1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854 855 856 857 858 859 860 861 862 863 864 865 866 867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885 886 887 888 889 890 891 892 893 894 895 896 897 898 899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 927 928 929 930 931 932 933 934 935 936 937 938 939 940 941 942 943 944 945 946 947 948 949 950 951 952 953 954 955 956 957 958 959 960 961 962 963 964 965 966 967 968 969 970 971 972 973 974 975 976 977 978 979 980 981 982 983 984 985 986 987 988 989 990 991 992 993 994 995 996 997 998 999 1000 1001 1002 1003 1004 1005 1006 1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052 1053 1054 1055 1056 1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074 1075 1076 1077 1078 1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 1100 1101 1102 1103 1104 1105 1106 1107 1108 1109 1110 1111 1112 1113 1114 1115 1116 1117 1118 1119 1120
|
<chapt><heading>Introduzione</heading>
<p>
Una delle cose pi difficili nello scrivere documenti riguardanti la
sicurezza che ogni caso unico. Due cose a cui va prestata
attenzione sono l'ambiente minaccioso e le necessit di sicurezza del
singolo sito, host o rete. Per esempio, le necessit di sicurezza di un
utente domestico sono completamente differenti da quelle di una rete
bancaria. Mentre il rischio principale che un utente domestico deve
affrontare sono i cracker tipo script kiddie, una rete bancaria deve
preoccuparsi degli attacchi diretti. Inoltre, la banca deve
proteggere i dati dei propri clienti con precisione matematica.
In breve, ogni utente deve considerare il compromesso tra usabilit e
sicurezza/paranoia.
<!-- Is this metaphor really appropriate? Sounds like rounding errors to me,
era --></p>
<p>
Occorre tenere presente che questo manuale copre soltanto argomenti
relativi al software. Il miglior software del mondo non vi pu
proteggere se qualcuno ha accesso fisico alla macchina. Si pu
metterla sotto la scrivania, oppure in un bunker protetto da un
esercito. Tuttavia un desktop computer pu essere maggiormente sicuro
(da un punto di vista software) che uno protetto fisicamente se il
desktop computer configurato correttamente e il software sulla
macchina protetta pieno di falle di sicurezza. Naturalmente, vanno
considerate ambedue le situazioni.</p>
<p>
Questo documento d soltanto uno sguardo a quanto si pu fare per
incrementare la sicurezza del proprio sistema Debian GNU/Linux. Se
avete letto altri documenti riguardanti la sicurezza in Linux, vedrete
come argomenti comuni possono sovrapporsi a questo documento.
In ogni caso, questo documento non cerca di essere l'ultima risorsa
di informazioni di cui si possa avere bisogno, cerca soltanto di
adattare queste stesse informazioni cos che siano utilizzabili in un
sistema Debian GNU/Linux. Distribuzioni diverse
fanno alcune cose in modi differenti (per esempio l'avvio dei demoni);
qui troverete materiale appropriato per gli strumenti e le procedure
di Debian.
<!--
# Does this approximate the intent of the original author? (FIXME: check)
# Original text said: "you will find here [sic] a different approach,
# using Debian's tools, regarding security." era
-->
<!-- IMHO yes, jfs --></p>
<sect id="author">Autore
<p>L'attuale manutentore di questo documento è: <url name="Javier
Fernndez-Sanguino" id="mailto:jfs@debian.org"> Mandate a lui ogni commento,
aggiunta o suggerimento e questi verranno considerate per essere incluse nelle
future versioni di questo manuale.
<p>Questo manuale è stato iniziato con un <em>HOWTO</em> da <url
name="Alexander Reelsen" id="mailto:ar@rhwd.de">. Dopo la sua pubblicazione su
Internet <url name="Javier Fernndez-Sanguino" id="mailto:jfs@debian.org"> lo
ha incorporato nel <url name="Debian Documentation Project"
id="http://www.debian.org/doc">. Un buon numero di persone hanno contribuito a
questo manuale (tutti coloro che hanno contribuito sono elencati nel changelog)
ma le seguenti persone devono avere una menzione speciale dato che hanno
fornito in contributo significativo (intere sezioni, capitoli o appendici):
<list>
<item>Stefano Canepa
<item>Era Eriksson
<item>Carlo Perassi
<item>Alexandre Ratti
<item>Jaime Robles
<item>Yotam Rubin
<item>Frederic Schutz
<item>Pedro Zorzenon Neto
<item>Oohara Yuuma
</list>
<sect><heading>Scaricare il manuale</heading>
<p>
Potete scaricare o visionare l'ultima versione del Securing Debian
Manual dal <url id="http://www.debian.org/doc/manuals/securing-debian-howto/" name="Debian Documentation Project">.
