neysx       05/06/01 15:43:47

  Modified:    xml/htdocs/doc/en diskless-howto.xml gentoo-security.xml
                        metadoc.xml
  Log:
  #71211 gentoo-security.xml is now a handbook thanks to curtis119.

Revision  Changes    Path
1.17      +8 -7      xml/htdocs/doc/en/diskless-howto.xml

file : 
http://www.gentoo.org/cgi-bin/viewcvs.cgi/xml/htdocs/doc/en/diskless-howto.xml?rev=1.17&content-type=text/x-cvsweb-markup&cvsroot=gentoo
plain: 
http://www.gentoo.org/cgi-bin/viewcvs.cgi/xml/htdocs/doc/en/diskless-howto.xml?rev=1.17&content-type=text/plain&cvsroot=gentoo
diff : 
http://www.gentoo.org/cgi-bin/viewcvs.cgi/xml/htdocs/doc/en/diskless-howto.xml.diff?r1=1.16&r2=1.17&cvsroot=gentoo

Index: diskless-howto.xml
===================================================================
RCS file: /var/cvsroot/gentoo/xml/htdocs/doc/en/diskless-howto.xml,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -r1.16 -r1.17
--- diskless-howto.xml  23 May 2005 15:46:16 -0000      1.16
+++ diskless-howto.xml  1 Jun 2005 15:43:47 -0000       1.17
@@ -1,5 +1,5 @@
 <?xml version='1.0' encoding="UTF-8"?>
-<!-- $Header: /var/cvsroot/gentoo/xml/htdocs/doc/en/diskless-howto.xml,v 1.16 
2005/05/23 15:46:16 swift Exp $ -->
+<!-- $Header: /var/cvsroot/gentoo/xml/htdocs/doc/en/diskless-howto.xml,v 1.17 
2005/06/01 15:43:47 neysx Exp $ -->
 <!DOCTYPE guide SYSTEM "/dtd/guide.dtd">
 
 <guide link="/doc/en/diskless-howto.xml">
@@ -25,8 +25,8 @@
 
 <license/>
 
-<version>1.12</version>
-<date>2005-05-23</date>
+<version>1.13</version>
+<date>2005-06-01</date>
 
 <chapter>
 <title>Introduction</title>
@@ -171,10 +171,11 @@
 </pre>
 
 <p>
-If you want to use packet filtering, you can add the rest as modules later. 
-Make sure to read the <uri 
-link="http://www.gentoo.org/doc/en/gentoo-security.xml#doc_chap12";>Gentoo 
-security guide Chapter 12 Firewall</uri> on how to set this up properly.
+If you want to use packet filtering, you can add the rest as modules later.
+Make sure to read the <uri
+link="/doc/en/security/security-handbook.xml?part=1&amp;chap=12">Gentoo
+Security Handbook Chapter about Firewalls</uri> on how to set this up
+properly.
 </p>
 
 <note>



1.82      +10 -3937  xml/htdocs/doc/en/gentoo-security.xml

file : 
http://www.gentoo.org/cgi-bin/viewcvs.cgi/xml/htdocs/doc/en/gentoo-security.xml?rev=1.82&content-type=text/x-cvsweb-markup&cvsroot=gentoo
plain: 
http://www.gentoo.org/cgi-bin/viewcvs.cgi/xml/htdocs/doc/en/gentoo-security.xml?rev=1.82&content-type=text/plain&cvsroot=gentoo
diff : 
http://www.gentoo.org/cgi-bin/viewcvs.cgi/xml/htdocs/doc/en/gentoo-security.xml.diff?r1=1.81&r2=1.82&cvsroot=gentoo

Index: gentoo-security.xml
===================================================================
RCS file: /var/cvsroot/gentoo/xml/htdocs/doc/en/gentoo-security.xml,v
retrieving revision 1.81
retrieving revision 1.82
diff -u -r1.81 -r1.82
--- gentoo-security.xml 23 May 2005 19:34:03 -0000      1.81
+++ gentoo-security.xml 1 Jun 2005 15:43:47 -0000       1.82
@@ -1,3955 +1,28 @@
 <?xml version='1.0' encoding='UTF-8'?>
-<!-- $Header: /var/cvsroot/gentoo/xml/htdocs/doc/en/gentoo-security.xml,v 1.81 
2005/05/23 19:34:03 swift Exp $ -->
+<!-- $Header: /var/cvsroot/gentoo/xml/htdocs/doc/en/gentoo-security.xml,v 1.82 
2005/06/01 15:43:47 neysx Exp $ -->
 
