5.3. Anonymous User Options ......................................................... 285
5.4. Local User Options ................................................................... 285
5.5. Directory Options ..................................................................... 287
5.6. File Transfer Options ................................................................ 288
5.7. Logging Options ....................................................................... 288
5.8. Network Options ...................................................................... 289
6. Additional Resources .......................................................................... 292
6.1. Installed Documentation ........................................................... 292
6.2. Useful Websites ....................................................................... 293
6.3. Related Books ......................................................................... 293
III. Security Reference ............................................................................................. 295
16. Pluggable Authentication Modules (PAM) ................................................... 297
1. Advantages of PAM ............................................................................ 297
2. PAM Configuration Files ...................................................................... 297
2.1. PAM Service Files .................................................................... 297
3. PAM Configuration File Format ............................................................ 298
3.1. Module Interface ...................................................................... 298
3.2. Control Flag ............................................................................. 299
3.3. Module Name .......................................................................... 300
3.4. Module Arguments ................................................................... 300
4. Sample PAM Configuration Files .......................................................... 300
5. Creating PAM Modules ........................................................................ 303
6. PAM and Administrative Credential Caching ......................................... 304
6.1. Removing the Timestamp File ................................................... 304
6.2. Common
pam_timestamp
Directives .......................................... 304
7. PAM and Device Ownership ................................................................ 305
7.1. Device Ownership .................................................................... 305
7.2. Application Access ................................................................... 306
8. Additional Resources .......................................................................... 306
8.1. Installed Documentation ........................................................... 306
8.2. Useful Websites ....................................................................... 307
17. TCP Wrappers and
xinetd
........................................................................ 309
1. TCP Wrappers .................................................................................... 309
1.1. Advantages of TCP Wrappers ................................................... 310
2. TCP Wrappers Configuration Files ....................................................... 310
2.1. Formatting Access Rules .......................................................... 311
2.2. Option Fields ........................................................................... 315
3.
xinetd
............................................................................................... 318
4.
xinetd
Configuration Files .................................................................. 318
4.1. The
/etc/xinetd.conf
File ..................................................... 318
4.2. The
/etc/xinetd.d/
Directory ................................................. 319
4.3. Altering
xinetd
Configuration Files ........................................... 320
5. Additional Resources .......................................................................... 324
5.1. Installed Documentation ........................................................... 324
5.2. Useful Websites ....................................................................... 325
5.3. Related Books ......................................................................... 325
18.
iptables
.................................................................................................. 327
Red Hat Enterprise Linux 4.5.0
xiv
Summary of Contents for ENTERPRISE LINUX 4.5.0 -
Page 1: ...Red Hat Enterprise Linux 4 5 0 4 5 0 Reference Guide ISBN N A Publication date ...
Page 2: ...Red Hat Enterprise Linux 4 5 0 ...
Page 4: ...Red Hat Enterprise Linux 4 5 0 ...
Page 24: ...xxiv ...
Page 26: ......
Page 36: ...12 ...
Page 72: ...48 ...
Page 112: ...88 ...
Page 122: ...98 ...
Page 140: ...116 ...
Page 142: ......
Page 300: ...276 ...
Page 318: ...294 ...
Page 320: ......
Page 332: ...308 ...
Page 350: ...326 ...
Page 378: ...354 ...
Page 388: ...364 ...
Page 394: ...370 ...
Page 395: ...Part IV Appendixes ...
Page 396: ......