Potete controllare l'ultima versione attraverso il
<url id="http://cvs.debian.org/ddp/manuals.sgml/securing-howto/?cvsroot=debian-doc" name="server CVS">
Debian.</p>
<p>
È disponibile anche una versione in
<url id="http://www.debian.org/doc/manuals/securing-debian-howto/securing-debian-howto.txt" name="puro testo">
dal sito del progetto di documentazione Debian. Altri formati, come il PDF,
non sono (ancora) disponibili. In ogni caso, potete installare il
pacchetto <url id="http://packages.debian.org/harden-doc" name="harden-doc">
che fornisce lo stesso documento nei formati HTML, txt e PDF. Controllate
per che il pacchetto sia aggiornato rispetto al documento fornito
su Internet (potete comunque utilizzare il pacchetto sorgente per
costruirvi una vostra versione aggiornata!).
<!--
<p>
Previous (out of date) versions of this HOWTO can be found here:
<list>
<item><url name="Text-only"
id="http://joker.rhwd.de/doc/Securing-Debian-HOWTO/Securing-Debian-HOWTO.txt">
<item><url name="HTML"
id="http://joker.rhwd.de/doc/Securing-Debian-HOWTO/Securing-Debian-HOWTO.html">
<item><url name="HTML, tarred and gzipped"
id="http://joker.rhwd.de/doc/Securing-Debian-HOWTO/Securing-Debian-HOWTO.tar.gz">
<item><url name="SGML"
id="http://joker.rhwd.de/doc/Securing-Debian-HOWTO/Securing-Debian-HOWTO.sgml">
</list>
-->
<!-- TODO: remove these stale links rather than leave references to -->
<!-- the old versions hanging around? era --></p></sect>
<sect><heading>Note/Feedback organizzativi</heading>
<p>
Ed ora la parte ufficiale. Fino ad ora io (Alexander Reelsen) ho
scritto la maggioranza dei paragrafi di questo manuale, ma mia
opinione che non dovrebbe continuare cos. Sono cresciuto e vivo con
il software libero, parte del mio uso quotidiano e immagino anche
del vostro. Incoraggio tutti a spedirmi feedback,
aggiunte od ogni altro tipo di suggerimento che possiate fornirmi.</p>
<p>
Se ritenete di poter mantenere un certo capitolo o meglio una
sezione, allora scrivete al manutentore del documento e sarete i
benvenuti. Specificatamente, se trovate in una sezione dei contrassegni
come "FIXME", questo significa che l'autore non ha il tempo o
la conoscenza necessaria sull'argomento, inviate un'email immediatamente.</p>
<p>
L'argomento di questo manuale rende abbastanza chiara l'importanza
di mantenerlo aggiornato e ognuno pu fare la propria parte.
Per favore, contribuite.</p></sect>
<sect><heading>Conoscenze preliminari</heading>
<p>
L'installazione di Debian GNU/Linux non molto difficile e
dovreste essere in grado di eseguirla. Se avete gi alcune
conoscenze di Linux o di altri sistemi Unix e un po' di familiarit
con gli aspetti base della sicurezza, risulter semplice
comprendere questo manuale, dal momento che questo documento non
pu entrare in ogni piccolo dettaglio di ogni caratteristica presa
in considerazione (altrimenti sarebbe stato un libro
e non un manuale). Se non avete questa
familiarit con la materia, in ogni caso, potete dare uno sguardo a
<ref id="references">, per trovare dove reperire informazioni
pi dettagliate.</p></sect>
<sect><heading>Argomenti da scrivere</heading>
<p>Questo paragrafo descrive tutte le cose che devone essere sistemate in questo manuale. Alcuni paragrafi includono i tag <em>FIXME</em> o <em>TODO</em> per
descrivere quale contenuto manca (o quale tipo di lavoro deve essere fatto). Lo
scopo di questo paragrafo è di descrivere tutte quelle cose che
potrebbero essere incluse nel Manuale o miglioramenti che devono essere fatti
(o dovrebbero essere aggiunti).
<p>Se pensate di poter fornire aiuto nel contribuire contenuti per
sistemare alcuni degli elementi della lista (o le note incluse) contattate
l'autore principale (<ref id="author">)
<list>
<item><p>Aumentare le informazioni sulla "reazione agli incidenti", magari
aggiungendo qualche idea tratta dal RedHat Security Guide
<url id="http://www.redhat.com/docs/manuals/linux/RHL-9-Manual/security-guide/ch-response.html" name="capitolo sulla reazione agli incidenti">.</p></item>
<item>
<p>Scrivere in merito agli strumenti di monitoraggio remoto
(per controllare la disponibilit del sistema)
come monit, daemontools e mon. Vedete
<url id="http://linux.oreillynet.com/pub/a/linux/2002/05/09/sysadminguide.html">.</p></item>
<item>
<p>Considerare l'opportunit di scrivere una sezione riguardante la
costruzione di applicazioni di rete basate su Debian (completa di
informazioni su sistema di base, <package>equivs</package> e FAI).</p></item>
<item>
<p>Controllare se <url id="http://rr.sans.org/linux/hardening.php">
contiene informazioni rilevanti non ancora trattate qui.</p></item>
<item>
<p>Aggiungere informazioni su come configurare un laptop con
Debian <url id="http://rr.sans.org/linux/debian_laptop.php">.</p></item>
<item>
<p>Aggiungere informazioni su come installare un firewall usando
Debian GNU/Linux. La sezione riguardante il firewalling
attualmente orientata verso un singolo sistema (non
proteggendo gli altri...) e inoltre scrivere su come testare
l'installazione.</p></item>
<item>
<p>Aggiungere informazioni su come configurare un proxy firewall
con Debian GNU/Linux partendo specificatamente da pacchetti
che forniscono servizi di proxy (come
<package>xfwp</package>, <package>xproxy</package>,
<package>ftp-proxy</package>, <package>redir</package>,
<package>smtpd</package>, <package>nntp-cache</package>,
<package>dnrd</package>, <package>jftpgw</package>, <package>oops</package>,
<package>pdnsd</package>, <package>perdition</package>,
<package>transproxy</package>, <package>tsocks</package>).
