neysx       06/09/18 09:22:48

  Modified:             shb-chroot.xml shb-firewalls.xml shb-intrusion.xml
                        shb-kernel.xml shb-limits.xml shb-logging.xml
                        shb-mounting.xml shb-pam.xml shb-perms.xml
                        shb-pre.xml shb-services.xml shb-tight.xml
                        shb-uptodate.xml
  Log:
  #147760 Removed all trailing spaces, no content change

Revision  Changes    Path
1.3                  xml/htdocs/doc/en/security/shb-chroot.xml

file : 
http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/doc/en/security/shb-chroot.xml?rev=1.3&view=markup
plain: 
http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/doc/en/security/shb-chroot.xml?rev=1.3&content-type=text/plain
diff : 
http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/doc/en/security/shb-chroot.xml?r1=1.2&r2=1.3

Index: shb-chroot.xml
===================================================================
RCS file: /var/cvsroot/gentoo/xml/htdocs/doc/en/security/shb-chroot.xml,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -r1.2 -r1.3
--- shb-chroot.xml      15 Dec 2005 22:45:57 -0000      1.2
+++ shb-chroot.xml      18 Sep 2006 09:22:48 -0000      1.3
@@ -1,5 +1,5 @@
 <?xml version='1.0' encoding='UTF-8'?>
-<!-- $Header: /var/cvsroot/gentoo/xml/htdocs/doc/en/security/shb-chroot.xml,v 
1.2 2005/12/15 22:45:57 rane Exp $ -->
+<!-- $Header: /var/cvsroot/gentoo/xml/htdocs/doc/en/security/shb-chroot.xml,v 
1.3 2006/09/18 09:22:48 neysx Exp $ -->
 <!DOCTYPE sections SYSTEM "/dtd/book.dtd">
 
 <!-- The content of this document is licensed under the CC-BY-SA license -->
@@ -32,13 +32,13 @@
 </p>
 
 <p>
-Create the <path>/chroot</path> directory with <c>mkdir /chroot</c>. And find 
what 
-dynamic libraries that <c>bash</c> is compiled with (if it is compiled with 
+Create the <path>/chroot</path> directory with <c>mkdir /chroot</c>. And find 
what
+dynamic libraries that <c>bash</c> is compiled with (if it is compiled with
 <c>-static</c> this step is not necessary):
 </p>
 
 <p>
-The following command will create a list of libraries used by <c>bash</c>. 
+The following command will create a list of libraries used by <c>bash</c>.
 </p>
 
 <pre caption="Get listing of used libraries">
@@ -63,28 +63,28 @@
 Next copy the files used by <c>bash</c> (<path>/lib</path>) to the chrooted
 <path>lib</path> and copy the bash command to the chrooted <path>bin</path>
 directory. This will create the exact same environment, just with less
-functionality. After copying try it out: <c>chroot /chroot/bash /bin/bash</c>. 
+functionality. After copying try it out: <c>chroot /chroot/bash /bin/bash</c>.
 If you get an prompt saying <path>/</path> it works! Otherwise it will properly
 tell you what a file is missing. Some shared libraries depend on each other.
 </p>
 
 <p>
-You will notice that inside the chroot nothing works except <c>echo</c>. This 
-is because we have no other commands in out chroot environment than bash and 
+You will notice that inside the chroot nothing works except <c>echo</c>. This
+is because we have no other commands in out chroot environment than bash and
 <c>echo</c> is a build-in functionality.
 </p>
 
 <p>
-This is basically the same way you would create a chrooted service. The only 
-difference is that services sometimes rely on devices and configuration files 
-in <path>/etc</path>. Simply copy them (devices can be copied with <c>cp 
--a</c>) to the chrooted environment, edit the init script to use chroot before 
-executing. It can be difficult to find what devices and configuration files a 
-services need. This is where the <c>strace</c> command becomes handy. Start 
-the service with <c>/usr/bin/strace</c> bash and look for open, read, stat and 
-maybe connect. This will give you a clue on what files to copy. But in most 
-cases just copy the passwd file (edit the copy and remove users that has 
-nothing to do with the service), <path>/dev/zero</path>, <path>/dev/log</path> 
+This is basically the same way you would create a chrooted service. The only
+difference is that services sometimes rely on devices and configuration files
+in <path>/etc</path>. Simply copy them (devices can be copied with <c>cp
+-a</c>) to the chrooted environment, edit the init script to use chroot before
+executing. It can be difficult to find what devices and configuration files a
+services need. This is where the <c>strace</c> command becomes handy. Start
+the service with <c>/usr/bin/strace</c> bash and look for open, read, stat and
+maybe connect. This will give you a clue on what files to copy. But in most
+cases just copy the passwd file (edit the copy and remove users that has
+nothing to do with the service), <path>/dev/zero</path>, <path>/dev/log</path>
 and <path>/dev/random</path>.
 </p>
 



1.4                  xml/htdocs/doc/en/security/shb-firewalls.xml

file : 
http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/doc/en/security/shb-firewalls.xml?rev=1.4&view=markup
plain: 
http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/doc/en/security/shb-firewalls.xml?rev=1.4&content-type=text/plain
diff : 
http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/doc/en/security/shb-firewalls.xml?r1=1.3&r2=1.4

Index: shb-firewalls.xml
===================================================================
RCS file: /var/cvsroot/gentoo/xml/htdocs/doc/en/security/shb-firewalls.xml,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -r1.3 -r1.4
--- shb-firewalls.xml   12 Dec 2005 02:10:43 -0000      1.3
+++ shb-firewalls.xml   18 Sep 2006 09:22:48 -0000      1.4
@@ -1,5 +1,5 @@
 <?xml version='1.0' encoding='UTF-8'?>
-<!-- $Header: 
/var/cvsroot/gentoo/xml/htdocs/doc/en/security/shb-firewalls.xml,v 1.3 
2005/12/12 02:10:43 vanquirius Exp $ -->
+<!-- $Header: 
/var/cvsroot/gentoo/xml/htdocs/doc/en/security/shb-firewalls.xml,v 1.4 
2006/09/18 09:22:48 neysx Exp $ -->
 <!DOCTYPE sections SYSTEM "/dtd/book.dtd">
 
 <!-- The content of this document is licensed under the CC-BY-SA license -->
@@ -15,10 +15,10 @@
 <body>
 
 <p>
-People often think that a firewall provides the ultimate security, but they 
-are wrong. In most cases a misconfigured firewall gives less security than 
-not having one at all. A firewall is also a piece of software and should be 
-treated the same way as any other piece of software, because it is just as 
likely 
+People often think that a firewall provides the ultimate security, but they
+are wrong. In most cases a misconfigured firewall gives less security than
+not having one at all. A firewall is also a piece of software and should be
+treated the same way as any other piece of software, because it is just as 
likely
 to contain bugs.
 </p>
 
@@ -101,7 +101,7 @@
 <ul>
 <li>Simple and easy to implement</li>
 <li>
-  Can give warnings of a possible attack before it happens (ie. by detecting 
+  Can give warnings of a possible attack before it happens (ie. by detecting
   port scans)
 </li>
 <li>Good for stopping SYN attacks</li>
@@ -120,7 +120,7 @@
 </ul>
 <!--FIXME: should SmoothWall really be included, since it uses iptables?-->
 <note>
-It is recommended that you use iptables. Ipchains is obsoleted. 
+It is recommended that you use iptables. Ipchains is obsoleted.
 </note>
 
