[EMAIL PROTECTED] wrote:
> 
> Hey everyone,
> 
> I have spent all day rewriting and HTML'izing the current Preliminary
> objectives. First thing in the morning I plan to release this on the live
> LPI site for public review. If you see something obvious before this
> publishing, please let me know.
> 

A couple of objective titles I don't think match the objective
description:

Objective ID 2.x.5: Debugging a Kernel
this is really: Debugging a Kernel compile.
I don't think we've gotten into debugging a kernel panic message.

Objective ID 2.x.1: Operating the Linux Filesystem
How about:  Manipulating the Linux Filesystem.

Objective ID 2.x.2: Advanced Network Configuration and Troubleshooting
shouldn't this include /sbin/modprobe?  To activate a network device you
need this.  And if it gives you errors, you probably have the wrong
driver.

Objective ID 2.x.2: Using Sendmail
for now, we could use aliases to create small mail lists
files list should also include:
virtusertable
genericstable
access.db
sendmail.cw
sendmail.cf
mailertable
relay-domains

By sendmail default, these are put in /etc/mail, however, some distros
are still using /etc or /etc/sendmail.

Objective ID 2.x.2: Configuring a router
The filter list mentions nothing of iptables use of stateful filtering
capabilities or connection tracking.  Also, iptables (unlike ipchains)
can mitigate DOS attacks.

Objective ID 2.x.5: TCP_wrappers
Objective statement needs expanding to include:
checking and testing hosts.allow setup, denying from certain users, and
sending back messages to hosts, or running programs (booby-trapping
ports), and understanding how tcp_wrappers compile-time options like
paranoid and process_options affects program function.
files and programs should include:
tcpdchk
tcpdmatch

Objective ID 2.x.6: Security Tasks
I asked this before and one person answered:  kerberos -- I've only seen
one installation in over 12 years of working Unix (was a large US gov't
site). Should we be testing on something that has been restricted to the
US until recently.
Also: code auditing?  I'm qualified to do a number of things, but I'm
not a C programmer and I can't security audit C code.  I can read the
code.  But I'm not qualified to security audit C code (or are we just
talking about shell scripts -- but I think most career sysadmins would
have trouble identifying unsecure shell code).

Just my thoughts,

David A. Bandel
-- 
Focus on the dream, not the competition.
                -- Nemesis Racing Team motto
--
This message was sent from the lpi-examdev mailing list.
Send `unsubscribe lpi-examdev' in the subject to [EMAIL PROTECTED] 
to leave the list.

Reply via email to