Si dovrebbe puntare al manuale per ogni altra informazione. Si
noti che <package>zorp</package> ora disponibile come pacchetto Debian ed
<em></em> un proxy firewall (vengono anche forniti pacchetti Debian upstream).</p></item>
<item><p>Informazioni sulla configurazione dei servizi con i file-rc.</p></item>
<item><p>Controllare tutte le URL di riferimento e
rimuovere/correggere quelle non pi disponibili.</p></item>
<item><p>Aggiungere informazioni sui sostituti disponibili (in
Debian) per i server comuni, utili per le limitate funzionalit.
Per esempio:
<list>
<item><p>lpr locale con cups (pacchetto)?</p></item>
<item><p>lrp remoto con lpr</p></item>
<item><p>bind con dnrd/maradns</p></item>
<item><p>apache con dhttpd/thttpd/wn (tux?)</p></item>
<item><p>exim/sendmail con ssmtpd/smtpd/postfix</p></item>
<item><p>squid con tinyproxy</p></item>
<item><p>ftpd con oftpd/vsftp</p></item>
<item><p>...</p></item>
</list></p></item>
<item>
<p>Maggiori informazioni riguardanti le patch per il kernel
riguardanti la sicurezza in Debian, incluse quelle mostrate
sopra e informazioni specifiche su come rendere
attive queste patch in un sistema Debian.
<list>
<item><p>Linux Intrusion Detection (<package>lids-2.2.19</package>)</p></item>
<item><p>Linux Trustees (nel pacchetto <package>trustees</package>)</p></item>
<item><p><url id="http://www.coker.com.au/selinux/" name="NSA Enhanced Linux"></p></item>
<item><p><url id="http://packages.debian.org/kernel-patch-2.2.18-openwall" name="kernel-patch-2.2.18-openwall"></p></item>
<item><p><package>kernel-patch-2.2.19-harden</package></p></item>
<item><p><package>kernel-patch-freeswan, kernel-patch-int</package></p></item>
</list></p></item>
<item>
<p>Dettagli su come disattivare servizi di rete non necessari (a
parte <prgn>inetd</prgn>), sono trattati in parte nelle procedure di
irrobustimento ma potrebbero essere estesi un po'.</p></item>
<item>
<p>Informazioni riguardanti la rotazione delle password che
strettamente collegato alle policy (convenzioni adottate in Debian).</p></item>
<item><p>Politica ed educazione degli utenti al riguardo.</p></item>
<item><p>Maggior dettagli per i tcpwrapper e i wrapper in generale?</p></item>
<item><p><file>hosts.equiv</file> e altri importanti buchi di sicurezza.</p></item>
<item><p>Informazioni sui server di condivisione dei file come Samba ed NFS?</p></item>
<item><p>suidmanager/dpkg-statoverrides.</p></item>
<item><p>lpr e lprng.</p></item>
<item><p>Disabilitare le "cose" IP di GNOME</p></item>
<item>
<p>Scrivere su pam_chroot (vedete in
<url id="http://lists.debian.org/debian-security/2002/debian-security-200205/msg00011.html">
e la sua utilit per limitare gli utenti. Introdurre
informazioni relative a
<url id="http://online.securityfocus.com/infocus/1575">.
