security.7 (219096) | security.7 (219126) |
---|---|
1.\" Copyright (C) 1998 Matthew Dillon. All rights reserved. 2.\" 3.\" Redistribution and use in source and binary forms, with or without 4.\" modification, are permitted provided that the following conditions 5.\" are met: 6.\" 1. Redistributions of source code must retain the above copyright 7.\" notice, this list of conditions and the following disclaimer. 8.\" 2. Redistributions in binary form must reproduce the above copyright --- 7 unchanged lines hidden (view full) --- 16.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 17.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 18.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 19.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 20.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 21.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 22.\" SUCH DAMAGE. 23.\" | 1.\" Copyright (C) 1998 Matthew Dillon. All rights reserved. 2.\" 3.\" Redistribution and use in source and binary forms, with or without 4.\" modification, are permitted provided that the following conditions 5.\" are met: 6.\" 1. Redistributions of source code must retain the above copyright 7.\" notice, this list of conditions and the following disclaimer. 8.\" 2. Redistributions in binary form must reproduce the above copyright --- 7 unchanged lines hidden (view full) --- 16.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 17.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 18.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 19.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 20.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 21.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 22.\" SUCH DAMAGE. 23.\" |
24.\" $FreeBSD: head/share/man/man7/security.7 219096 2011-02-28 10:03:48Z brucec $ | 24.\" $FreeBSD: head/share/man/man7/security.7 219126 2011-03-01 11:47:51Z brucec $ |
25.\" 26.Dd January 7, 2010 27.Dt SECURITY 7 28.Os 29.Sh NAME 30.Nm security 31.Nd introduction to security under FreeBSD 32.Sh DESCRIPTION --- 100 unchanged lines hidden (view full) --- 133the attacker may not have a need to install a backdoor. 134Many of the root holes found and closed to date involve a considerable amount 135of work by the attacker to clean up after himself, so most attackers do install 136backdoors. 137This gives you a convenient way to detect the attacker. 138Making 139it impossible for an attacker to install a backdoor may actually be detrimental 140to your security because it will not close off the hole the attacker used to | 25.\" 26.Dd January 7, 2010 27.Dt SECURITY 7 28.Os 29.Sh NAME 30.Nm security 31.Nd introduction to security under FreeBSD 32.Sh DESCRIPTION --- 100 unchanged lines hidden (view full) --- 133the attacker may not have a need to install a backdoor. 134Many of the root holes found and closed to date involve a considerable amount 135of work by the attacker to clean up after himself, so most attackers do install 136backdoors. 137This gives you a convenient way to detect the attacker. 138Making 139it impossible for an attacker to install a backdoor may actually be detrimental 140to your security because it will not close off the hole the attacker used to |
141break in in the first place. | 141break in originally. |
142.Pp 143Security remedies should always be implemented with a multi-layered 144.Dq onion peel 145approach and can be categorized as follows: 146.Bl -enum -offset indent 147.It 148Securing root and staff accounts 149.It --- 857 unchanged lines hidden --- | 142.Pp 143Security remedies should always be implemented with a multi-layered 144.Dq onion peel 145approach and can be categorized as follows: 146.Bl -enum -offset indent 147.It 148Securing root and staff accounts 149.It --- 857 unchanged lines hidden --- |