 </body>
@@ -241,7 +241,7 @@
 <p>
 Iptables is the new and heavily improved packet filter in the Linux 2.4.x
 kernel. It is the successor of the previous ipchains packet filter in the Linux
-2.2.x kernel. One of the major improvements is that iptables is able to 
perform 
+2.2.x kernel. One of the major improvements is that iptables is able to perform
 stateful packet filtering. With stateful packet filtering it is possible to
 keep track of each established TCP connection.
 </p>
@@ -273,41 +273,41 @@
 </p>
 
 <p>
-Iptables provides several other features like NAT (Network Address 
Translation) 
-and rate limiting. Rate limiting is extremely useful when trying to prevent 
+Iptables provides several other features like NAT (Network Address Translation)
+and rate limiting. Rate limiting is extremely useful when trying to prevent
 certain DoS (Denial of Service) attacks like SYN floods.
 </p>
 
 <p>
-A TCP connection is established by a so called three-way handshake. When 
-establishing a TCP connection the client-side sends a packet to the server 
-with the SYN flag set. When the server-side receives the SYN packet it 
-responds by sending a SYN+ACK packet back to the client-side. When the SYN+ACK 
-is received the client-side responds with a third ACK packet in effect 
+A TCP connection is established by a so called three-way handshake. When
+establishing a TCP connection the client-side sends a packet to the server
+with the SYN flag set. When the server-side receives the SYN packet it
+responds by sending a SYN+ACK packet back to the client-side. When the SYN+ACK
+is received the client-side responds with a third ACK packet in effect
 acknowledging the connection.
 </p>
 
 <p>
-A SYN flood attack is performed by sending the SYN packet but failing to 
-respond to the SYN+ACK packet. The client-side can forge a packet with a fake 
+A SYN flood attack is performed by sending the SYN packet but failing to
+respond to the SYN+ACK packet. The client-side can forge a packet with a fake
 source IP address because it does not need a reply. The server-side system will
-add an entry to a queue of half-open connections when it receives the SYN 
-packet and then wait for the final ACK packet before deleting the entry from 
-the queue. The queue has a limited number of slots and if all the slots are 
-filled it is unable to open any further connections. If the ACK packet is not 
-received before a specified timeout period the entry will automatically be 
-deleted from the queue. The timeout settings vary but will typically be 30-60 
-seconds or even more. The client-side initiates the attack by forging a lot of 
-SYN packets with different source IP addresses and sends them to the target IP 
-address as fast as possible and thereby filling up the queue of half-open 
+add an entry to a queue of half-open connections when it receives the SYN
+packet and then wait for the final ACK packet before deleting the entry from
+the queue. The queue has a limited number of slots and if all the slots are
+filled it is unable to open any further connections. If the ACK packet is not
+received before a specified timeout period the entry will automatically be
+deleted from the queue. The timeout settings vary but will typically be 30-60
+seconds or even more. The client-side initiates the attack by forging a lot of
+SYN packets with different source IP addresses and sends them to the target IP
+address as fast as possible and thereby filling up the queue of half-open
 connections and thus preventing other clients from establishing a legitimate
 connection with the server.
 </p>
 
 <p>
-This is where the rate limit becomes handy. It is possible to limit the rate 
-of accepted SYN packets by using the <c>-m limit --limit 1/s</c>. This will 
-limit the number of SYN packets accepted to one per second and therefore 
+This is where the rate limit becomes handy. It is possible to limit the rate
+of accepted SYN packets by using the <c>-m limit --limit 1/s</c>. This will
+limit the number of SYN packets accepted to one per second and therefore
 restricting the SYN flood on our resources.
 </p>
 
@@ -324,16 +324,16 @@
 </p>
 
 <p>
-When iptables is loaded in the kernel it has 5 hooks where you can place your 
-rules. They are called <c>INPUT</c>, <c>OUTPUT</c>, <c>FORWARD</c>, 
-<c>PREROUTING</c> and <c>POSTROUTING</c>. Each of these is called a chain and 
-consists of a list of rules. Each rule says if the packet header looks like 
-this, then here is what to do with the packet. If the rule does not match the 
+When iptables is loaded in the kernel it has 5 hooks where you can place your
+rules. They are called <c>INPUT</c>, <c>OUTPUT</c>, <c>FORWARD</c>,
+<c>PREROUTING</c> and <c>POSTROUTING</c>. Each of these is called a chain and
+consists of a list of rules. Each rule says if the packet header looks like
+this, then here is what to do with the packet. If the rule does not match the
 packet the next rule in the chain is consulted.
 </p>
 
 <p>
-You can place rules directly in the 5 main chains or create new chains and add 
+You can place rules directly in the 5 main chains or create new chains and add
 them to as a rule to an existing chain. Iptables supports the following 
options.
 </p>
 
@@ -528,7 +528,7 @@
   <ti>owner</ti>
   <ti>Attempt to match various characteristics of the packet creator</ti>
   <ti>
-    --uid-owner userid --gid-owner groupid --pid-owner processid --sid-owner 
+    --uid-owner userid --gid-owner groupid --pid-owner processid --sid-owner
     sessionid
   </ti>
 </tr>
@@ -539,7 +539,7 @@
 </table>
 
 <p>
-Lets try to create a user-defined chain and apply it to one of the existing 
+Lets try to create a user-defined chain and apply it to one of the existing
 chains:
 </p>
 
@@ -556,7 +556,7 @@
 </pre>
 
 <p>
-By applying the rule to the input chain we get the policy: All outgoing 
packets 
+By applying the rule to the input chain we get the policy: All outgoing packets
 are allowed and all incoming packets are dropped.
 </p>
 
@@ -573,11 +573,11 @@
 <ul>
 <li>Connections to the firewall are only allowed through SSH (port 22)</li>
 <li>
-  The local network should have access to HTTP, HTTPS and SSH (DNS should also 
+  The local network should have access to HTTP, HTTPS and SSH (DNS should also
   be allowed)
 </li>
 <li>
-  ICMP traffic can contain payload and should not be allowed. Of course we 
have 
+  ICMP traffic can contain payload and should not be allowed. Of course we have
   to allow some ICMP traffic.
 </li>
 <li>Port scans should be detected and logged</li>
@@ -621,7 +621,7 @@
   $IPTABLES -N allowed-connection
   $IPTABLES -F allowed-connection
   $IPTABLES -A allowed-connection -m state --state ESTABLISHED,RELATED -j 
ACCEPT
-  $IPTABLES -A allowed-connection -i $IINTERFACE -m limit -j LOG --log-prefix 
\ 
+  $IPTABLES -A allowed-connection -i $IINTERFACE -m limit -j LOG --log-prefix \
       "Bad packet from ${IINTERFACE}:"
   $IPTABLES -A allowed-connection -j DROP
 
