CSUF LogoCSUF Site Navigation

Fedora 12 Security

Department of Electrical and Computer Engineering
Associate Professor Gregory R. Kriehn
F12 Security
There are two programs that I like to install in order to control the abusive ssh login attempts and search for rootkits. The programs are called blockhosts and rkhunter, respectively. Unfortunately, they are not included in a stock Fedora Core installation, and so they need to be installed by hand. But before we do that, we need to setup two vital services for Fedora:  the Firewall, and SELinux. The following pages provide information with respect to their installation and setup.

2. Security
     2.1 Secure Shell (ssh & sshd)
     2.2 Firewall
     2.3 SELinux
     2.4 BlockHosts
     2.5 RKhunter