, ssh-keysign program 
sftp 
shadow directive (/etc/pam.d/system-auth) 
shadow password file  2nd 
sharing files
    prohibiting directory listings 
    protecting shared directory 
shell command substitution, exceeding command line maximum 
shell item (PAM) 
shell prompts, standards used 
shell scripts
    in your current directory 
    writing system log entries  2nd 
shell-style wildcard expansion 
shells
    bash 
    checking for dormant accounts 
    invoking MH commands from prompt 
    invoking with root privileges by sudo, security risks 
    process substitution 
    root login shell, running 
    root shell vs. root login shell 
    terminating SSH agent on logout 
    umask command 
shosts.equiv file 
show command, decrypting email displayed with 
shutdowns (system), records of 
shutting down network interfaces 
signature ID (Snort alerts) 
signed cryptographic keys 
signing files  [See digital signatures]
single computer
    blocking spoofed addresses 
    firewall design 
single-threaded services (inetd.conf file) 
site key (Tripwire) 
    creating with twinstall.sh script 
    fingerprints, creating in secure integrity checks 
    read-only integrity checking 
size, file
    /bin/login, changes since last Tripwire check 
    verifying for RPM-installed files 
SLAC (Stanford Linear Accelerator), Network Monitoring Tools page 
SMTP
    blocking requests for mail service from a remote host 
    capturing messages from with dsniff program mailsnarf 
    protecting dedicated server for smtp services 
    requiring authentication by server before relaying mail 
    using server from arbitrary clients 
snapshots  [See Tripwire]
Snort 
    decoding alert messages 
        nmap port scan detected 
        priority levels 
        writing alerts to file instead of syslog 
    detecting intrusions with 
        dumping statistics to the system logger 
        promiscuous mode, setting 
        running in background as daemon 
    packet sniffing with 
    partitioning logs into separate files 
    upgrading and tuning ruleset 
socket type (inetd.conf file) 
software packages, risk of Trojan horses in 
sort command 
    -z option for null filename separators 
source address verification
    enabling 
    enabling in kernel 
    website information on 
source addresses
    controlling access by 
    limiting server sessions by 
source name for remote file copying 
source quench, blocking 
sources for system messages 
spoofed addresses
    blocking access from 
    MAC 
    source addresses 
SquirrelMail 
SSH (Secure Shell) 
    agents  [See ssh-agent]
    authenticating between client/server by trusted host 
    authenticating between SSH2 client/OpenSSH server 
    authenticating by public key 
    changing client defaults 
    client configurations in ~/.ssh/config 
    connecting via ssh with Kerberos authentication 
    cryptographic authentication 
    download site for OpenSSH 
    fetchmail, use of 
    important programs and files 
        scp (client program) 
        ssh (client program) 
    Kerberos, using with 
        debugging 
        Kerberos-5 support 
    permitting only incoming access via SSH with firewall 
    protecting dedicated server for ssh services 
    public-key and ssh-agent, using with Pine 
    public-key authentication between SSH2 client/OpenSSH server 
    public/private authentication keys 
    remote user access by public key authentication 
    restricting access by remote users 
    restricting access to server by account 
    restricting access to server by host 
    running root commands via 
    securing POP/IMAP 
        with Pine 
    sharing root privileges via 
    SSH-2 connections, trusted-host authentication 
    SSH2 server and OpenSSH client, authenticating between with OpenSSH key 
    SSH2 server and OpenSSH client, authenticating between with SSH2 key 
    superusers, authentication of 
    tailoring per host 
    transferring email from another ISP over tunnel 
    tunneling NNTP with 
    tunneling TCP connection through 
    web site 
ssh command
    -t option (for pseudo-tty) 
    -X option (for X forwarding) 
    using with rsync to mirror set of files between computers 
ssh file 
ssh-add 
ssh-agent 
    automatic authentication (without password) 
    invoking between backticks (` `) 
    public-key authentication without passphrase 
    terminating on logout 
ssh-keygen 
    conversion of SSH2 private key into OpenSSH private key with -i (import) option 
ssh-keysign 
    setuid root on client 
ssh_config file 
    ~/.ssh file, using instead of 
    client configuration keywords 
    HostbasedAuthentication, enabling 
ssh_known_hosts file 
    OpenSSH client, using ~/.ssh file instead of 
sshd 
    AllowUsers keyword 
    authorizing users to restart 
    restricting access from specific remote hosts 
    TCP wrappers support 
sshd_config file
    AllowUsers keyword 
    HostbasedAuthentication, enabling 
    HostbasedUsesNameFromPacketOnly 
    KerberosTgtPassing, enabling 
    ListenAddress statements, adding 
    PermitRootLogin, setting 
    PublicAuthentication, permitting 
    X11Forwarding setting 