 <!DOCTYPE guide SYSTEM "/dtd/guide.dtd">
-<guide link = "/doc/en/gentoo-security.xml">
-<title>Gentoo Linux Security Guide</title>
+<guide link="/doc/en/gentoo-security.xml">
+<title>Obsolete Gentoo Linux Security Guide</title>
 <author title="Author">
-  <mail link="[EMAIL PROTECTED]">Kim Nielsen</mail>
-</author>
-<author title="Editor"><!-- [EMAIL PROTECTED] -->
-  John P. Davis
-</author>
-<author title="Editor">
-  <mail link="[EMAIL PROTECTED]">Eric R. Stockbridge</mail>
-</author>
-<author title="Editor">
-  <mail link="[EMAIL PROTECTED]">Carl Anderson</mail>
-</author>
-<author title="Editor">
-  <mail link="[EMAIL PROTECTED]">Jorge Paulo</mail>
-</author>
-<author title="Editor">
-  <mail link="[EMAIL PROTECTED]">Sven Vermeulen</mail>
-</author>
-<author title="Editor">
-  <mail link="[EMAIL PROTECTED]">Benny Chuang</mail>
-</author>
-<author title="Editor">
-  <mail link="[EMAIL PROTECTED]">Sune Jeppesen</mail>
-</author>
-<author title="Editor">
-  <mail link="[EMAIL PROTECTED]">Tiemo Kieft</mail>
-</author>
-<author title="Editor">
-       <mail link="[EMAIL PROTECTED]">Zack Gilburd</mail>
-</author>
-<author title="Editor">
-  <mail link="[EMAIL PROTECTED]">Dan Margolis</mail>
+  <mail link="[EMAIL PROTECTED]">Xavier Neys</mail>
 </author>
 
 <abstract>
-This is a step-by-step guide for hardening Gentoo Linux.
+This was a step-by-step guide for hardening Gentoo Linux.
 </abstract>
 
-<license/>
-
-<version>0.4.48</version>
-<date>2005-05-23</date>
-
-<chapter>
-<title>Introduction</title>
-<section>
-<body>
-
-<p>
-This guide is intended for people who are using Gentoo Linux in a server based
-environment or just feel the need for better security.
-</p>
-
-<note>
-If you are interested in even more Gentoo security stuff after reading this
-guide then have a look at the <uri
-link="http://www.gentoo.org/proj/en/hardened/";>Hardened Gentoo Project</uri>
-</note>
-
-</body>
-</section>
-
-<!-- 
-<section>
-<title>Enhancements for future releases of this Guide:</title>
-<body>
-
-<p>
-In version 0.6 (Backup)
-</p>
-<ul>
-<li>Arpwatch</li>
-<li>Full system backup using Systemimager</li>
-<li>Partial backup using tar</li>
-<li>Backing up postgres</li>
-</ul>
-
-
-<p>
-In version 0.8 (Penetration testing)
-</p>
-<ul>
-<li>Remote audits</li>
-<li>Network audits</li>
-<li>Host audits</li>
-<li>Software audits</li>
-</ul>
-
-<p>
-In version 1.0 (After a compromise)
-</p>
-<ul>
-<li>How to report an incident</li>
-<li>Forensics analysis</li>
-<li>Creating an image of the system without destroying evidence (Using dd)</li>
-<li>Trap and trace (Using tcpdump)</li>
-<li>.. More to come ..</li>
-<li>Restoring system</li>
-</ul>
-
-<note>
-Please note that each version concentrates on one subject at a time.  This is 
for
-quality assurance purposes.
-</note>
-
-</body>
-</section>
--->
-</chapter>
-
-<chapter>
-<title>Pre-Installation Concerns</title>
-<section>
-<title>Physical Security</title>
-<body>
-
-<p>
-No matter how many safeguards you implement, they can all be easily 
circumvented
-by an attacker with physical access to your computer. Despite this, there are
-at least some measures that can be taken to provide a degree of security 
against
-an attacker with physical access to your machine. Putting your hardware in a
-locked closet prevents an attacker from simply unplugging it and carting it
-off. Locking your computer's case is also a good idea, to make sure that an
-attacker cannot simply walk away with your hard drive. To prevent an attacker
-from booting from another disk, nicely circumventing your permissions and login
-restrictions, try setting the hard drive as the first boot device in your BIOS,
-and setting a BIOS password. It is also important to set a LILO or GRUB boot
-password, to prevent a malicious user from booting into single-user mode and
-gaining complete access to your system. This is covered in more detail in
-Chapter 3, under <uri link="#passwording_GRUB">Setting a GRUB password</uri>
-and <uri link="#passwording_LILO">Setting a LILO password</uri>.
-</p>
-
-</body>
-</section>
-<section>
-<title>Daemon/Service Planning</title>
-<body>
-<p>
-Start by documenting what services this machine should run. This will help you
-compose a better partition scheme for your system, and allow you to better plan
-your security measures. Of course, this is unnecessary if the machine serves a
-single simple purpose, such as a desktop, or a dedicated firewall. In those
-cases, you should not be running <e>any</e> services, except perhaps sshd.
-</p>
-<p>
-This list can also be used to aid system administration. By keeping a current
-list of version information, you will find it much easier to keep everything up
-to date if a remote vulnerability is discovered in one of your daemons.
-</p>
-
-</body>
-</section>
-<section>
-<title>Partitioning Schemes</title>
-<body>
-
-<p>
-Partitioning rules:
-</p>
-
-<ul>
-<li>
-  Any directory tree a user should be able to write to (e.g. 
<path>/home</path>, 
-  <path>/tmp</path>) should be on a separate partition and use disk quotas. 
This
-  reduces the risk of a user filling up your whole filesystem. Portage
-  uses <path>/var/tmp</path> to compile files, so that partition should be 
large.
-</li>
-<li>
-  Any directory tree where you plan to install non-distribution software on 
should
-  be on a separate partition. According to the <uri link =
-  "http://www.pathname.com/fhs/";>File Hierarchy Standard</uri>, this
-  is <path>/opt</path> or <path>/usr/local</path>.  If these are separate
-  partitions, they will not be erased if you have to reinstall the system.
-</li>
-<li>
-  For extra security, static data can be put on a separate partition that is
-  mounted read-only. For the truly paranoid, try using read-only media like
-  CD-ROM.
        <<Truncated>>


