Solaris Security Toolkit 4.1 °ü¸® ¼³¸í¼
|
  
|
ÀÌ ¼³¸í¼¿¡´Â Solaris Security Toolkit ¼ÒÇÁÆ®¿þ¾îÀÇ ÀÌÇØ ¹× »ç¿ë¿¡ ´ëÇÑ Âü°í Á¤º¸°¡ ³ª¿É´Ï´Ù. ÀÌ ¼³¸í¼´Â ÁÖ·Î Solaris Security Toolkit ¼ÒÇÁÆ®¿þ¾î¸¦ »ç¿ëÇÏ¿© Solaris
¿î¿µ üÁ¦(OS) ¹öÀü 8°ú 9¿¡¼ º¸¾ÈÇÏ·Á´Â °ü¸®ÀÚ, ÄÁ¼³ÅÏÆ® ¹× »õ·Î¿î Sun ½Ã½ºÅÛÀ» Àü°³Çϰųª Àü°³µÈ ½Ã½ºÅÛÀ» º¸¾ÈÇÏ·Á´Â »ç¿ëÀÚ¸¦ À§ÇÑ °ÍÀÔ´Ï´Ù. ÁöħÀº JumpStart
¸ðµå ¶Ç´Â µ¶¸³Çü ¸ðµå¿¡¼ ¼ÒÇÁÆ®¿þ¾î¸¦ »ç¿ëÇϴµ¥ Àû¿ëµË´Ï´Ù.
ÀÌ ¹®¼¸¦ Àбâ Àü¿¡
»ç¿ëÀÚ´Â Solaris
¿ë Sun ÀÎÁõ ½Ã½ºÅÛ °ü¸®ÀÚ ¶Ç´Â Solaris
¿î¿µ üÁ¦¿¡ ´ëÇÑ Sun ÀÎÁõ ³×Æ®¿öÅ© °ü¸®ÀÚ¿©¾ß ÇÕ´Ï´Ù. ¶ÇÇÑ µ¶¸³Çü ³×Æ®¿öÅ© ÇÁ·ÎÅäÄÝ ¹× ÅäÆú·ÎÁö¸¦ ÀÌÇØÇØ¾ß ÇÕ´Ï´Ù.
ÀÌ ¹®¼´Â ´Ù¾çÇÑ º¸¾È °æÇèÀ̳ª Áö½ÄÀÌ ÀÖ´Â »ç¶÷¿¡°Ô À¯¿ëÇϵµ·Ï °í¾ÈµÇ¾ú±â ¶§¹®¿¡ »ç¿ëÀÚÀÇ °æÇè°ú Áö½ÄÀÌ ÀÌ ¹®¼¸¦ »ç¿ëÇÏ´Â ¹æ¹ýÀ» °áÁ¤ÇÕ´Ï´Ù.
ÀÌ ¼³¸í¼ÀÇ ±¸¼º
ÀÌ ¼³¸í¼´Â »ç¿ëÀÚ ¾È³»¼·Î »ç¿ëµË´Ï´Ù. °¢ Àå¿¡´Â ½Ã½ºÅÛ º¸¾ÈÀ» À§ÇØ ¼ÒÇÁÆ®¿þ¾î¸¦ »ç¿ëÇϱâ À§ÇÑ Á¤º¸, Áö½Ã»çÇ× ¹× ÁöħÀÌ µé¾îÀÖ½À´Ï´Ù. ÀÌ ¹®¼´Â ´ÙÀ½°ú °°ÀÌ ±¸¼ºµË´Ï´Ù.
1 ÀåÀº Solaris Security Toolkit ¼ÒÇÁÆ®¿þ¾îÀÇ µðÀÚÀÎ ¹× ¸ñÀû¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù. ÇÙ½É ±¸¼º¿ä¼Ò, ±â´É, ÀÌÁ¡ ¹× Áö¿ø Ç÷§ÆûÀ» ´Ù·ì´Ï´Ù.
2 ÀåÀº ½Ã½ºÅÛ º¸¾È ¹æ¹ý·Ð¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù. Solaris Security Toolkit ¼ÒÇÁÆ®¿þ¾î¸¦ »ç¿ëÇÏ¿© ½Ã½ºÅÛÀ» º¸¾ÈÇϱâ Àü¿¡ Àû¿ëÇÒ ¼ö ÀÖ´Â ÇÁ·Î¼¼½º¸¦ Á¦°øÇÕ´Ï´Ù.