@@ -629,9 +629,9 @@
   einfo "Creating icmp chain"
   $IPTABLES -N icmp_allowed
   $IPTABLES -F icmp_allowed
-  $IPTABLES -A icmp_allowed -m state --state NEW -p icmp --icmp-type \ 
+  $IPTABLES -A icmp_allowed -m state --state NEW -p icmp --icmp-type \
       time-exceeded -j ACCEPT
-  $IPTABLES -A icmp_allowed -m state --state NEW -p icmp --icmp-type \ 
+  $IPTABLES -A icmp_allowed -m state --state NEW -p icmp --icmp-type \
       destination-unreachable -j ACCEPT
   $IPTABLES -A icmp_allowed -p icmp -j LOG --log-prefix "Bad ICMP traffic:"
   $IPTABLES -A icmp_allowed -p icmp -j DROP
@@ -641,11 +641,11 @@
   $IPTABLES -N allow-ssh-traffic-in
   $IPTABLES -F allow-ssh-traffic-in
   #Flood protection
-  $IPTABLES -A allow-ssh-traffic-in -m limit --limit 1/second -p tcp 
--tcp-flags \ 
+  $IPTABLES -A allow-ssh-traffic-in -m limit --limit 1/second -p tcp 
--tcp-flags \
       ALL RST --dport ssh -j ACCEPT
-  $IPTABLES -A allow-ssh-traffic-in -m limit --limit 1/second -p tcp 
--tcp-flags \ 
+  $IPTABLES -A allow-ssh-traffic-in -m limit --limit 1/second -p tcp 
--tcp-flags \
       ALL FIN --dport ssh -j ACCEPT
-  $IPTABLES -A allow-ssh-traffic-in -m limit --limit 1/second -p tcp 
--tcp-flags \ 
+  $IPTABLES -A allow-ssh-traffic-in -m limit --limit 1/second -p tcp 
--tcp-flags \
       ALL SYN --dport ssh -j ACCEPT
   $IPTABLES -A allow-ssh-traffic-in -m state --state RELATED,ESTABLISHED -p 
tcp --dport ssh -j ACCEPT
 
@@ -658,9 +658,9 @@
   einfo "Creating outgoing dns traffic chain"
   $IPTABLES -N allow-dns-traffic-out
   $IPTABLES -F allow-dns-traffic-out
-  $IPTABLES -A allow-dns-traffic-out -p udp -d $DNS1 --dport domain \ 
+  $IPTABLES -A allow-dns-traffic-out -p udp -d $DNS1 --dport domain \
       -j ACCEPT
-  $IPTABLES -A allow-dns-traffic-out -p udp -d $DNS2 --dport domain \ 
+  $IPTABLES -A allow-dns-traffic-out -p udp -d $DNS2 --dport domain \
      -j ACCEPT
 
   einfo "Creating outgoing http/https traffic chain"
@@ -673,29 +673,29 @@
   einfo "Creating portscan detection chain"
   $IPTABLES -N check-flags
   $IPTABLES -F check-flags
-  $IPTABLES -A check-flags -p tcp --tcp-flags ALL FIN,URG,PSH -m limit \ 
-      --limit 5/minute -j LOG --log-level alert --log-prefix "NMAP-XMAS:" 
+  $IPTABLES -A check-flags -p tcp --tcp-flags ALL FIN,URG,PSH -m limit \
+      --limit 5/minute -j LOG --log-level alert --log-prefix "NMAP-XMAS:"
   $IPTABLES -A check-flags -p tcp --tcp-flags ALL FIN,URG,PSH -j DROP
-  $IPTABLES -A check-flags -p tcp --tcp-flags ALL ALL -m limit --limit \ 
+  $IPTABLES -A check-flags -p tcp --tcp-flags ALL ALL -m limit --limit \
       5/minute -j LOG --log-level 1 --log-prefix "XMAS:"
   $IPTABLES -A check-flags -p tcp --tcp-flags ALL ALL -j DROP
-  $IPTABLES -A check-flags -p tcp --tcp-flags ALL SYN,RST,ACK,FIN,URG \ 
+  $IPTABLES -A check-flags -p tcp --tcp-flags ALL SYN,RST,ACK,FIN,URG \
       -m limit --limit 5/minute -j LOG --log-level 1 --log-prefix "XMAS-PSH:"
   $IPTABLES -A check-flags -p tcp --tcp-flags ALL SYN,RST,ACK,FIN,URG -j DROP
-  $IPTABLES -A check-flags -p tcp --tcp-flags ALL NONE -m limit \ 
+  $IPTABLES -A check-flags -p tcp --tcp-flags ALL NONE -m limit \
       --limit 5/minute -j LOG --log-level 1 --log-prefix "NULL_SCAN:"
   $IPTABLES -A check-flags -p tcp --tcp-flags ALL NONE -j DROP
-  $IPTABLES -A check-flags -p tcp --tcp-flags SYN,RST SYN,RST -m limit \ 
+  $IPTABLES -A check-flags -p tcp --tcp-flags SYN,RST SYN,RST -m limit \
       --limit 5/minute -j LOG --log-level 5 --log-prefix "SYN/RST:"
   $IPTABLES -A check-flags -p tcp --tcp-flags SYN,RST SYN,RST -j DROP
-  $IPTABLES -A check-flags -p tcp --tcp-flags SYN,FIN SYN,FIN -m limit \ 
+  $IPTABLES -A check-flags -p tcp --tcp-flags SYN,FIN SYN,FIN -m limit \
       --limit 5/minute -j LOG --log-level 5 --log-prefix "SYN/FIN:"
   $IPTABLES -A check-flags -p tcp --tcp-flags SYN,FIN SYN,FIN -j DROP
 
   # Apply and add invalid states to the chains
   einfo "Applying chains to INPUT"
   $IPTABLES -A INPUT -m state --state INVALID -j DROP
-  $IPTABLES -A INPUT -j icmp_allowed 
+  $IPTABLES -A INPUT -j icmp_allowed
   $IPTABLES -A INPUT -j check-flags
   $IPTABLES -A INPUT -i lo -j ACCEPT
   $IPTABLES -A INPUT -j allow-ssh-traffic-in
@@ -703,7 +703,7 @@
 
   einfo "Applying chains to FORWARD"
   $IPTABLES -A FORWARD -m state --state INVALID -j DROP
-  $IPTABLES -A FORWARD -j icmp_allowed 
+  $IPTABLES -A FORWARD -j icmp_allowed
   $IPTABLES -A FORWARD -j check-flags
   $IPTABLES -A FORWARD -o lo -j ACCEPT
   $IPTABLES -A FORWARD -j allow-ssh-traffic-in
@@ -721,7 +721,7 @@
   $IPTABLES -A OUTPUT -j allowed-connection
 
   #Allow client to route through via NAT (Network Address Translation)
-  $IPTABLES -t nat -A POSTROUTING -o $IINTERFACE -j MASQUERADE 
+  $IPTABLES -t nat -A POSTROUTING -o $IINTERFACE -j MASQUERADE
   eend $?
 }
 
@@ -791,7 +791,7 @@
   echo "rules)      force settings of new rules"
   echo "save)       will store settings in ${FIREWALL}"
   echo "restore)    will restore settings from ${FIREWALL}"
-  echo "showstatus) Shows the status" 
+  echo "showstatus) Shows the status"
 }
 </pre>
 
@@ -831,7 +831,7 @@
 browser, authenticated user name, MIME type, and port number (protocol). I
 probably forgot some features, but it can be hard to cover the entire list 
right
 here.
-</p> 
+</p>
 
 <p>
 In the following example I have added a banner filter instead of a filter based



