UNIX RENDSZEREK BIZTONSÁGI KÉRDÉSEI
Dr. Krausz Tamás, kuka@dragon.klte.hu
KLTE ISZK
Abstract
This paper is about unix system security. The paper is not intended to be a hacker's guide, it is mainly for system administrators, who are not always alert enough. First, some well known cases were described, then the necessary measures that the system administrartor must consider. The main themes are the following: users and passwords, groups and the superuser, the filesystem, finding suid and sgid files, suspicious accounts, backups, system logging, network security, nfs , kerbereros, secure rpc, firewalls, encryption, phisical security.
Iványi Tibor, ivanyit@tigris.klte.hu
Csukás Levente, csukasl@fox.klte.hu
Kossuth Lajos Tudományegyetem Informatikai és
Számító Központ
Abstract
The well known SMTP (Simple Mail Transfer Protocol) based mailing systems have security holes. Since the client side can be a simple telnet client, everyone can connect to SMTP servers on port 25. With this method unnamed letters can be sent. To eliminate this problem we define a new protocol, Endpoint Mail Transfer Protocol. This protocol connects the two communicating endpoint directly and includes security checking of letters. It automatically determines the sender's data, uses a privileged port for communication and incereases the security for both the client programs and the server daemons.
Kadlecsik József, kadlec@sunserv.kfki.hu
KFKI RMKI Számítógép Hálózati
Központ
Abstract
More security on Internet usually means greater inconvenience - but ssh is an exception. The features and usage of this excellent tool are detailed with examples from real systems.
Ködmön József, h8628kod@ella.hu
Takács Péter, h8627tak@ella.hu
DOTE Egészségügyi Fõiskolai Kar
Abstract
The lecture is about the controlling and realization of the data safety and data security, and is treating the special features of handling the data in the health care. It is analyzing the security functions of the Novell Netware, the Windows for Workgroups, Windows NT and UNIX operating systems. Is shows some security holes. It offers some rarely applied networking data safety technique, such as NCP packet signature, Kerberos system.