[successivo]
[precedente]
[inizio]
[fine]
[indice generale]
[indice ridotto]
[translators]
[docinfo]
[indice analitico]
[volume]
[parte]
Capitolo 780. Problemi di sicurezza
Figura 780.1. File /etc/passwd da verificare.
root:0v4fr56fHc2:0:0:root:/root:/bin/bash
daemon:*:1:1:daemon:/usr/sbin:/bin/sh
bin:*:2:2:bin:/bin:/bin/sh
sys:*:3:3:sys:/dev:/bin/sh
sync:*:4:100:sync:/bin:/bin/sync
games:*:5:100:games:/usr/games:/bin/sh
man:*:6:100:man:/var/cache/man:/bin/sh
lp:234frt56:7:7:lp:/var/spool/lpd:/bin/sh
mail:*:8:8:mail:/var/spool/mail:/bin/sh
news:*:9:9:news:/var/spool/news:/bin/sh
uucp:*:10:10:uucp:/var/spool/uucp:/bin/sh
proxy:*:13:13:proxy:/bin:/bin/sh
daniele:06sB4fder9dzE:1001:1001::/home/daniele:/bin/bash
anna:062w3e42BzE:1001:1001::/home/anna:/bin/bash
pippo:06D3e4r5dzE:1001:1001::/home/pippo:/bin/bash
pluto:0ewee5tydzE:894:894::/home/pluto:/bin/bash
prova::780:780::/home/prova:/bin/bash
prova2::781:781::/home/prova2:/bin/bash
ospite::782:782::/home/ospite:/bin/bash
guest::783:783::/home/guest:/bin/bash
nobody:*:65534:65534:nobody:/tmp:/bin/sh
ftp:!:101:101::/home/ftp:/bin/false
|
|
780.1
Problemi di sicurezza in generale
780.1.1)
La figura 780.1 mostra un file /etc/passwd
. Indicare quali utenze sarebbe meglio eliminare.
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
|
|
780.1.2)
In riferimento alla figura 780.1, indicare quali utenti di sistema hanno problemi di configurazione.
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
|
|
780.1.3)
In riferimento alla figura 780.1, indicare cosa c'è di strano nella configurazione degli utenti comuni.
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
|
|
780.2
Problemi con la rete
780.2.1)
Descrivere brevemente a cosa serve il protocollo IDENT.
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
|
|
780.2.2)
Descrivere brevemente a cosa serve il supervisore dei servizi di rete.
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
|
|
780.2.3)
Descrivere brevemente a cosa serve il TCP wrapper (tcpd).
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
|
|
780.2.4)
Specificare se il TCP wrapper è coinvolto in qualche modo con il protocollo IDENT.
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
|
|
780.3
Scansione di file e directory
780.3.1)
In generale, utilizzando un programma di scansione del file system, per la ricerca di alterazioni non volute, dove conviene collocare i suoi file di configurazione?
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
|
|
780.3.2)
Ammesso che /etc/aide.conf
sia il file di configurazione di un programma di scansione del file system, per la ricerca di alterazioni non volute, come dovrebbero essere organizzati i permessi e la proprietà?
Utente proprietario_________________________________________________
Gruppo proprietario_________________________________________________
Permessi____________________________________________________________
|
|
Appunti di informatica libera 2006.07.01 --- Copyright © 2000-2006 Daniele Giacomini -- <daniele (ad) swlibero·org>
Dovrebbe essere possibile fare riferimento a questa pagina anche con il nome problemi_di_sicurezza.htm
[successivo]
[precedente]
[inizio]
[fine]
[indice generale]
[indice ridotto]
[translators]
[docinfo]
[indice analitico]