1.3                  xml/htdocs/doc/en/security/shb-intrusion.xml

file : 
http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/doc/en/security/shb-intrusion.xml?rev=1.3&view=markup
plain: 
http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/doc/en/security/shb-intrusion.xml?rev=1.3&content-type=text/plain
diff : 
http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/doc/en/security/shb-intrusion.xml?r1=1.2&r2=1.3

Index: shb-intrusion.xml
===================================================================
RCS file: /var/cvsroot/gentoo/xml/htdocs/doc/en/security/shb-intrusion.xml,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -r1.2 -r1.3
--- shb-intrusion.xml   23 Nov 2005 18:02:07 -0000      1.2
+++ shb-intrusion.xml   18 Sep 2006 09:22:48 -0000      1.3
@@ -1,5 +1,5 @@
 <?xml version='1.0' encoding='UTF-8'?>
-<!-- $Header: 
/var/cvsroot/gentoo/xml/htdocs/doc/en/security/shb-intrusion.xml,v 1.2 
2005/11/23 18:02:07 neysx Exp $ -->
+<!-- $Header: 
/var/cvsroot/gentoo/xml/htdocs/doc/en/security/shb-intrusion.xml,v 1.3 
2006/09/18 09:22:48 neysx Exp $ -->
 <!DOCTYPE sections SYSTEM "/dtd/book.dtd">
 
 <!-- The content of this document is licensed under the CC-BY-SA license -->
@@ -196,7 +196,7 @@
 </table>
 
 <p>
-Now you can create you own rules based on the above flags by combining them 
+Now you can create you own rules based on the above flags by combining them
 like this:
 </p>
 
@@ -232,11 +232,11 @@
 </p>
 
 <pre caption="/etc/aide/aide.conf">
-@@ifndef TOPDIR 
+@@ifndef TOPDIR
 @@define TOPDIR /
 @@endif
 
-@@ifndef AIDEDIR 
+@@ifndef AIDEDIR
 @@define AIDEDIR /etc/aide
 @@endif
 
@@ -278,7 +278,7 @@
 when checking for file integrity. But when updating or creating a new file it
 stores the information in <path>/etc/aide/aide.db.new</path>. This is done so 
it
 won't automatically overwrite the old db file. The option
-<c>report_URL</c> is not yet implemented, but the author's intention was that 
+<c>report_URL</c> is not yet implemented, but the author's intention was that
 it should be able to e-mail or maybe even execute scripts.
 </p>
 
@@ -456,7 +456,7 @@
 
 <p>
 The best way to use <c>chkrootkit</c> to detect an intrusion is to run it
-routinely from <c>cron</c>. To start, emerge 
<path>app-admin/chkrootkit</path>. 
+routinely from <c>cron</c>. To start, emerge <path>app-admin/chkrootkit</path>.
 <c>chkrootkit</c> can be run from the command line by the command of the same
 name, or from <c>cron</c> with an entry such as this:
 </p>



1.3                  xml/htdocs/doc/en/security/shb-kernel.xml

file : 
http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/doc/en/security/shb-kernel.xml?rev=1.3&view=markup
plain: 
http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/doc/en/security/shb-kernel.xml?rev=1.3&content-type=text/plain
diff : 
http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/doc/en/security/shb-kernel.xml?r1=1.2&r2=1.3

Index: shb-kernel.xml
===================================================================
RCS file: /var/cvsroot/gentoo/xml/htdocs/doc/en/security/shb-kernel.xml,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -r1.2 -r1.3
--- shb-kernel.xml      4 Aug 2006 10:01:50 -0000       1.2
+++ shb-kernel.xml      18 Sep 2006 09:22:48 -0000      1.3
@@ -1,5 +1,5 @@
 <?xml version='1.0' encoding='UTF-8'?>
-<!-- $Header: /var/cvsroot/gentoo/xml/htdocs/doc/en/security/shb-kernel.xml,v 
1.2 2006/08/04 10:01:50 rane Exp $ -->
+<!-- $Header: /var/cvsroot/gentoo/xml/htdocs/doc/en/security/shb-kernel.xml,v 
1.3 2006/09/18 09:22:48 neysx Exp $ -->
 <!DOCTYPE sections SYSTEM "/dtd/book.dtd">
 
 <!-- The content of this document is licensed under the CC-BY-SA license -->
@@ -40,7 +40,7 @@
 <p>
 To dynamically change kernel parameters and variables on the fly, you need
 <c>CONFIG_SYSCTL</c> defined in your kernel. This is on by default in
-a standard 2.4 kernel. 
+a standard 2.4 kernel.
 </p>
 
 <pre caption="Deactivate IP forwarding">
@@ -215,7 +215,7 @@
 </ul>
 
 <p>
-And there are probably a lot more. 
+And there are probably a lot more.
 </p>
 
 </body>



1.5                  xml/htdocs/doc/en/security/shb-limits.xml

file : 
http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/doc/en/security/shb-limits.xml?rev=1.5&view=markup
plain: 
http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/doc/en/security/shb-limits.xml?rev=1.5&content-type=text/plain
diff : 
http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/doc/en/security/shb-limits.xml?r1=1.4&r2=1.5

Index: shb-limits.xml
===================================================================
RCS file: /var/cvsroot/gentoo/xml/htdocs/doc/en/security/shb-limits.xml,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -r1.4 -r1.5
--- shb-limits.xml      26 Feb 2006 12:37:22 -0000      1.4
+++ shb-limits.xml      18 Sep 2006 09:22:48 -0000      1.5
@@ -1,5 +1,5 @@
 <?xml version='1.0' encoding='UTF-8'?>
-<!-- $Header: /var/cvsroot/gentoo/xml/htdocs/doc/en/security/shb-limits.xml,v 
1.4 2006/02/26 12:37:22 nightmorph Exp $ -->
+<!-- $Header: /var/cvsroot/gentoo/xml/htdocs/doc/en/security/shb-limits.xml,v 
1.5 2006/09/18 09:22:48 neysx Exp $ -->
 <!DOCTYPE sections SYSTEM "/dtd/book.dtd">
 
 <!-- The content of this document is licensed under the CC-BY-SA license -->
@@ -41,7 +41,7 @@
 </p>
 
 <note>
-<path>/etc/security/limits.conf</path> is part of the PAM package and will 
+<path>/etc/security/limits.conf</path> is part of the PAM package and will
 only apply to packages that use PAM.
 </note>
 
@@ -52,7 +52,7 @@
 <body>
 
 <p>
-<path>/etc/limits</path> is very similar to the limit file 
+<path>/etc/limits</path> is very similar to the limit file
 <path>/etc/security/limits.conf</path>. The only difference is the format and
 that it only works on users or wild cards (not groups). Let's have a look at a
 sample configuration:
@@ -97,7 +97,7 @@
 
 <p>
 Start by installing quotas with <c>emerge quota</c>. Then modify your
-<path>/etc/fstab</path> and add <c>usrquota</c> and <c>grpquota</c> to the 
+<path>/etc/fstab</path> and add <c>usrquota</c> and <c>grpquota</c> to the
 partitions that you want to restrict disk usage on, like in the example below.
 </p>
 
@@ -153,8 +153,8 @@
 </p>
 
 <pre caption="Setting up quota's for user kn">
-Quotas for user kn: 
-/dev/sda4: blocks in use: 2594, limits (soft = 5000, hard = 6500) 
+Quotas for user kn:
+/dev/sda4: blocks in use: 2594, limits (soft = 5000, hard = 6500)
          inodes in use: 356, limits (soft = 1000, hard = 1500)
 </pre>
 