1.62      +20 -7     xml/htdocs/doc/en/metadoc.xml

file : 
http://www.gentoo.org/cgi-bin/viewcvs.cgi/xml/htdocs/doc/en/metadoc.xml?rev=1.62&content-type=text/x-cvsweb-markup&cvsroot=gentoo
plain: 
http://www.gentoo.org/cgi-bin/viewcvs.cgi/xml/htdocs/doc/en/metadoc.xml?rev=1.62&content-type=text/plain&cvsroot=gentoo
diff : 
http://www.gentoo.org/cgi-bin/viewcvs.cgi/xml/htdocs/doc/en/metadoc.xml.diff?r1=1.61&r2=1.62&cvsroot=gentoo

Index: metadoc.xml
===================================================================
RCS file: /var/cvsroot/gentoo/xml/htdocs/doc/en/metadoc.xml,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -r1.61 -r1.62
--- metadoc.xml 2 May 2005 16:47:29 -0000       1.61
+++ metadoc.xml 1 Jun 2005 15:43:47 -0000       1.62
@@ -1,9 +1,9 @@
 <?xml version='1.0' encoding="UTF-8"?>
-<!-- $Header: /var/cvsroot/gentoo/xml/htdocs/doc/en/metadoc.xml,v 1.61 
2005/05/02 16:47:29 swift Exp $ -->
+<!-- $Header: /var/cvsroot/gentoo/xml/htdocs/doc/en/metadoc.xml,v 1.62 
2005/06/01 15:43:47 neysx Exp $ -->
 <!DOCTYPE metadoc SYSTEM "/dtd/metadoc.dtd">
 
 <metadoc lang="en">
-<version>1.4</version>
+<version>1.5</version>
   <members>
     <lead>swift</lead>
     <lead>neysx</lead>
@@ -307,6 +307,22 @@
     <file id="grub-error-guide">/doc/en/grub-error-guide.xml</file>
     <file id="usb-guide">/doc/en/usb-guide.xml</file>
     <file id="fluxbox-config">/doc/en/fluxbox-config.xml</file>
+    <file id="security-handbook-index">/doc/en/security/index.xml</file>
+    <file id="security-handbook">/doc/en/security/security-handbook.xml</file>
+    <file id="shb-chroot">/doc/en/security/shb-chroot.xml</file>
+    <file id="shb-firewalls">/doc/en/security/shb-firewalls.xml</file>
+    <file id="shb-intrusion">/doc/en/security/shb-intrusion.xml</file>
+    <file id="shb-kernel">/doc/en/security/shb-kernel.xml</file>
+    <file id="shb-limits">/doc/en/security/shb-limits.xml</file>
+    <file id="shb-logging">/doc/en/security/shb-logging.xml</file>
+    <file id="shb-mounting">/doc/en/security/shb-mounting.xml</file>
+    <file id="shb-pam">/doc/en/security/shb-pam.xml</file>
+    <file id="shb-perms">/doc/en/security/shb-perms.xml</file>
+    <file id="shb-pre">/doc/en/security/shb-pre.xml</file>
+    <file id="shb-tcp">/doc/en/security/shb-tcp.xml</file>
+    <file id="shb-services">/doc/en/security/shb-services.xml</file>
+    <file id="shb-tight">/doc/en/security/shb-tight.xml</file>
+    <file id="shb-uptodate">/doc/en/security/shb-uptodate.xml</file>
   </files>
   <docs>
     <doc id="name-logo">
@@ -432,12 +448,9 @@
       <memberof>gentoo_choices</memberof>
       <fileid>gentoo-kernel</fileid>
     </doc>
-    <doc id="gentoo-security">
+    <doc id="security-handbook-index">
       <memberof>sysadmin_general</memberof>
-      <fileid>gentoo-security</fileid>
-      <bugs>
-        <bug>71211</bug>
-      </bugs>
+      <fileid>security-handbook-index</fileid>
     </doc>
     <doc id="prelink-howto">
       <memberof>sysadmin_general</memberof>



-- 
[email protected] mailing list

Reply via email to