<package>Pdmenu</package>, per esempio disponibile in Debian (mentre
flash non lo ).</p></item>
<item>
<p>Scrivere sui servizi di chrooting, alcune informazioni sono presso:
<url id="http://www.linuxfocus.org/English/January2002/aritcle225.shtml">,
<url id="http://www.networkdweebs.com/chroot.html"> e
<url id="http://www.linuxsecurity.com/feature_stories/feature_story-99.html"></p></item>
<item>
<p>Scrivere sui programmi per realizzare gabbie chroot. <package>Compartment</package> e
<package>chrootuid</package> sono in attesa per l'ingresso. Anche alcuni altri
(makejail, jailer) potrebbero essere introdotti.</p></item>
<item>
<p>Aggiungere le informazioni fornite da Karl Hegbloom al
riguardo di Bind 9 in ambiente chrooted, vedete in
<url id="http://people.pdxlinux.org/~karlheg/Secure_Bind9_uHOWTO/Secure_Bind_9_uHOWTO.xhtml">.</p></item>
<item>
<p>Aggiungere le informazioni fornite da Pedro Zornenon per il chrooting
con Bind 8 solo per i sistemi potato, vedete in
<url id="http://people.debian.org/~pzn/howto/chroot-bind.sh.txt"> (includere
l'intero script?).</p></item>
<item>
<p>Maggiori informazioni al riguardo del software per l'analisi dei
log (per esempio logcheck e logcolorise).</p></item>
<item>
<p>Routing "avanzato" (le politiche di traffico sono connesse con
la sicurezza).</p></item>
<item>
<p>Limitare l'accesso con <prgn>ssh</prgn> per eseguire solo alcuni comandi.</p></item>
<item>
<p>Usare dpkg-statoverride.</p></item>
<item>
<p>Un modo sicuro per condividere un masterizzatore tra gli
utenti.</p></item>
<item>
<p>Modi sicuri per fornire suoni sulla rete in aggiunta alle
capacit di display di rete (cos che i suoni dei client X
siano eseguiti sull'hardware del server X).</p></item>
<item><p>Rendere sicuri i web browser.</p></item>
<item><p>Impostare ftp su <prgn>ssh</prgn>.</p></item>
<item><p>Usare un loopback file system crittografato.</p></item>
<item><p>Crittografare l'intero file system.</p></item>
<item><p>Strumenti steganografici.</p></item>
<item><p>Impostare un PKA per un'organizzazione.</p></item>
<item>
<p>Utilizzare LDAP per gestire gli utenti. Esiste un HOWTO di
ldap+kerberos per Debian presso www.bayour.com scritto da Turbo
Fredrikson.</p></item>
<item>
<p>Come rimuovere le informazioni di scarsa utilit nei sistemi
in produzione come /usr/share/doc, /usr/share/man (s,
sicurezza tramite riservatezza).</p></item>
<item>
<p>Maggiori informazioni su lcap basate sul file README dei
pacchetti (bene, non ancora, vedete il
<url id="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=169465" name="Bug #169465">)
e dall'articolo da LWN: <url id="http://lwn.net/1999/1202/kernel.php3" name="Kernel development">.</p></item>
<item>
<p>Aggiungere l'articolo di Add Colin's su come configurare un ambiente
in chroot per un sistema Sid completo
(<url id="http://people.debian.org/~walters/chroot.html">)</p></item>
<item>
<p>Aggiungere informazioni su come attivare pi sensori snort in un
dato sistema (controllare i rapporti sui bachi spediti da snort)</p></item>
<item><p>Aggiungere informazioni su come configurare una
honeypot (<package>honeyd</package>)</p></item>
</list></p></sect>
<sect id="changelog"><heading>Changelog/History</heading>
<sect1>Version 2.97 (september 2003)
<p>Changes by Javier Fernndez-Sanguino Pea
<list>
<item>Added those that have made the most significant contributions to
this manual (please mail me if you think you should be in the list and
are not).
<item>Added some blurb about FIXME/TODOs
<item>Moved the information on security updates to the beginning of
the section as suggested by Elliott Mitchell.
<item>Added grsecurity to the list of kernel-patches for security but
added a footnote on the current issues with it as suggested by Elliott
Mitchell.
<item>Removed loops (echo to 'all') in the kernel's network security
script as suggested by Elliott Mitchell.
<item>Added more (up-to-date) information in the antivirus section.
<item>Rewrote the buffer overflow protection section and added more
information on patches to the compiler to enable this kind of
protection.
</list>
<sect1>Version 2.96 (august 2003)
<p>Changes by Javier Fernndez-Sanguino Pea
<list>
<item>Removed (and then readded) appendix on chrooting Apache. The appendix is now dual-licensed.
</list>
<sect1><heading>Version 2.95 (june 2003)</heading>
<p>Changes by Javier Fernndez-Sanguino Pea
<list>
<item>Fixed typos spotted by Leonard Norrgard
<item><p>Added a section on how to contact CERT for incident handling
(<url id="#after-compromise">)</p></item>
<item><p>More information on setting up a Squid proxy.</p></item>
<item>Added a pointer and removed a FIXME thanks to Helge H. F.
<item>Fixed a typo (save_inactive) spotted by Philippe Faes.
<item>Fixed several typos spotted by Jaime Robles.