SSL (Secure Sockets Layer) 
    connection problems, server-side debugging 
    converting certificates from DER to PEM 
    creating self-signed certificate 
    decoding SSL certificates 
    generating Certificate Signing Request (CSR) 
    installing new certificate 
    OpenSSL 
        web site 
    POP/IMAP security 
        mail server, running with 
        mail sessions for Evolution 
        mutt mail client, using with 
        stunnel, using 
        with pine mail client 
    setting up CA and issuing certificates 
    STARTTLS command (IMAP), negotiating protection for mail 
    STLS command (POP), negotiating protection for email 
    validating a certificate 
    verifying connection to secure POP or IMAP server 
SSL-port
    on mail servers 
    POP or IMAP connections for mutt client 
    testing use in pine mail client 
standard input, redirecting from /dev/null 
Stanford Linear Accelerator (SLAC) Network Monitoring Tools page 
starting network interfaces 
STARTTLS command (IMAP) 
    mail server support for SSL 
    mutt client connection over IMAP, testing 
    testing use in pine mail client 
startup scripts (bootable CD-ROM), disabling networking 
stateful 
stateless 
sticky bit
    set on world-writable directories 
    setting on world-writable directory 
STLS command (POP)  2nd 
strace command  2nd 
strings
    matching with fgrep command 
    searching network traffic for 
strings command 
strong authentication for email sessions 
strong session protection for mail (by SSL) 
stunnel, securing POP/IMAP with SSL 
su command 
    invoking with root privileges by sudo, security risks 
    ksu (Kerberized su) 
        authentication via Kerberos 
        sharing root privileges via 
    su -, running root login shell 
su configuration (PAM) 
subject (certificates) 
    components of certificate subject name 
    self-signed 
sudo command 
    bypassing password authentication 
    careful practices for using 
    forcing password authentication 
    killing processes via 
    listing invocations 
    logging remotely 
    password changes, authorizing via 
    prohibiting command-line arguments for command run via 
    read-only access to shared file 
    running any program in a directory 
    running commands as another user 
    starting/stopping daemons 
    user authorization privileges, allowing per host 
sudoers file 
    argument lists for each command, specifying meticulously 
    editing with visudo program 
    listing permissible commands for root privileges 
    running commands as another user 
    timestamp_timeout variable 
    user authorization to kill certain processes 
superdaemons 
    inetd  [See inetd]
    xinetd  [See xinetd]
superuser  2nd  [See also root]
    assigning privileges via ssh without disclosing root password 
    finding all accounts on system 
    ksu (Kerberized su) 
    processes owned by others, examining 
SuSE Linux
    firewall rules, building 
    Heimdal Kerberos 
    inetd superdaemon 
    loading firewall rules at boot time 
    process accounting RPM 
    script allowing users to start/stop daemons 
    Snort, starting automatically at boot 
    SSL certificates  2nd 
    TCP wrappers  2nd 
switched networks
    packet sniffers and 
    simulated attacks with dsniff 
symbolic links
    for encrypted files on separate system 
    inability to verify with manual integrity check 
    permission bits, ignoring 
    scp command and 
symmetric encryption 
    file encryption with gpg -c 
    files encrypted with GnuPG, decrypting 
    problems with 
    single encrypted file containing all files in directory 
SYN_RECV state, large numbers of network connections in 
synchronizing files on two machines (rsync) 
    integrity checking with 
Sys::Lastlog and Sys::Utmp modules (Perl) 
Sys::Syslog module 
syslog function 
    using in C program 
syslog-ng (Ònew generationÓ) 
syslog.conf file
    directing messages to different log files by facility and priority 
    remote logging, configuring  2nd 
    RPM-installed, verifying with Tripwire 
    setting up for local logging 
    signaling system logger about changes in 
    tracing configuration errors in 
syslogd
    -r flag to receive remote messages 
    signaling to pick up changes in syslog.conf 
system accounts, login activity on  2nd 
system calls, tracing on network 
system logger
    combining log files 
    debugging SSL connections 
    directing system messages to log files 
    log files created by, permissions and 
    logging messages remotely 
    programs not using 
    scanning log files for problem reports 
    sending messages to 
    signaling changes in syslog.conf 
    standard API, functions provided by 
    testing and monitoring 
    writing system log entries
        in C  2nd 
        in Perl 
        in shell scripts 
    xinetd, logging to 
system-wide authentication (Kerberos with PAM) 
system_auth (/etc/pam.d startup file)
    forbidding local password validation 
    Kerberos in 
systems
    authentication methods and policies (authconfig) 
    security tests on  [See monitoring systems for suspicious activity]

[ Team LiB ]