Buy GNU books!
|[ < ]||[ > ]||[ << ]||[ Up ]||[ >> ]||[Top]||[Contents]||[Index]||[ ? ]|
The beginning of security is correct host configuration. Even if you have a firewall shielding you from outside intrusion, an incorrectly configured host is a security risk. Host configuration is what cfengine is about, so we could easily write a book on this. Rather than reiterating the extensive documentation, let's just consider a few examples which address actual problems and get down to business without further ado.
A cfengine configuration file is composed of objects with the following syntax (see the cfengine documentation):
rule-type: classes-of-host-this-applies-to:: Actual rule 1 Actual rule 2 ...
control: actionsequence = ( netconfig copy processes editfiles )
Let us step through some basic idioms which can repeated in different contexts.
As representative examples we shall take solaris and GNU/Linux as example operating systems. This is not to single them out as being particularly secure or insecure, it is merely due to their widespread use and for definiteness.
|webmaster donations bookstore||delorie software privacy|
|Copyright © 2003 by The Free Software Foundation||Updated Jun 2003|