</list></p></sect1>
<sect1><heading>Version 2.94 (april 2003)</heading>
<p>Changes by Javier Fernndez-Sanguino Pea
<list>
<item><p>Following Maciej Stachura's suggestions I've expanded the section on
limiting users.</p></item>
<item><p>Fixed typo spotted by Wolfgang Nolte.</p></item>
<item><p>Fixed links with patch contributed by Ruben Leote Mendes.</p></item>
<item><p>Added a link to David Wheeler's excellent document on the footnote
about counting security vulnerabilities.</p></item>
</list></p></sect1>
<sect1><heading>Version 2.93 (march 2003)</heading>
<p>Changes made by Frdric Schtz.
<list>
<item><p>rewrote entirely the section of ext2 attributes
(lsattr/chattr)</p></item>
</list></p></sect1>
<sect1><heading>Version 2.92 (february 2003)</heading>
<p>Changes by Javier Fernndez-Sanguino Pea and
Frdric Schtz.
<list>
<item><p>Merge section 9.3 ("useful kernel patches") into section 4.13 ("Adding
kernel patches"), and added some content.</p></item>
<item><p>Added a few more TODOs</p></item>
<item><p>Added information on how to manually check for updates and also about
cron-apt. That way Tiger is not perceived as the only way to do automatic
update checks.</p></item>
<item><p>Slightly rewrite of the section on executing a security updates due
to Jean-Marc Ranger comments.</p></item>
<item><p>Added a note on Debian's installation (which will suggest the user
to execute a security update right after installation)</p></item>
</list></p></sect1>
<sect1><heading>Version 2.91 (january/february 2003)</heading>
<p>Changes by Javier Fernndez-Sanguino Pea (me).
<list>
<item><p>Added a patch contributed by Frdric Schtz.</p></item>
<item><p>Added a few more references on capabilities thanks to Frdric.</p></item>
<item><p>Slight changes in the bind section adding a reference to BIND's 9
online documentation and proper references in the first area (Hi Pedro!)</p></item>
<item><p>Fixed the changelog date - new year :-)</p></item>
<item><p>Added a reference to Colin's articles for the TODOs.</p></item>
<item><p>Removed reference to old ssh+chroot patches.</p></item>
<item><p>More patches from Carlo Perassi.</p></item>
<item><p>Typo fixes (recursive in Bind is recursion), pointed out by
Maik Holtkamp.</p></item>
</list></p></sect1>
<sect1><heading>Version 2.91 (january 2002)</heading>
<p>Changes by Javier Fernndez-Sanguino Pea (me).
<list>
<item><p>Added a patch contributed by Frederic Schutz.</p></item>
<item><p>Added a few more references on capabilities thanks to Frederic.</p></item>
</list></p></sect1>
<sect1><heading>Version 2.9 (december 2002)</heading>
<p>Changes by Javier Fernndez-Sanguino Pea (me).
<list>
<item><p>Reorganised the information on chroot (merged two sections, it didn't make much sense to have them separated)</p></item>
<item><p>Added the notes on chrooting Apache provided by Alexandre Raitti.</p></item>
<item><p>Applied patches contributed by Guillermo Jover.</p></item>
</list></p></sect1>
<sect1><heading>Version 2.8 (november 2002)</heading>
<p>Changes by Javier Fernndez-Sanguino Pea (me).
<list>
<item><p>Applied patches from Carlo Perassi, fixes include: re-wrapping the
lines, url fixes, and fixed some FIXMEs</p></item>
<item><p>Updated the contents of the Debian security team FAQ.</p></item>
<item><p>Added a link to the Debian security team FAQ and the Debian Developer's
reference, the duplicated sections might (just might) be removed in the future.</p></item>
<item><p>Fixed the hand-made auditing section with comments from Michal Zielinski.</p></item>
<item><p>Added links to wordlists (contributed by Carlo Perassi)</p></item>
<item><p>Fixed some typos (still many around).</p></item>
<item><p>Fixed TDP links as suggested by John Summerfield.</p></item>
</list></p></sect1>
<sect1><heading>Version 2.7 (october 2002)</heading>
<p>Changes by Javier Fernndez-Sanguino Pea (me). Note: I still
have a lot of pending changes in my mailbox (which is currently
about 5 Mbs in size).
<list>
<item><p>Some typo fixes contributed by Tuyen Dinh, Bartek Golenko and
Daniel K. Gebhart.</p></item>
<item><p>Note regarding /dev/kmem rootkits contributed by Laurent Bonnaud</p></item>
<item><p>Fixed typos and FIXMEs contributed by Carlo Perassi.</p></item>
</list></p></sect1>
<sect1><heading>Version 2.6 (september 2002)</heading>
<p>Changes by Chris Tillman, tillman@voicetrak.com.
<list>
<item><p>Changed around to improve grammar/spelling.</p></item>
<item><p>s/host.deny/hosts.deny/ (1 place)</p></item>
<item><p>Applied Larry Holish's patch (quite big, fixes a lot of FIXMEs)</p></item>
</list></p></sect1>
<sect1><heading>Version 2.5 (september 2002)</heading>
<p>Changes by Javier Fernndez-Sanguino Pea (me).
