Part V. Security

Contents

42. Managing X.509 Certification
42.1. The Principles of Digital Certification
42.2. YaST Modules for CA Management
43. Masquerading and Firewalls
43.1. Packet Filtering with iptables
43.2. Masquerading Basics
43.3. Firewalling Basics
43.4. SuSEfirewall2
43.5. For More Information
44. SSH: Secure Network Operations
44.1. The OpenSSH Package
44.2. The ssh Program
44.3. scp—Secure Copy
44.4. sftp—Secure File Transfer
44.5. The SSH Daemon (sshd)—Server-Side
44.6. SSH Authentication Mechanisms
44.7. X, Authentication, and Forwarding Mechanisms
45. Network Authentication—Kerberos
45.1. Kerberos Terminology
45.2. How Kerberos Works
45.3. Users' View of Kerberos
45.4. For More Information
46. Installing and Administering Kerberos
46.1. Choosing the Kerberos Realms
46.2. Setting Up the KDC Hardware
46.3. Clock Synchronization
46.4. Configuring the KDC
46.5. Manually Configuring Kerberos Clients
46.6. Configuring a Kerberos Client with YaST
46.7. Remote Kerberos Administration
46.8. Creating Kerberos Host Principals
46.9. Enabling PAM Support for Kerberos
46.10. Configuring SSH for Kerberos Authentication
46.11. Using LDAP and Kerberos
47. Encrypting Partitions and Files
47.1. Setting Up an Encrypted File System with YaST
47.2. Using Encrypted Home Directories
47.3. Using vi to Encrypt Single ASCII Text Files
48. Confining Privileges with AppArmor
48.1. Installing Novell AppArmor
48.2. Enabling and Disabling Novell AppArmor
48.3. Getting Started with Profiling Applications
49. Security and Confidentiality
49.1. Local Security and Network Security
49.2. Some General Security Tips and Tricks
49.3. Using the Central Security Reporting Address