3 ÀåÀº Solaris Security Toolkit ¼ÒÇÁÆ®¿þ¾î ¹× ±âŸ º¸¾È °ü·Ã ¼ÒÇÁÆ®¿þ¾î ´Ù¿î·Îµå, ¼³Ä¡ ¹× ½ÇÇà¿¡ ´ëÇÑ Áö½Ã»çÇ×À» Á¦°øÇÕ´Ï´Ù.
4 ÀåÀº °È ÀÛ¾÷ Áß¿¡ Solaris Security Toolkit ¼ÒÇÁÆ®¿þ¾î¸¦ ÅëÇØ ¼öÇàµÈ º¯°æ»çÇ×ÀÇ ¿ªÀü(½ÇÇà Ãë¼Ò)¿¡ ´ëÇÑ Á¤º¸ ¹× ÀýÂ÷¸¦ Á¦°øÇÕ´Ï´Ù.
5 ÀåÀº Solaris Security Toolkit ¼ÒÇÁÆ®¿þ¾î¸¦ »ç¿ëÇϱâ À§ÇÑ JumpStart ¼¹ö ±¸¼º ¹× °ü¸® Á¤º¸¸¦ Á¦°øÇÕ´Ï´Ù.
6 ÀåÀº Solaris Security Toolkit ¼ÒÇÁÆ®¿þ¾î¸¦ »ç¿ëÇÏ¿© ½Ã½ºÅÛÀÇ º¸¾ÈÀ» °¨»ç(°ËÁõ)ÇÏ´Â ¹æ¹ý¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù. °È ÈÄ¿¡ ¼³Á¤µÈ º¸¾È ÇÁ·ÎÆÄÀÏ À¯Áöº¸¼ö¿¡ ´ëÇØ¼´Â ÀÌ ÀåÀÇ Á¤º¸¿Í ÀýÂ÷¸¦ »ç¿ëÇϽʽÿÀ.
7 ÀåÀº »õ·Î¿î ½Ã½ºÅÛÀ» ¼³Ä¡ ¹× º¸¾ÈÇϱâ À§ÇØ ÀÌÀü Àå¿¡¼ Á¦°øµÇ´Â Á¤º¸¿Í Àü¹® Áö½ÄÀ» ½ÇÇö °¡´ÉÇÑ ½Ã³ª¸®¿À¿¡ Àû¿ëÇÏ´Â ¹æ¹ý¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
UNIX® ¸í·É¾î »ç¿ë
ÀÌ ¹®¼´Â ½Ã½ºÅÛ Á¾·á, ½Ã½ºÅÛ ½Ãµ¿ ¹× ÀåÄ¡ ±¸¼º°ú °°Àº ±âº» UNIX® ¸í·É¾î ¹× ÀýÂ÷¸¦ Æ÷ÇÔÇÏÁö ¾ÊÀ» ¼öµµ ÀÖ½À´Ï´Ù. ÀÌ Á¤º¸¿¡ ´ëÇØ¼´Â ´ÙÀ½À» ÂüÁ¶ÇϽʽÿÀ.
- ½Ã½ºÅÛ°ú ÇÔ²² Á¦°øµÈ ¼ÒÇÁÆ®¿þ¾î ¼³¸í¼
- ´ÙÀ½ À¥ »çÀÌÆ®¿¡¼ ³ª¿À´Â Solaris ¿î¿µ üÁ¦ ¼³¸í¼
http://docs.sun.com
½© ÇÁ·ÒÇÁÆ®
½©
|
ÇÁ·ÒÇÁÆ®
|
C ½©
|
machine-name%
|
C ½© ¼öÆÛÀ¯Àú
|
machine-name#
|
Bourne ½© ¹× Korn ½©
|
$
|
Bourne ½© ¹× Korn ½© ¼öÆÛÀ¯Àú
|
#
|
ȰÀÚü ±Ô¾à
ȰÀÚü
|
ÀǹÌ
|
º¸±â
|
AaBbCc123
|
¸í·É¾î, ÆÄÀÏ ¹× µð·ºÅ丮 À̸§; ȸé Ãâ·Â
|
.login ÆÄÀÏÀ» ÆíÁýÇϽʽÿÀ.