<list>
<item><p>Fixed minor typos submitted by Thiemo Nagel.</p></item>
<item><p>Added a footnote suggested by Thiemo Nagel.</p></item>
<item><p>Fixed an URL link.</p></item>
</list></p></sect1>
<sect1><heading>Version 2.5 (august 2002)</heading>
<p>Changes by Javier Fernndez-Sanguino Pea (me). There were many
things waiting on my inbox (as far back as February) to be included,
so I'm going to tag this the <em>back from honeymoon</em> release :)
<list>
<item><p>Applied a patch contributed by Philipe Gaspar regarding the
Squid which also kills a FIXME.</p></item>
<item><p>Yet another FAQ item regarding service banners taken from the
debian-security mailing list (thread "Telnet information" started 26th
July 2002).</p></item>
<item><p>Added a note regarding use of CVE cross references in the
<em>How much time does the Debian security team...</em> FAQ item.</p></item>
<item><p>Added a new section regarding ARP attacks contributed by Arnaud
"Arhuman" Assad.</p></item>
<item><p>New FAQ item regarding dmesg and console login by the kernel.</p></item>
<item><p>Small tidbits of information to the signature-checking issues in
packages (it seems to not have gotten past beta release).</p></item>
<item><p>New FAQ item regarding vulnerability assessment tools false
positives.</p></item>
<item><p>Added new sections to the chapter that contains information on
package signatures and reorganised it as a new <em>Debian Security
Infrastructure</em> chapter.</p></item>
<item><p>New FAQ item regarding Debian vs. other Linux distributions.</p></item>
<item><p>New section on mail user agents with GPG/PGP functionality in the
security tools chapter.</p></item>
<item><p>Clarified how to enable MD5 passwords in woody, added a pointer
to PAM as well as a note regarding the max definition in PAM.</p></item>
<item><p>Added a new appendix on how to create chroot environments (after
fiddling a bit with makejail and fixing, as well, some of its bugs),
integrated duplicate information in all the appendix.</p></item>
<item><p>Added some more information regarding <prgn>SSH</prgn> chrooting and its
impact on secure file transfers. Some information has been retrieved
from the debian-security mailing list (June 2002 thread: <em>secure
file transfers</em>).</p></item>
<item><p>New sections on how to do automatic updates on Debian systems as
well as the caveats of using testing or unstable regarding security updates.</p></item>
<item><p>New section regarding keeping up to date with security patches
in the <em>Before compromise</em> section as well as a new section
about the debian-security-announce mailing list.</p></item>
<item><p>Added information on how to automatically generate strong passwords.</p></item>
<item><p>New section regarding login of idle users.</p></item>
<item><p>Reorganised the securing mail server section based on the
<em>Secure/hardened/minimal Debian (or "Why is the base system the way
it is?")</em> thread on the debian-security mailing list (May 2002).</p></item>
<item><p>Reorganised the section on kernel network parameters, with
information provided in the debian-security mailing list (May 2002,
<em>syn flood attacked?</em> thread) and added a new FAQ item as well.</p></item>
<item><p>New section on how to check users passwords and which packages
to install for this.</p></item>
<item><p>New section on PPTP encryption with Microsoft clients discussed
in the debian-security mailing list (April 2002).</p></item>
<item><p>Added a new section describing what problems are there when binding any
given service to a specific IP address, this information was written based on
the bugtraq mailing list in the thread: <em>Linux kernel 2.4 "weak end host"
issue (previously discussed on debian-security as "arp problem")</em> (started
on May 9th 2002 by Felix von Leitner).</p></item>
<item><p>Added information on <prgn>ssh</prgn> protocol version 2.</p></item>
<item><p>Added two subsections related to Apache secure configuration
(the things specific to Debian, that is).</p></item>
<item><p>Added a new FAQ related to raw sockets, one related to /root, an
item related to users' groups and another one related to log and
configuration files permissions.</p></item>
<item><p>Added a pointer to a bug in libpam-cracklib that might still be
open... (need to check)</p></item>
<item><p>Added more information regarding forensics analysis (pending more
information on packet inspection tools such as <prgn>tcpflow</prgn>).</p></item>
<item><p>Changed the "what should I do regarding compromise" into a bullet
list and included some more stuff.</p></item>
<item><p>Added some information on how to set up the Xscreensaver to lock
the screen automatically after the configured timeout.</p></item>
<item><p>Added a note related to the utilities you should not install in
the system. Included a note regarding Perl and why it cannot be
easily removed in Debian. The idea came after reading Intersect's
documents regarding Linux hardening.</p></item>
<item><p>Added information on lvm and journalling file systems, ext3
recommended. The information there might be too generic, however.</p></item>
<item><p>Added a link to the online text version (check).</p></item>
<item><p>Added some more stuff to the information on firewalling the
