[successivo] [precedente] [inizio] [fine] [indice generale] [indice ridotto] [translators] [docinfo] [indice analitico] [volume] [parte]


Capitolo 780.   Problemi di sicurezza

Figura 780.1. File /etc/passwd da verificare.

root:0v4fr56fHc2:0:0:root:/root:/bin/bash
daemon:*:1:1:daemon:/usr/sbin:/bin/sh
bin:*:2:2:bin:/bin:/bin/sh
sys:*:3:3:sys:/dev:/bin/sh
sync:*:4:100:sync:/bin:/bin/sync
games:*:5:100:games:/usr/games:/bin/sh
man:*:6:100:man:/var/cache/man:/bin/sh
lp:234frt56:7:7:lp:/var/spool/lpd:/bin/sh
mail:*:8:8:mail:/var/spool/mail:/bin/sh
news:*:9:9:news:/var/spool/news:/bin/sh
uucp:*:10:10:uucp:/var/spool/uucp:/bin/sh
proxy:*:13:13:proxy:/bin:/bin/sh
daniele:06sB4fder9dzE:1001:1001::/home/daniele:/bin/bash
anna:062w3e42BzE:1001:1001::/home/anna:/bin/bash
pippo:06D3e4r5dzE:1001:1001::/home/pippo:/bin/bash
pluto:0ewee5tydzE:894:894::/home/pluto:/bin/bash
prova::780:780::/home/prova:/bin/bash
prova2::781:781::/home/prova2:/bin/bash
ospite::782:782::/home/ospite:/bin/bash
guest::783:783::/home/guest:/bin/bash
nobody:*:65534:65534:nobody:/tmp:/bin/sh
ftp:!:101:101::/home/ftp:/bin/false

780.1   Problemi di sicurezza in generale

780.1.1)   La figura 780.1 mostra un file /etc/passwd. Indicare quali utenze sarebbe meglio eliminare.

    ____________________________________________________________________

    ____________________________________________________________________

    ____________________________________________________________________

    ____________________________________________________________________

    ____________________________________________________________________

    ____________________________________________________________________

    ____________________________________________________________________

780.1.2)   In riferimento alla figura 780.1, indicare quali utenti di sistema hanno problemi di configurazione.

    ____________________________________________________________________

    ____________________________________________________________________

    ____________________________________________________________________

    ____________________________________________________________________

    ____________________________________________________________________

    ____________________________________________________________________

    ____________________________________________________________________

780.1.3)   In riferimento alla figura 780.1, indicare cosa c'è di strano nella configurazione degli utenti comuni.

    ____________________________________________________________________

    ____________________________________________________________________

    ____________________________________________________________________

    ____________________________________________________________________

    ____________________________________________________________________

    ____________________________________________________________________

    ____________________________________________________________________

780.2   Problemi con la rete

780.2.1)   Descrivere brevemente a cosa serve il protocollo IDENT.

    ____________________________________________________________________

    ____________________________________________________________________

    ____________________________________________________________________

    ____________________________________________________________________

    ____________________________________________________________________

    ____________________________________________________________________

    ____________________________________________________________________

780.2.2)   Descrivere brevemente a cosa serve il supervisore dei servizi di rete.

    ____________________________________________________________________

    ____________________________________________________________________

    ____________________________________________________________________

    ____________________________________________________________________

    ____________________________________________________________________

    ____________________________________________________________________

    ____________________________________________________________________

780.2.3)   Descrivere brevemente a cosa serve il TCP wrapper (tcpd).

    ____________________________________________________________________

    ____________________________________________________________________

    ____________________________________________________________________

    ____________________________________________________________________

    ____________________________________________________________________

    ____________________________________________________________________

    ____________________________________________________________________

780.2.4)   Specificare se il TCP wrapper è coinvolto in qualche modo con il protocollo IDENT.

    ____________________________________________________________________

    ____________________________________________________________________

    ____________________________________________________________________

    ____________________________________________________________________

    ____________________________________________________________________

    ____________________________________________________________________

    ____________________________________________________________________

780.3   Scansione di file e directory

780.3.1)   In generale, utilizzando un programma di scansione del file system, per la ricerca di alterazioni non volute, dove conviene collocare i suoi file di configurazione?

    ____________________________________________________________________

    ____________________________________________________________________

    ____________________________________________________________________

    ____________________________________________________________________

    ____________________________________________________________________

    ____________________________________________________________________

    ____________________________________________________________________

780.3.2)   Ammesso che /etc/aide.conf sia il file di configurazione di un programma di scansione del file system, per la ricerca di alterazioni non volute, come dovrebbero essere organizzati i permessi e la proprietà?

    Utente proprietario_________________________________________________

    Gruppo proprietario_________________________________________________

    Permessi____________________________________________________________

Appunti di informatica libera 2006.07.01 --- Copyright © 2000-2006 Daniele Giacomini -- <daniele (ad) swlibero·org>


Dovrebbe essere possibile fare riferimento a questa pagina anche con il nome problemi_di_sicurezza.htm

[successivo] [precedente] [inizio] [fine] [indice generale] [indice ridotto] [translators] [docinfo] [indice analitico]

Valid ISO-HTML!

CSS validator!