¸ðµç ÆÄÀÏÀ» ³ª¿ÇÏ·Á¸é ls -a¸¦ »ç¿ëÇϽʽÿÀ.
% You have mail.
|
AaBbCc123
|
ÄÄÇ»ÅÍ È¸é Ãâ·Â¿¡¼ »ç¿ëÀÚ°¡ Á÷Á¢ ÀÔ·ÂÇÏ´Â ³»¿ë
|
% su
Password:
|
AaBbCc123
|
¹®¼ Á¦¸ñ, »õ ´Ü¾î ¹× ¿ë¾î, °Á¶ÇÏ´Â ´Ü¾î. ¸í·ÉÁÙ º¯¼ö¸¦ ½ÇÁ¦ À̸§À̳ª °ªÀ¸·Î ¹Ù²Ù½Ê½Ã¿À.
|
»ç¿ë ¼³¸í¼ÀÇ Á¦ 6ÀåÀ» ÀÐ¾î º¸½Ê½Ã¿À.
À̵éÀ» class ¿É¼ÇÀ̶ó°í ÇÕ´Ï´Ù.
ÀÌ ÀÛ¾÷À» ¼öÇàÇÏ·Á¸é ¼öÆÛÀ¯Àú¿©¾ß ÇÕ´Ï´Ù.
ÆÄÀÏÀ» »èÁ¦ÇÏ·Á¸é rm ÆÄÀÏÀ̸§À» ÀÔ·ÂÇϽʽÿÀ.
|
Sun ¼³¸í¼ ¾×¼¼½º
´ÙÀ½ À¥ »çÀÌÆ®¿¡¼ ¹ø¿ª ¹öÀüÀ» Æ÷ÇÔÇÑ ±¤¹üÀ§ÇÑ Sun ¹®¼¸¦ ¿¶÷, Àμ⠶Ǵ ±¸ÀÔÇÒ ¼ö ÀÖ½À´Ï´Ù.
http://www.sun.com/documentation
Ÿ»ç À¥ »çÀÌÆ®
SunÀº ÀÌ ¼³¸í¼¿¡ ¾ð±ÞµÈ Ÿ»ç À¥ »çÀÌÆ®ÀÇ ÀÌ¿ë ¿©ºÎ¿¡ ´ëÇØ Ã¥ÀÓÁöÁö ¾Ê½À´Ï´Ù. SunÀº ÇØ´ç »çÀÌÆ® ¶Ç´Â ÀÚ¿øÀ» ÅëÇØ »ç¿ë °¡´ÉÇÑ ³»¿ë, ±¤°í, Á¦Ç° ¶Ç´Â ±âŸ ÀÚ·á¿¡ ´ëÇØ º¸ÁõÇϰųª Ã¥ÀÓÁöÁö ¾Ê½À´Ï´Ù. SunÀº ±×·¯ÇÑ »çÀÌÆ® ¶Ç´Â ÀÚ¿øÀ» ÅëÇØ »ç¿ë °¡´ÉÇÑ ³»¿ë, »óǰ ¶Ç´Â ¼ºñ½ºÀÇ »ç¿ëÀ̳ª ½Å·Ú¿¡ ÀÇÇØ ¾ß±âµÇ´Â ½ÇÁúÀû ¶Ç´Â ÁÖÀåµÈ ¼ÕÇØ³ª ¼Õ½Ç¿¡ ´ëÇØ Ã¥ÀÓÁöÁö ¾Ê½À´Ï´Ù.
°ü·Ã ÀÚ¿ø
°ü·Ã ¼³¸í¼ ¹× »çÀÌÆ®°¡ ÀÌ Àý¿¡ ³ª¿µÇ¾î ÀÖ½À´Ï´Ù.
Âü°í ¼Àû
- Andert, Donna, Wakefield, Robin ¹× Weise, Joel. "Trust Modeling for Security Architecture Development,"Sun BluePrints
OnLine, 2002³â 12¿ù, http://www.sun.com/blueprints/1202/817-0775.pdf
- Dasan, Vasanthan, Noordergraaf, Alex ¹× Ordica, Lou. "The Solaris Fingerprint Database - A Security Tool for Solaris Software and Files," Sun BluePrints OnLine, 2001³â 5¿ù, http://www.sun.com/blueprints/0501/Fingerprint.pdf.
