Linux Operating System Security

Links from the class materials and other supplemental information, grouped by chapter:



Chapter 1: Introduction



Chapter 2: General Security Issues

Links from the text:

Additional links, not from the course text, or, software needed for the chapter:

Links to vendor security information:

These web sites should all have information about subscribing to the security alert mailing list. They should also have pointers to the keys they use to sign their software, information about security advisories, etc.



Chapter 3: Logging

Links from the text:

Additional links, not from the course text, or, software needed for the chapter:

Log file tools:

Main web site Local copies
logsurfer logsurfer-1.5a-553.src.rpm
logcheck logcheck-1.1.1-9mdk.src.rpm
logtool logtool-1.1.0-3.src.rpm
mreport
analog analog-5.32-2mdk.src.rpm
webalizer webalizer-2.01_10-11.i386.rpm
awstats
yaala
http-analyze


Chapter 4: Authentication

Links from the text:



Chapter 5: Local security issues

Links from the text:

Additional links, not from the course text, or, software needed for the chapter:

Original COPS web page by Dan Farmer.
Another COPS web page, from Dan Anderson.



Chapter 6: nmap and network mapping

Links from the text:



Chapter 7: Penetration testing

Links from the text:

Additional links, not from the course text, or, software needed for the chapter:

Nessus: To save the file, do a right click and choose "save target as..."



Chapter 8: Network access control

Links from the text:

Additional links, not from the course text, or, software needed for the chapter:

iptables file for the lab. I created it with iptables-save. Restore it to make it active.



Chapter 9: Intrusion Detection Overview



Chapter 10: Host-based Intrusion Detection Systems

Links from the text:

Additional links, not from the course text, or, software needed for the chapter:

Tripwire:

Portsentry:



Chapter 11: Network Intrusion Detection Systems

Links from the text:

Additional links, not from the course text, or, software needed for the chapter:

Local copies of snort files:

Bro web site



Chapter 12: SELinux

Links from the text:

Additional links, not from the course text, or, software needed for the chapter:



Chapter 13: Cryptography Overview

Links from the text:



Chapter 14: Cryptographic Tools

Links from the text:

Additional links, not from the course text, or, software needed for the chapter:

Signing key for linux kernel

Kernel source 2.4.25
Signature for the kernel source 2.4.25



Chapter 15: SSL and TLS

Links from the text:



Chapter 16: IPsec

Links from the text:

Additional links, not from the course text, or, software needed for the chapter:



Chapter 17: Review of networking concepts



Chapter 18: Loop filesystem



Chapter 19: Security packages and distributions

Additional links, not from the course text, or, software needed for the chapter:

Bastille Linux:

LIDS:

Others:



Chapter 20: Kernel configuration options (optional)

Links from the text:

Additional links, not from the course text, or, software needed for the chapter:



Chapter 21: Network Configuration

Links from the text:



Chapter 22: Network services

Links from the text:



SkillBridge Training

Examples from the class notes (or, all as one file).

Selected Solutions from the class notes (no looking until you have solved the problems!). Note that all solutions are in an appendix of your course book. All solutions in a compressed tar file.


Evaluation form (if needed)