@@ -168,7 +168,7 @@
 <section>
 <title>/etc/login.defs</title>
 <body>
-    
+
 <p>
 If your security policy states that users should change their password
 every other week, change the value <c>PASS_MAX_DAYS</c> to 14
@@ -203,19 +203,19 @@
 </pre>
 
 <impo>
-Be careful when configuring these options, since mistakes will leave you 
+Be careful when configuring these options, since mistakes will leave you
 with no access to the machine if you do not have root access.
 </impo>
 
 <note>
-These settings do not apply to SSH, since SSH does not execute 
-<c>/bin/login</c> per default. This can be enabled by setting <c>UseLogin 
-yes</c> in <path>/etc/ssh/sshd_config</path>. 
+These settings do not apply to SSH, since SSH does not execute
+<c>/bin/login</c> per default. This can be enabled by setting <c>UseLogin
+yes</c> in <path>/etc/ssh/sshd_config</path>.
 </note>
 
 <p>
-This will setup login access so members of the wheel group can login locally 
-or from the gentoo.org domain. Maybe too paranoid, but better to be safe than 
+This will setup login access so members of the wheel group can login locally
+or from the gentoo.org domain. Maybe too paranoid, but better to be safe than
 sorry.
 </p>
 



1.4                  xml/htdocs/doc/en/security/shb-logging.xml

file : 
http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/doc/en/security/shb-logging.xml?rev=1.4&view=markup
plain: 
http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/doc/en/security/shb-logging.xml?rev=1.4&content-type=text/plain
diff : 
http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/doc/en/security/shb-logging.xml?r1=1.3&r2=1.4

Index: shb-logging.xml
===================================================================
RCS file: /var/cvsroot/gentoo/xml/htdocs/doc/en/security/shb-logging.xml,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -r1.3 -r1.4
--- shb-logging.xml     25 Nov 2005 13:54:03 -0000      1.3
+++ shb-logging.xml     18 Sep 2006 09:22:48 -0000      1.4
@@ -1,5 +1,5 @@
 <?xml version='1.0' encoding='UTF-8'?>
-<!-- $Header: /var/cvsroot/gentoo/xml/htdocs/doc/en/security/shb-logging.xml,v 
1.3 2005/11/25 13:54:03 neysx Exp $ -->
+<!-- $Header: /var/cvsroot/gentoo/xml/htdocs/doc/en/security/shb-logging.xml,v 
1.4 2006/09/18 09:22:48 neysx Exp $ -->
 <!DOCTYPE sections SYSTEM "/dtd/book.dtd">
 
 <!-- The content of this document is licensed under the CC-BY-SA license -->
@@ -31,17 +31,17 @@
 <body>
 
 <p>
-Syslogd is the most common logger for Linux and Unix in general. 
-It has some log rotation facilities, but using 
+Syslogd is the most common logger for Linux and Unix in general.
+It has some log rotation facilities, but using
 <path>/usr/sbin/logrotate</path> in a cron job (logrotate is configured in
 <path>/etc/logrotate.conf</path>) might prove to be more powerful as
-<c>logrotate</c> has many features. How often 
+<c>logrotate</c> has many features. How often
 log rotation should be done depends on the system load.
 </p>
 
 <p>
-Below is the standard <path>syslog.conf</path> with some added features. We 
-have uncommented the <c>cron</c> and <c>tty</c> lines and added a remote 
+Below is the standard <path>syslog.conf</path> with some added features. We
+have uncommented the <c>cron</c> and <c>tty</c> lines and added a remote
 logging server. To further enhance security you could add logging to two 
places.
 </p>
 
@@ -113,7 +113,7 @@
 
 # The named pipe /dev/xconsole is for the `xconsole' utility.  To use it,
 # you must invoke `xconsole' with the `-file' option:
-# 
+#
 #    $ xconsole -file /dev/xconsole [...]
 #
 # NOTE: adjust the list below, or you'll go crazy if you have a reasonably
@@ -147,7 +147,7 @@
 facility (like syslogd), and comes with regular expression matching with which
 you can launch external scripts when specific patterns are found. It is very 
good
 at taking action when needed.
-</p> 
+</p>
 
 <p>
 The standard configuration is usually enough.  If you want to be notified by
@@ -170,18 +170,18 @@
 <pre caption="/usr/local/sbin/mail_pwd_failures.sh for qmail">
 #!/bin/sh
 echo "To: root
-Subject:Failure (Warning: $2) 
+Subject:Failure (Warning: $2)
 $3
 " | /var/qmail/bin/qmail-inject -f root
 </pre>
 
 <p>
-Remember to make the script executable by issuing <c>/bin/chmod +x 
+Remember to make the script executable by issuing <c>/bin/chmod +x
 /usr/local/sbin/mail_pwd_failures.sh</c>
 </p>
 
 <p>
-Then uncomment the command line under "Password failures" in 
+Then uncomment the command line under "Password failures" in
 <path>/etc/metalog/metalog.conf</path> like:
 </p>
 
@@ -248,7 +248,7 @@
 filter f_mail { facility(mail); };
 filter f_user { facility(user); };
 filter f_debug { not facility(auth, authpriv, news, mail); };
-filter f_messages { level(info..warn) 
+filter f_messages { level(info..warn)
         and not facility(auth, authpriv, mail, news); };
 filter f_emergency { level(emerg); };
 



1.3                  xml/htdocs/doc/en/security/shb-mounting.xml

file : 
http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/doc/en/security/shb-mounting.xml?rev=1.3&view=markup
plain: 
http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/doc/en/security/shb-mounting.xml?rev=1.3&content-type=text/plain
diff : 
http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/doc/en/security/shb-mounting.xml?r1=1.2&r2=1.3

Index: shb-mounting.xml
===================================================================
RCS file: /var/cvsroot/gentoo/xml/htdocs/doc/en/security/shb-mounting.xml,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -r1.2 -r1.3
--- shb-mounting.xml    1 Jun 2005 17:42:46 -0000       1.2
+++ shb-mounting.xml    18 Sep 2006 09:22:48 -0000      1.3
@@ -1,5 +1,5 @@
 <?xml version='1.0' encoding='UTF-8'?>
-<!-- $Header: 
/var/cvsroot/gentoo/xml/htdocs/doc/en/security/shb-mounting.xml,v 1.2 
2005/06/01 17:42:46 neysx Exp $ -->
+<!-- $Header: 
/var/cvsroot/gentoo/xml/htdocs/doc/en/security/shb-mounting.xml,v 1.3 
2006/09/18 09:22:48 neysx Exp $ -->
 <!DOCTYPE sections SYSTEM "/dtd/book.dtd">
 
 <!-- The content of this document is licensed under the CC-BY-SA license -->
@@ -22,7 +22,7 @@
 
 <ul>
 <li>
-  <c>nosuid</c> - Will ignore the SUID bit and make it just like an ordinary 
+  <c>nosuid</c> - Will ignore the SUID bit and make it just like an ordinary
   file
 </li>
 <li>
@@ -63,14 +63,14 @@
 <note>
 I do not set <path>/var</path> to <c>noexec</c> or <c>nosuid</c>, even if files
 normally are never executed from this mount point. The reason for this is that
-qmail is installed in <path>/var/qmail</path> and must be allowed to execute 
-and access one SUID file. I setup <path>/usr</path> in read-only mode since I 
-never write anything there unless I want to update Gentoo. Then I remount the 
+qmail is installed in <path>/var/qmail</path> and must be allowed to execute
+and access one SUID file. I setup <path>/usr</path> in read-only mode since I
+never write anything there unless I want to update Gentoo. Then I remount the
 file system in read-write mode, update and remount again.
 </note>
 
 <note>
-Even if you do not use qmail, Gentoo still needs the executable bit set on 
+Even if you do not use qmail, Gentoo still needs the executable bit set on
 <path>/var/tmp</path> since ebuilds are made here. But an alternative path can
 be setup if you insist on having <path>/var</path> mounted in <c>noexec</c>
 mode.