- Englund, Martin, ìSecuring Systems with Host-Based Firewalls - Implemented With SunScreen Lite 3.1 Software,î Sun BluePrints OnLine, 2001³â 9¿ù, http://sun.com/blueprints/0901/sunscreenlite.pdf.
- Garfinkel, Simon ¹× Spafford, Gene. Practical UNIX and Internet Security, 2ÆÇ, O'Reilly & Associates, 1996³â 4¿ù.
- Howard, John S. ¹× Noordergraaf, Alex. JumpStart Technology: Effective Use in the Solaris Operating Environment, The Official Sun Microsystems Resource Series, Prentice Hall, 2001³â 8¿ù.
- Moffat, Darren J., FOCUS on SUN: Solaris BSM Auditing, http://www.securityfocus.com/infocus/1362
- Noordergraaf, Alex. "Solaris
Operating Environment Minimization for Security: A Simple, Reproducible and Secure Application Installation Methodology Updated for Solaris 8 Operating Environment," Sun BluePrints OnLine, 2000³â 11¿ù, http://sun.com/blueprints/1100/minimize-updt1.pdf.
- Noordergraaf, Alex. "Minimizing the Solaris Operating Environment for Security: Updated for Solaris 9 Operating Environment," Sun BluePrints OnLine, 2002³â 11
¿ù,http://sun.com/blueprints/1102/816-5241.pdf.
- Noordergraaf, Alex. "Securing the Sun Cluster 3.x Software,"Sun BluePrints OnLine ±â»ç, 2003³â 2¿ù, http://www.sun.com/solutions/blueprints/0203/817-1079.pdf
- Noordergraaf, Alex, "Securing the Sun Enterprise 10000 System Service Processors,"Sun BluePrints OnLine ±â»ç, 2002³â 3¿ù, http://www.sun.com/blueprints/0302/securingenter.pdf
- Noordergraaf, Alex µî, Enterprise Security: Solaris Operating Environment Security Journal, Solaris Operating Environment Versions 2.5.1, 2.6, 7, and 8, Sun Microsystems
, Prentice Hall Press, ISBN 0-13-100092-6, 2002³â 6¿ù.
- Noordergraaf, Alex ¹× Nimeh, Dina. "Securing the Sun Fire 12K and 15K Domains,"Sun BluePrints OnLine ±â»ç, 2003³â 2¿ù, http://www.sun.com/blueprints/0203/817-1357.pdf
- Noordergraaf, Alex ¹× Nimeh, Dina. "Securing the Sun Fire 12K and 15K System Controllers,"Sun BluePrints OnLine ±â»ç, 2003³â 2¿ù, http://www.sun.com/blueprints/0203/817-1358.pdf
- Noordergraaf, Alex ¹× Watson, Keith. "Solaris Operating Environment Security: Updated for the Solaris 9 Operating Environment," Sun BluePrints OnLine, 2002³â 12¿ù, http://www.sun.com/blueprints/1202/816-5242.pdf.
- O'Donnell, Nicholas ¹× Noordergraaf, Alex. "Minimizing Domains for Sun Fire V1280, 6800, 12K, and 15K Systems," Sun BluePrints OnLine articles, 2003³â 9¿ù, http://www.sun.com/blueprints/0903/817-3340.pdf [Part I] ¹× http://www.sun.com/blueprints/0903/817-3628.pdf [Part II]
- Osser, William ¹× Noordergraaf, Alex. "Auditing in the Solaris 8 Operating Environment," Sun BluePrints OnLine, 2001³â 2¿ùhttp://www.sun.com/blueprints/0201/audit_config.pdf.
- Reid, Jason M. ¹× Watson, Keith. "Building and Deploying OpenSSH in the Solaris Operating Environment," Sun BluePrints OnLine, 2001³â 7¿ù, http://sun.com/blueprints/0701/openSSH.pdf
- Reid, Jason M. "Configuring OpenSSH for the Solaris Operating Environment," Sun BluePrints OnLine ±â»ç, 2002³â 1¿ù, http://www.sun.com/blueprints/0102/configssh.pdf
- Reid, Jason. Secure Shell in the Enterprise, The Official Sun Microsystems Resource Series, Prentice Hall, 2003³â 6¿ù
- Solaris Advanced Installation Guide, Sun Microsystems, http://docs.sun.com.
- SunSHIELD Basic Security Module Guide, Sun Microsystems, Inc., http://docs.sun.com.
