Part V. Security
Installation and Administration
Part V. Security
Contents
43. Managing X.509 Certification
43.1. The Principles of Digital Certification
43.2. YaST Modules for CA Management
44. Masquerading and Firewalls
44.1. Packet Filtering with iptables
44.2. Masquerading Basics
44.3. Firewalling Basics
44.4. SuSEfirewall2
44.5. For More Information
45. SSH: Secure Network Operations
45.1. The OpenSSH Package
45.2. The ssh Program
45.3. scp—Secure Copy
45.4. sftp—Secure File Transfer
45.5. The SSH Daemon (sshd)—Server-Side
45.6. SSH Authentication Mechanisms
45.7. X, Authentication, and Forwarding Mechanisms
46. Network Authentication—Kerberos
46.1. Kerberos Terminology
46.2. How Kerberos Works
46.3. Users' View of Kerberos
46.4. For More Information
47. Installing and Administering Kerberos
47.1. Choosing the Kerberos Realms
47.2. Setting Up the KDC Hardware
47.3. Clock Synchronization
47.4. Configuring the KDC
47.5. Manually Configuring Kerberos Clients
47.6. Configuring a Kerberos Client with YaST
47.7. Remote Kerberos Administration
47.8. Creating Kerberos Host Principals
47.9. Enabling PAM Support for Kerberos
47.10. Configuring SSH for Kerberos Authentication
47.11. Using LDAP and Kerberos
48. Encrypting Partitions and Files
48.1. Setting Up a Crypto File System with YaST
48.2. Using vi to Encrypt Single Files
49. Confining Privileges with AppArmor
49.1. Installing Novell AppArmor
49.2. Enabling and Disabling Novell AppArmor
49.3. Getting Started with Profiling Applications
50. Security and Confidentiality
50.1. Local Security and Network Security
50.2. Some General Security Tips and Tricks
50.3. Using the Central Security Reporting Address