1.4                  xml/htdocs/doc/en/security/shb-pam.xml

file : 
http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/doc/en/security/shb-pam.xml?rev=1.4&view=markup
plain: 
http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/doc/en/security/shb-pam.xml?rev=1.4&content-type=text/plain
diff : 
http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/doc/en/security/shb-pam.xml?r1=1.3&r2=1.4

Index: shb-pam.xml
===================================================================
RCS file: /var/cvsroot/gentoo/xml/htdocs/doc/en/security/shb-pam.xml,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -r1.3 -r1.4
--- shb-pam.xml 4 Aug 2006 10:20:13 -0000       1.3
+++ shb-pam.xml 18 Sep 2006 09:22:48 -0000      1.4
@@ -1,5 +1,5 @@
 <?xml version='1.0' encoding='UTF-8'?>
-<!-- $Header: /var/cvsroot/gentoo/xml/htdocs/doc/en/security/shb-pam.xml,v 1.3 
2006/08/04 10:20:13 rane Exp $ -->
+<!-- $Header: /var/cvsroot/gentoo/xml/htdocs/doc/en/security/shb-pam.xml,v 1.4 
2006/09/18 09:22:48 neysx Exp $ -->
 <!DOCTYPE sections SYSTEM "/dtd/book.dtd">
 
 <!-- The content of this document is licensed under the CC-BY-SA license -->
@@ -43,7 +43,7 @@
 </p>
 
 <pre caption="/etc/pam.d/sshd">
-auth     required pam_unix.so nullok 
+auth     required pam_unix.so nullok
 auth     required pam_shells.so
 auth     required pam_nologin.so
 auth     required pam_env.so
@@ -65,13 +65,13 @@
 </p>
 
 <pre caption="/etc/pam.d/other">
-auth     required pam_deny.so 
-auth     required pam_warn.so 
-account  required pam_deny.so 
-account  required pam_warn.so 
-password required pam_deny.so 
-password required pam_warn.so 
-session  required pam_deny.so 
+auth     required pam_deny.so
+auth     required pam_warn.so
+account  required pam_deny.so
+account  required pam_warn.so
+password required pam_deny.so
+password required pam_warn.so
+session  required pam_deny.so
 session  required pam_warn.so
 </pre>
 



1.4                  xml/htdocs/doc/en/security/shb-perms.xml

file : 
http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/doc/en/security/shb-perms.xml?rev=1.4&view=markup
plain: 
http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/doc/en/security/shb-perms.xml?rev=1.4&content-type=text/plain
diff : 
http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/doc/en/security/shb-perms.xml?r1=1.3&r2=1.4

Index: shb-perms.xml
===================================================================
RCS file: /var/cvsroot/gentoo/xml/htdocs/doc/en/security/shb-perms.xml,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -r1.3 -r1.4
--- shb-perms.xml       16 Sep 2006 20:52:02 -0000      1.3
+++ shb-perms.xml       18 Sep 2006 09:22:48 -0000      1.4
@@ -1,5 +1,5 @@
 <?xml version='1.0' encoding='UTF-8'?>
-<!-- $Header: /var/cvsroot/gentoo/xml/htdocs/doc/en/security/shb-perms.xml,v 
1.3 2006/09/16 20:52:02 neysx Exp $ -->
+<!-- $Header: /var/cvsroot/gentoo/xml/htdocs/doc/en/security/shb-perms.xml,v 
1.4 2006/09/18 09:22:48 neysx Exp $ -->
 <!DOCTYPE sections SYSTEM "/dtd/book.dtd">
 
 <!-- The content of this document is licensed under the CC-BY-SA license -->
@@ -117,33 +117,33 @@
 <body>
 
 <p>
-A file is only considered deleted when there are no more links pointing to it. 
-This might sound like a strange concept, but consider that a filename like 
-<path>/usr/bin/perl</path> is actually a link to the inode where the data is 
+A file is only considered deleted when there are no more links pointing to it.
+This might sound like a strange concept, but consider that a filename like
+<path>/usr/bin/perl</path> is actually a link to the inode where the data is
 stored. Any number of links can point to the file, and until all of them are
 gone, the file still exists.
 </p>
 
 <p>
 If your users have access to a partition that isn't mounted with <c>nosuid</c>
-or <c>noexec</c> (for example, if <path>/tmp</path>, <path>/home</path>, or 
-<path>/var/tmp</path> are not separate partitions) you should take care to 
-ensure your users don't create hard links to SUID or SGID binaries, so that 
+or <c>noexec</c> (for example, if <path>/tmp</path>, <path>/home</path>, or
+<path>/var/tmp</path> are not separate partitions) you should take care to
+ensure your users don't create hard links to SUID or SGID binaries, so that
 after Portage updates they still have access to the old versions.
 </p>
 
 <warn>
-if you have received a warning from portage about remaining hard links, and 
your 
-users can write to a partition that allows executing SUID/SGID files, you 
-should read this section carefully. One of your users may be attempting to 
-circumvent your update by keeping an outdated version of a program. If your 
+if you have received a warning from portage about remaining hard links, and 
your
+users can write to a partition that allows executing SUID/SGID files, you
+should read this section carefully. One of your users may be attempting to
+circumvent your update by keeping an outdated version of a program. If your
 users cannot create their own SUID files, or can only execute programs using
-the dynamic loader (partitions mounted <c>noexec</c>), you do not have to 
+the dynamic loader (partitions mounted <c>noexec</c>), you do not have to
 worry.
 </warn>
 
 <note>
-Users do not need read access to a file to create a link to it, they only need 
+Users do not need read access to a file to create a link to it, they only need
 read permission to the directory that contains it.
 </note>
 
@@ -152,7 +152,7 @@
 </p>
 
 <pre caption="Stat command">
-$ stat /bin/su    
+$ stat /bin/su
   File: `/bin/su'
   Size: 29350           Blocks: 64         IO Block: 131072 regular file
 Device: 900h/2304d      Inode: 2057419     Links: 1



1.3                  xml/htdocs/doc/en/security/shb-pre.xml

file : 
http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/doc/en/security/shb-pre.xml?rev=1.3&view=markup
plain: 
http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/doc/en/security/shb-pre.xml?rev=1.3&content-type=text/plain
diff : 
http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/doc/en/security/shb-pre.xml?r1=1.2&r2=1.3

