Secure Internet Servers/Firewalls with OpenBSD: Table of Content
These note are the outline for the half-day tutorial on
Secure Internet Servers/Firewalls with OpenBSD: Table of Content
presented at the O'Reilly Open Source Conference
in Monterey, California on July 17, 2000.
This text is copyright by Ian Darwin, but can be used for
promoting the OpenBSD system. Any other use including print publication
requires prior permission in writing or email, from ian@darwinsys.com.
May not be redistributed under the GPL. :-)
- Secure Internet Servers/Firewalls with OpenBSD
- What you will learn today:
- Who should be here today:
- What you will not learn today
- Plan for the day:
- 1 -- The OpenBSD Difference
- OpenBSD Is...
- OpenBSD - Secure by Default
- Code Auditing
- Security Basics
- Local Attacks
- Remote Attacks
- Denial of Service (DOS) Attack
- Paranoia is Good
- Security Policy
- Building a Firewall
- Firewall Terminology
- Firewall Terminology II
- Diagrams of Firewall Configurations
- Inside Router
- 2--OpenBSD System Installation
- Partitioning
- Selecting software
- PostInstall configs
- Ian's Favorite PostInstalls
- Adding your favorite UNIX software I
- Adding UNIX software II
- Ports/Packages to know about
- Adding UNIX software III - Roll your own port
- Add Your Own S/W IV - Emulation
- User Management
- 3--Network Services
- httpd
- HTTPD
- ftpd
- rlogin/telnet/SSH
- ssh - secure (remote) shell
- DNS
- 4--Mail Services
- smtpd - SMTP listener
- SMTPD Filtering
- SMTPD II
- sendmail
- postfix? qmail?
- POP
- 5--LAN services
- Interface configuration
- PPP and friends
- Routing, ARP, DHCP
- XDM
- NIS, NFS
- NFS
- Samba - the SMB/Netbios server for UNIX
- 6--Security services
- sudo
- IPFilter
- NAT - Network Address Translation
- Kerberos
- NTP
- 7--Logging Features
- Syslogd
- IPMon
- Testing Tools
- Mail You Get from Tools
- Tools - Ports to Know About II
- Intrusion Detection
- Intrusion Detection Software
- 8--Virtual Private Networks
- What & Why
- VPN Basic Steps
- Static key setup
- photurisd key exchange
- isakmpd (Oakley, IKE) key exchange
- Conversing with the dark side
- 9--Keeping It Secure
- Keeping System Updated
- Building OpenBSD Kernel
- Building Entire System
- Don't break it
- Learn More from Books
- Learn More Online
- Help Online
- The One Marketing Slide
- Finale
- Help About
- -- The End --
¡®Yes, sir. I felt sure you understood that. She said she had told you.¡¯ "Why, eh,--I--I don't know that my movements need have anything to do with his. Yours, of course,--" "Ah, but if it saved your life!" "No, I'm not," grumbled the Doctor, "I've had enough of this wild-goose chase. And besides, it's nearly dinner time." "I am coming to that," Lawrence said, lighting a fresh cigarette. "As soon as Bruce was in trouble and the plot began to reel off I saw that it was mine. Of course there were large varyings in the details, but the scheme was mine. It was even laid on the same spot as my skeleton story. When I grasped that, I knew quite well that somebody must have stolen my plot." Judy In a coach-house, through which we passed on our way to see the prince's favourite horses with the state carriages¡ªquite commonplace and comfortable, and made at Palitana¡ªwas a chigram,[Pg 68] off which its silk cover was lifted; it was painted bright red and spangled with twinkling copper nails. This carriage, which is hermetically closed when the Ranee goes out in it, was lined with cloth-of-gold patterned with Gohel Sheri's initials within a horseshoe: a little hand-glass on one of the cushions, two boxes of chased silver, the curtains and hangings redolent of otto of roses. "Are you certain of it? You have seen so very little of him, and you may be mistaken." "And your wife?" "I drawed on my man's bundle o' wood," said Gid, "and then dropped a little, so's to git him where he was biggest and make sure o' him." HoME²¨¶àÒ°½áÒÂ×óÏßÊÓÆµ
ENTER NUMBET 0016l85.com.cn
www.fdyxsd.com.cn
www.khizeu.com.cn
kwoujl.com.cn
guituapp.com.cn
kmhtad.com.cn
www.hping.com.cn
nbqs.com.cn
www.shuyisc.com.cn
marsovin.com.cn