local system, triggered by a comment made by Hubert Chan in the mailing list.</p></item>
<item><p>Added more information on PAM limits and pointers to Kurt
Seifried's documents (related to a post by him to bugtraq on April 4th
2002 answering a person that had ``discovered'' a vulnerability in
Debian GNU/Linux related to resource starvation).</p></item>
<item><p>As suggested by Julin Muoz, provided more information on the
default Debian umask and what a user can access if he has been given a
shell in the system (scary, huh?)</p></item>
<item><p>Included a note in the BIOS password section due to a comment
from Andreas Wohlfeld.</p></item>
<item><p>Included patches provided by Alfred E. Heggestad fixing many of
the typos still present in the document.</p></item>
<item><p>Added a pointer to the changelog in the Credits section since
most people who contribute are listed here (and not there).</p></item>
<item><p>Added a few more notes to the chattr section and a new section
after installation talking about system snapshots. Both ideas were
contributed by Kurt Pomeroy.</p></item>
<item><p>Added a new section after installation just to remind users to
change the boot-up sequence.</p></item>
<item><p>Added some more TODO items provided by Korn Andras.</p></item>
<item><p>Added a pointer to the NIST's guidelines on how to secure DNS
provided by Daniel Quinlan.</p></item>
<item><p>Added a small paragraph regarding Debian's SSL certificates
infrastructure.</p></item>
<item><p>Added Daniel Quinlan's suggestions regarding <prgn>ssh</prgn>
authentication and exim's relay configuration.</p></item>
<item><p>Added more information regarding securing bind including changes
suggested by Daniel Quinlan and an appendix with a script to make some of the
changes commented on in that section.</p></item>
<item><p>Added a pointer to another item regarding Bind chrooting (needs to be
merged).</p></item>
<item><p>Added a one liner contributed by Cristian Ionescu-Idbohrn to
retrieve packages with tcpwrappers support.</p></item>
<item><p>Added a little bit more info on Debian's default PAM setup.</p></item>
<item><p>Included a FAQ question about using PAM to provide services without
shell accounts.</p></item>
<item><p>Moved two FAQ items to another section and added a new FAQ
regarding attack detection (and compromised systems).</p></item>
<item><p>Included information on how to set up a bridge firewall
(including a sample Appendix). Thanks go to Francois Bayart who sent
this to me in March.</p></item>
<item><p>Added a FAQ regarding the syslogd's <em>MARK</em>
<em>heartbeat</em> from a question answered by Noah Meyerhans and
Alain Tesio in December 2001.</p></item>
<item><p>Included information on buffer overflow protection as well as
some information on kernel patches.</p></item>
<item><p>Added more information (and reorganised) the firewall
section. Updated the information regarding the iptables package and
the firewall generators available.</p></item>
<item><p>Reorganized the information regarding log checking, moved
logcheck information from host intrusion detection to that section.</p></item>
<item><p>Added some information on how to prepare a static package for
bind for chrooting (untested).</p></item>
<item><p>Added a FAQ item regarding some specific servers/services
(could be expanded with some of the
recommendations from the debian-security list).</p></item>
<item><p>Added some information on RPC services (and when it's necessary).</p></item>
<item><p>Added some more information on capabilities (and what lcap does).
Is there any good documentation on this? I haven't found any documentation on
my 2.4 kernel.</p></item>
<item><p>Fixed some typos.</p></item>
</list></p></sect1>
<sect1><heading>Version 2.4</heading>
<p>Changes by Javier Fernndez-Sanguino Pea.
<list>
<item><p>Rewritten part of the BIOS section.</p></item>
</list></p></sect1>
<sect1><heading>Version 2.3</heading>
<p>Changes by Javier Fernndez-Sanguino Pea.
<list>
<item><p>Wrapped most file locations with the file tag.</p></item>
<item><p>Fixed typo noticed by Edi Stojicevi.</p></item>
<item><p>Slightly changed the remote audit tools section.</p></item>
<item><p>Added some todo items.</p></item>
<item><p>Added more information regarding printers and cups config file
(taken from a thread on debian-security).</p></item>
<item><p>Added a patch submitted by Jesus Climent regarding access of
valid system users to Proftpd when configured as anonymous server.</p></item>
<item><p>Small change on partition schemes for the special case of mail
servers.</p></item>
<item><p>Added Hacking Linux Exposed to the books section.</p></item>
<item><p>Fixed directory typo noticed by Eduardo Prez Ureta.</p></item>
<item><p>Fixed /etc/ssh typo in checklist noticed by Edi Stojicevi.</p></item>
</list></p></sect1>
<sect1><heading>Version 2.3</heading>
<p>Changes by Javier Fernndez-Sanguino Pea.
<list>
<item><p>Fixed location of dpkg conffile.</p></item>
<item><p>Remove Alexander from contact information.</p></item>
<item><p>Added alternate mail address.</p></item>
<item><p>Fixed Alexander mail address (even if commented out).</p></item>
<item><p>Fixed location of release keys (thanks to Pedro Zorzenon for pointing
this out).</p></item>
</list></p></sect1>
<sect1><heading>Version 2.2</heading>
<p>Changes by Javier Fernndez-Sanguino Pea.