Index: shb-pre.xml
===================================================================
RCS file: /var/cvsroot/gentoo/xml/htdocs/doc/en/security/shb-pre.xml,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -r1.2 -r1.3
--- shb-pre.xml 1 Jun 2005 17:42:46 -0000       1.2
+++ shb-pre.xml 18 Sep 2006 09:22:48 -0000      1.3
@@ -1,5 +1,5 @@
 <?xml version='1.0' encoding='UTF-8'?>
-<!-- $Header: /var/cvsroot/gentoo/xml/htdocs/doc/en/security/shb-pre.xml,v 1.2 
2005/06/01 17:42:46 neysx Exp $ -->
+<!-- $Header: /var/cvsroot/gentoo/xml/htdocs/doc/en/security/shb-pre.xml,v 1.3 
2006/09/18 09:22:48 neysx Exp $ -->
 <!DOCTYPE sections SYSTEM "/dtd/book.dtd">
 
 <!-- The content of this document is licensed under the CC-BY-SA license -->
@@ -62,7 +62,7 @@
 
 <ul>
 <li>
-  Any directory tree a user should be able to write to (e.g. 
<path>/home</path>, 
+  Any directory tree a user should be able to write to (e.g. 
<path>/home</path>,
   <path>/tmp</path>) should be on a separate partition and use disk quotas. 
This
   reduces the risk of a user filling up your whole filesystem. Portage
   uses <path>/var/tmp</path> to compile files, so that partition should be 
large.
@@ -143,7 +143,7 @@
 <p>
 There are several reasons to draft a security policy for your system(s) and
 network.
-</p> 
+</p>
 
 <ul>
 <li>



1.4                  xml/htdocs/doc/en/security/shb-services.xml

file : 
http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/doc/en/security/shb-services.xml?rev=1.4&view=markup
plain: 
http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/doc/en/security/shb-services.xml?rev=1.4&content-type=text/plain
diff : 
http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/doc/en/security/shb-services.xml?r1=1.3&r2=1.4

Index: shb-services.xml
===================================================================
RCS file: /var/cvsroot/gentoo/xml/htdocs/doc/en/security/shb-services.xml,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -r1.3 -r1.4
--- shb-services.xml    11 Mar 2006 16:44:44 -0000      1.3
+++ shb-services.xml    18 Sep 2006 09:22:48 -0000      1.4
@@ -1,5 +1,5 @@
 <?xml version='1.0' encoding='UTF-8'?>
-<!-- $Header: 
/var/cvsroot/gentoo/xml/htdocs/doc/en/security/shb-services.xml,v 1.3 
2006/03/11 16:44:44 swift Exp $ -->
+<!-- $Header: 
/var/cvsroot/gentoo/xml/htdocs/doc/en/security/shb-services.xml,v 1.4 
2006/09/18 09:22:48 neysx Exp $ -->
 <!DOCTYPE sections SYSTEM "/dtd/book.dtd">
 
 <!-- The content of this document is licensed under the CC-BY-SA license -->
@@ -35,8 +35,8 @@
 #Make it listen on your ip
 Listen 127.0.0.1
 BindAddress 127.0.0.1
-#It is not a good idea to use nobody or nogroup - 
-#for every service not running as root 
+#It is not a good idea to use nobody or nogroup -
+#for every service not running as root
 #(just add the user apache with group apache)
 User apache
 Group apache
@@ -46,7 +46,7 @@
 </pre>
 
 <p>
-Apache is compiled with <c>--enable-shared=max</c> and 
+Apache is compiled with <c>--enable-shared=max</c> and
 <c>--enable-module=all</c>. This will by default enable all modules, so you
 should comment out all modules in the <c>LoadModule</c> section
 (<c>LoadModule</c> and <c>AddModule</c>) that you do not use. Restart the
@@ -72,13 +72,13 @@
 </p>
 
 <p>
-The newer BIND ebuilds support chrooting out of the box. After emerging 
+The newer BIND ebuilds support chrooting out of the box. After emerging
 <c>bind</c> follow these simple instructions:
 </p>
 
 <pre caption="Chrooting BIND">
 ebuild /var/db/pkg/net-dns/bind-9.2.2-r2/bind-9.2.2-r2.ebuild config\`"
-<comment>(Before running the above command you might want to change the chroot 
+<comment>(Before running the above command you might want to change the chroot
 directory in /etc/conf.d/named. Otherwise /chroot/dns will be used.)</comment>
 <comment>(You might need to substitute the version number with the current 
version number )</comment>
 </pre>
@@ -118,7 +118,7 @@
 <body>
 
 <p>
-If you only need local applications to access the <c>mysql</c> database, 
+If you only need local applications to access the <c>mysql</c> database,
 uncomment the following line in <path>/etc/mysql/my.cnf</path>.
 </p>
 
@@ -227,7 +227,7 @@
 <p>
 Use virtual users (never system accounts) by enabling the <c>AUTH</c> option.
 Set this to <c>-lpuredb:/etc/pureftpd.pdb</c> and create your users by using
-<c>/usr/bin/pure-pw</c>. 
+<c>/usr/bin/pure-pw</c>.
 </p>
 
 <pre caption="/etc/conf.d/pure-ftpd">
@@ -261,7 +261,7 @@
 
 <p>
 Vsftpd (short for very secure ftp) is a small ftp daemon running a reasonably
-default configuration. It is simple and does not have as many features as 
+default configuration. It is simple and does not have as many features as
 pureftp and proftp.
 </p>
 
@@ -327,7 +327,7 @@
   #allow traffic from 10.0.0.*
   hosts allow = 10.0.0.
 
-  #Enables user authentication 
+  #Enables user authentication
   #(don't use the share mode)
   security = user
 
@@ -366,7 +366,7 @@
 <p>
 The only securing that OpenSSH needs is turning on a stronger authentication
 based on public key encryption. Too many sites (like
-<uri>http://www.sourceforge.net</uri>, <uri>http://www.php.net</uri> and 
+<uri>http://www.sourceforge.net</uri>, <uri>http://www.php.net</uri> and
 <uri>http://www.apache.org</uri>) have suffered unauthorized intrusion
 due to password leaks or bad passwords.
 </p>
@@ -391,11 +391,11 @@
 AllowGroups wheel admin
 
 #In those groups only allow the following users
-#The @&lt;domainname&gt; is optional but replaces the 
+#The @&lt;domainname&gt; is optional but replaces the
 #older AllowHosts directive
 AllowUsers [EMAIL PROTECTED] [EMAIL PROTECTED]
 
-#Logging 
+#Logging
 SyslogFacility AUTH
 LogLevel INFO
 
@@ -433,8 +433,8 @@
 </pre>
 
 <p>
-This will add two files in your <path>~/.ssh/</path> directory called 
-<path>id_dsa</path> and <path>id_dsa.pub</path>. The file called 
+This will add two files in your <path>~/.ssh/</path> directory called
+<path>id_dsa</path> and <path>id_dsa.pub</path>. The file called
 <path>id_dsa</path> is your private key and should be kept from other people
 than yourself. The other file <path>id_dsa.pub</path> is to be distributed to
 every server that you have access to. Add the key to the users home directory
@@ -444,7 +444,7 @@
 <pre caption="Adding the id_dsa.pub file to the authorized_keys file">
 $ <i>scp id_dsa.pub other-host:/var/tmp/currenthostname.pub</i>
 $ <i>ssh other-host</i>
-password: 
+password:
 $ <i>cat /var/tmp/currenthostname.pub >> ~/.ssh/authorized_keys</i>
 </pre>
 