- Watson, Keith ¹× Noordergraaf, Alex. "Solaris Operating Environment Network Settings for Security: Updated for Solaris 9 Operating Environment,"Sun BluePrints OnLine, 2003³â 6¿ù, http://www.sun.com/solutions/blueprints/0603/816-5240.pdf
- Weise, Joel, and Martin, Charles R. "Developing a Security Policy,"Sun BluePrints OnLine ±â»ç, 2001³â 12¿ù, http://www.sun.com/solutions/blueprints/1201/secpolicy.pdf
À¥ »çÀÌÆ®
- AUSCERT, UNIX Security Checklist, http://www.auscert.org.au/render.html?it=1935&cid=1920
- CERT/CC(http://www.cert.org)´Â ¿¬¹æ Á¤ºÎÀÇ Áö¿øÀ» ¹Þ¾Æ¼ ÄÄÇ»ÅÍ º¸¾È ¹®Á¦¿¡ ´ëÇØ ¿¬±¸ÇÏ´Â ¿¬±¸ °³¹ß ¼¾ÅÍÀÔ´Ï´Ù.
- Chkrootkit, http://www.chkrootkit.org
- Galvin, Peter Baer, Solaris Security FAQ, http://www.itworld.com/Comp/2377/security-faq/
- HoneyNet Project, "Know Your Enemy: Motives" http://project.honeynet.org/papers/motives/
- List open files software, ftp://vic.cc.purdue.edu/pub/tools/unix/lsof/
- Nmap Port Scanner, http://www.insecure.org
- OpenSSH tool, http://www.openssh.com/
- Pomeranz, Hal, Solaris Security Step by Step, http://www.sans.org/
- Rhoads, Jason, Solaris Security Guide, http://www.sabernet.net/papers/Solaris.html
- Security Focus(http://www.securityfocus.org)´Â °ü·Ã º¸¾È ÁÖÁ¦¿¡ ´ëÇØ ³íÀÇÇÏ´Â Àü¿ë À¥ »çÀÌÆ®ÀÔ´Ï´Ù.
- Sendmail Consortium, sendmail ±¸¼º Á¤º¸, http://www.sendmail.org/
- Spitzner, Lance, Armoring Solaris, http://secinf.net/unix_security/Armoring_Solaris.html
- SSH Communications Security, Secure Shell (SSH) tool, http://www.ssh.com/
- Sun BluePrints OnLine, http://sun.com/blueprints
- FixModes ¼ÒÇÁÆ®¿þ¾î¿ë Sun BluePrints OnLine Tools ¹× MD5 ½ºÅ©¸³Æ®, http://jsecom15k.sun.com/ECom/EComActionServlet?StoreId=8&PartDetailId=817-0074-10&TransactionId=try&LMLoadBalanced=
- Sun Enterprise Authentication Mechanism
Á¤º¸, http://www.sun.com/software/solaris/ds/ds-seam
- SunSolveSM - http://sunsolve.sun.com
Sun ±â¼ú Áö¿ø ¹®ÀÇ
ÀÌ ¹®¼¿¡¼ ÇØ´äÀ» ãÀ» ¼ö ¾ø´Â Á¦Ç°¿¡ ´ëÇÑ ±â¼ú °ü·Ã Áú¹®Àº ´ÙÀ½ À¥ »çÀÌÆ®¸¦ ¹æ¹®ÇϽʽÿÀ.
http://www.sun.com/service/contacting
SunÀº ¿©·¯ºÐÀÇ ÀǰßÀ» ȯ¿µÇÕ´Ï´Ù
SunÀº º» ¹®¼ÀÇ ³»¿ë Çâ»ó¿¡ °ü½ÉÀÌ ÀÖÀ¸¸ç »ç¿ëÀÚ ÀǰßÀ» ȯ¿µÇÕ´Ï´Ù. ´ÙÀ½ À¥ »çÀÌÆ®¿¡¼ »ç¿ëÀÚ ÀǰßÀ» Á¦ÃâÇÒ ¼ö ÀÖ½À´Ï´Ù.
http://www.sun.com/hwdocs/feedback
Àǰ߿¡ ¹®¼ÀÇ Á¦¸ñ°ú ºÎǰ ¹øÈ£¸¦ Àû¾î ÁֽʽÿÀ.
Solaris Security Toolkit 4.1 Administration Guide, ºÎǰ ¹øÈ£ 817-7654-10