User's Manual

Solaris 9 Security CX-310-301 8
The Set-Uid and Set-Gid Permissions ................................................................................... 57
Implications of Lax File and Directory Permissions................................................................ 57
Access Control Lists (ACL) ........................................................................................................ 58
Identifying an ACL .................................................................................................................. 58
Setting ACLs........................................................................................................................... 59
Modifying an ACL ................................................................................................................... 59
Deleting an ACL ..................................................................................................................... 60
Recalculating the Mask of an ACL ......................................................................................... 60
PAM and Kerberos..................................................................................................................... 60
Pluggable Authentication Module (PAM) ............................................................................... 60
Deploying PAM in a Production Environment ........................................................................ 61
Add a new PAM Module......................................................................................................... 61
Kerberos / SEAM.................................................................................................................... 62
How Kerberos Works ............................................................................................................. 62
Limitations of Kerberos........................................................................................................... 62
Host and Network Prevention ...................................................................................... 63
Fundamentals ............................................................................................................................ 63
Firewall ................................................................................................................................... 63
IPsec....................................................................................................................................... 64
Network Intrusion ................................................................................................................... 64
Intrusion Detection ................................................................................................................. 64
Restricting Network Services ..................................................................................................... 64
Inetd Services......................................................................................................................... 64
Run Control Services ............................................................................................................. 65
Remote Procedure Call (RPC) Services ................................................................................ 65
Host Hardening .......................................................................................................................... 65
Solaris Security Toolkit .............................................................................................................. 66
Installing SST ......................................................................................................................... 67
Configuring SST ..................................................................................................................... 67
Running SST .......................................................................................................................... 68
Updating an SST Run ............................................................................................................ 69