@@ -466,10 +466,10 @@
 <body>
 
 <p>
-xinetd is a replacement for <c>inetd</c> (which Gentoo does not have), 
+xinetd is a replacement for <c>inetd</c> (which Gentoo does not have),
 the Internet services daemon. It supports access control based on the address 
of
-the remote host and the time of access. It also provide extensive logging 
-capabilities, including server start time, remote host address, remote user 
+the remote host and the time of access. It also provide extensive logging
+capabilities, including server start time, remote host address, remote user
 name, server run time, and actions requested.
 </p>
 
@@ -506,10 +506,10 @@
 # bind the interfaces to only 1 ip
 # allow access from 10.0.0.*
 # limit the time developers can use cvs from 8am to 5pm
-# use tpcd wrappers (access control controlled in 
+# use tpcd wrappers (access control controlled in
 # <i>/etc/hosts.allow</i> and <i>/etc/hosts.deny</i>)
 # max_load on the machine set to 1.0
-# The disable flag is per default set to no but I like having 
+# The disable flag is per default set to no but I like having
 # it in case of it should be disabled
 service cvspserver
 {
@@ -547,28 +547,28 @@
 </p>
 
 <impo>
-If you do not need this service disable it! 
+If you do not need this service disable it!
 </impo>
 
 <p>
-But if you depend on using your workstation as a Xserver use the 
-<c>/usr/X11R6/bin/xhost</c> command with caution. This command allows clients 
-from other hosts to connect and use your display. This can become handy if you 
-need an X application from a different machine and the only way is through the 
+But if you depend on using your workstation as a Xserver use the
+<c>/usr/X11R6/bin/xhost</c> command with caution. This command allows clients
+from other hosts to connect and use your display. This can become handy if you
+need an X application from a different machine and the only way is through the
 network, but it can also be exploited by an attacker. The syntax of this
 command is <c>/usr/X11R6/bin/xhost +hostname</c>
 </p>
 
 <warn>
-Do not ever use the <c>xhost +</c> feature! This will allow any client to 
-connect and take control of your X. If an attacker can get access to your X, 
-he can log your keystrokes and take control over your desktop. If you have to 
+Do not ever use the <c>xhost +</c> feature! This will allow any client to
+connect and take control of your X. If an attacker can get access to your X,
+he can log your keystrokes and take control over your desktop. If you have to
 use it always remember to specify a host.
 </warn>
 
 <p>
-A more secure solution is to disable this feature completely by starting X 
with 
-<c>startx -- -nolisten tcp</c> or disable it permanently in the configuration. 
+A more secure solution is to disable this feature completely by starting X with
+<c>startx -- -nolisten tcp</c> or disable it permanently in the configuration.
 </p>
 
 <pre caption="/usr/X11R6/bin/startx">
@@ -603,7 +603,7 @@
 </p>
 
 <pre caption="/etc/X11/xdm/Xservers">
-:0 local /usr/bin/X11/X -nolisten tcp 
+:0 local /usr/bin/X11/X -nolisten tcp
 </pre>
 
 </body>



1.3                  xml/htdocs/doc/en/security/shb-tight.xml

file : 
http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/doc/en/security/shb-tight.xml?rev=1.3&view=markup
plain: 
http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/doc/en/security/shb-tight.xml?rev=1.3&content-type=text/plain
diff : 
http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/doc/en/security/shb-tight.xml?r1=1.2&r2=1.3

Index: shb-tight.xml
===================================================================
RCS file: /var/cvsroot/gentoo/xml/htdocs/doc/en/security/shb-tight.xml,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -r1.2 -r1.3
--- shb-tight.xml       4 Mar 2006 05:58:44 -0000       1.2
+++ shb-tight.xml       18 Sep 2006 09:22:48 -0000      1.3
@@ -1,5 +1,5 @@
 <?xml version='1.0' encoding='UTF-8'?>
-<!-- $Header: /var/cvsroot/gentoo/xml/htdocs/doc/en/security/shb-tight.xml,v 
1.2 2006/03/04 05:58:44 fox2mike Exp $ -->
+<!-- $Header: /var/cvsroot/gentoo/xml/htdocs/doc/en/security/shb-tight.xml,v 
1.3 2006/09/18 09:22:48 neysx Exp $ -->
 <!DOCTYPE sections SYSTEM "/dtd/book.dtd">
 
 <!-- The content of this document is licensed under the CC-BY-SA license -->
@@ -66,7 +66,7 @@
 grub> <i>md5crypt</i>
 
 Password: <i>********</i>
-<comment>(Typed changeme at the prompt)</comment> 
+<comment>(Typed changeme at the prompt)</comment>
 Encrypted: $1$T7/dgdIJ$dJM.n2wZ8RG.oEiIOwJUs.
 
 grub> <i>quit</i>
@@ -77,7 +77,7 @@
 </p>
 
 <pre caption="/boot/grub/grub.conf">
-timeout 5 
+timeout 5
 password --md5 $1$T7/dgdIJ$dJM.n2wZ8RG.oEiIOwJUs.
 </pre>
 
@@ -104,8 +104,8 @@
 </p>
 
 <pre caption="/etc/lilo.conf">
-password=changeme 
-restricted 
+password=changeme
+restricted
 delay=3
 </pre>
 
@@ -114,9 +114,9 @@
 </p>
 
 <pre caption="/etc/lilo.conf">
-image=/boot/bzImage 
-      read-only 
-      password=changeme 
+image=/boot/bzImage
+      read-only
+      password=changeme
       restricted
 </pre>
 



1.3                  xml/htdocs/doc/en/security/shb-uptodate.xml

file : 
http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/doc/en/security/shb-uptodate.xml?rev=1.3&view=markup
plain: 
http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/doc/en/security/shb-uptodate.xml?rev=1.3&content-type=text/plain
diff : 
http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/doc/en/security/shb-uptodate.xml?r1=1.2&r2=1.3

Index: shb-uptodate.xml
===================================================================
RCS file: /var/cvsroot/gentoo/xml/htdocs/doc/en/security/shb-uptodate.xml,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -r1.2 -r1.3
--- shb-uptodate.xml    13 Oct 2005 15:34:30 -0000      1.2
+++ shb-uptodate.xml    18 Sep 2006 09:22:48 -0000      1.3
@@ -1,5 +1,5 @@
 <?xml version='1.0' encoding='UTF-8'?>
-<!-- $Header: 
/var/cvsroot/gentoo/xml/htdocs/doc/en/security/shb-uptodate.xml,v 1.2 
2005/10/13 15:34:30 neysx Exp $ -->
+<!-- $Header: 
/var/cvsroot/gentoo/xml/htdocs/doc/en/security/shb-uptodate.xml,v 1.3 
2006/09/18 09:22:48 neysx Exp $ -->
 <!DOCTYPE sections SYSTEM "/dtd/book.dtd">
 
 <!-- The content of this document is licensed under the CC-BY-SA license -->
@@ -108,7 +108,7 @@
 </p>
 
 <p>
-If you want an email each time a GLSA is released subscribe to the 
+If you want an email each time a GLSA is released subscribe to the
 <c>gentoo-announce</c> mailing list. Instructions for joining it and many other
 great mailing lists can be found <uri link="/main/en/lists.xml">Gentoo Linux
 Mailing List Overview</uri>.



-- 
[email protected] mailing list

Reply via email to