< Day Day Up > |
Most systems currently connected to the Internet are open to attempts by outside users to gain unauthorized access. Outside users can try to gain access directly by setting up an illegal connection, by intercepting valid communications from users remotely connected to the system, or by pretending to be a valid user. Firewalls, encryption, and authentication procedures are ways of protecting against such attacks. A firewall prevents any direct unauthorized attempts at access, encryption protects transmissions from authorized remote users, and authentication verifies that a user requesting access has the right to do so. The current Linux kernel incorporates support for firewalls using the Netfilter (iptables) packet filtering package (the previous version, ipchains, is used on older kernel versions). To implement a firewall, you simply provide a series of rules to govern what kind of access you want to allow on your system. If that system is also a gateway for a private network, the system's firewall capability can effectively help protect the network from outside attacks.
Note |
You can set up basic Netfilter firewall protection with the redhat-config-securitylevel tool (Security Level on the System Settings menu or window). This tool will generate a basic set of iptables rules to protect your system and network (see Chapters 5). |
To provide protection for remote communications, transmission can be simply encrypted. For Linux systems, you can use the Secure Shell (SSH) suite of programs to encrypt any transmissions, preventing them from being read by anyone else (see Chapter 18). Kerberos authentication provides another level of security whereby individual services can be protected, allowing use of a service only to users who are cleared for access (see Chapter 18). Outside users may also try to gain unauthorized access through any Internet services you may be hosting, such as a Web site. In such a case, you can set up a proxy to protect your site from attack. For Linux systems, use Squid proxy software to set up a proxy to protect your Web server (see Chapter 23). Table 19-1 lists several network security applications commonly used on Linux.
Web Site |
Security Application |
---|---|
Netfilter project, iptables, and NAT |
|
IP-Chains firewall |
|
Secure Shell encryption |
|
Squid Web Proxy server |
|
Kerberos network authentication |
< Day Day Up > |
This HTML Help has been published using the chm2web software. |