<list>
<item><p>Fixed typos, thanks to Jamin W. Collins.</p></item>
<item><p>Added a reference to apt-extracttemplate manpage
(documents the APT::ExtractTemplate config).</p></item>
<item><p>Added section about restricted SSH. Information based on that
posted by Mark Janssen, Christian G. Warden and Emmanuel Lacour on
the debian-security mailing list.</p></item>
<item><p>Added information on antivirus software.</p></item>
<item><p>Added a FAQ: su logs due to the cron running as root.</p></item>
</list></p></sect1>
<sect1><heading>Version 2.1</heading>
<p>Changes by Javier Fernndez-Sanguino Pea.
<list>
<item><p>Changed FIXME from lshell thanks to Oohara Yuuma.</p></item>
<item><p>Added package to sXid and removed comment since it *is* available.</p></item>
<item><p>Fixed a number of typos discovered by Oohara Yuuma.</p></item>
<item><p>ACID is now available in Debian (in the acidlab package)
thanks to Oohara Yuuma for noticing.</p></item>
<item><p>Fixed LinuxSecurity links (thanks to Dave Wreski for telling).</p></item>
</list></p></sect1>
<sect1><heading>Version 2.0</heading>
<p>Changes by Javier Fernndez-Sanguino Pea. I wanted to
change to 2.0 when all the FIXMEs were, er, fixed but I ran out
of 1.9X numbers :(
<list>
<item><p>Converted the HOWTO into a Manual (now I can properly say RTFM)</p></item>
<item><p>Added more information regarding tcp wrappers and Debian (now
many services are compiled with support for them so it's no longer
an <prgn>inetd</prgn> issue).</p></item>
<item><p>Clarified the information on disabling services to make it more
consistent (rpc info still referred to update-rc.d)</p></item>
<item><p>Added small note on lprng.</p></item>
<item><p>Added some more info on compromised servers (still very rough)</p></item>
<item><p>Fixed typos reported by Mark Bucciarelli.</p></item>
<item><p>Added some more steps in password recovery to cover the cases
when the admin has set paranoid-mode=on.</p></item>
<item><p>Added some information to set paranoid-mode=on when login in
console.</p></item>
<item><p>New paragraph to introduce service configuration.</p></item>
<item><p>Reorganised the <em>After installation</em> section so it is
more broken up into several issues and it's easier to read.</p></item>
<item><p>Wrote information on how to set up firewalls with the standard
Debian 3.0 setup (iptables package).</p></item>
<item><p>Small paragraph explaining why installing connected to the
Internet is not a good idea and how to avoid this using Debian tools.</p></item>
<item><p>Small paragraph on timely patching referencing to IEEE paper.</p></item>
<item><p>Appendix on how to set up a Debian snort box, based on what Vladimir
sent to the debian-security mailing list (September 3rd 2001)</p></item>
<item><p>Information on how logcheck is set up in Debian and how it can be
used to set up HIDS.</p></item>
<item><p>Information on user accounting and profile analysis.</p></item>
<item><p>Included apt.conf configuration for read-only /usr copied from Olaf
Meeuwissen's post to the debian-security mailing list</p></item>
<item><p>New section on VPN with some pointers and the packages available
in Debian (needs content on how to set up the VPNs and Debian-specific
issues), based on Jaroslaw Tabor's and Samuli Suonpaa's post to
debian-security.</p></item>
<item><p>Small note regarding some programs to automatically build chroot jails</p></item>
<item><p>New FAQ item regarding identd based on a discussion in the
debian-security mailing list (February 2002, started by Johannes Weiss).</p></item>
<item><p>New FAQ item regarding <prgn>inetd</prgn> based on a discussion in the
debian-security mailing list (February 2002).</p></item>
<item><p>Introduced note on rcconf in the "disabling services" section.</p></item>
<item><p>Varied the approach regarding LKM, thanks to Philipe Gaspar</p></item>
<item><p>Added pointers to CERT documents and Counterpane resources</p></item>
</list></p></sect1>
<sect1><heading>Version 1.99</heading>
<p>Changes by Javier Fernndez-Sanguino Pea.
<list>
<item><p>Added a new FAQ item regarding time to fix security vulnerabilities.</p></item>
<item><p>Reorganised FAQ sections.</p></item>
<item><p>Started writing a section regarding firewalling in Debian GNU/Linux
(could be broadened a bit)</p></item>
<item><p>Fixed typos sent by Matt Kraai</p></item>
<item><p>Fixed DNS information</p></item>
<item><p>Added information on whisker and nbtscan to the auditing section.</p></item>
<item><p>Fixed some wrong URLs</p></item>
</list></p></sect1>
<sect1><heading>Version 1.98</heading>
<p>Changes by Javier Fernndez-Sanguino Pea.
<list>
<item><p>Added a new section regarding auditing using Debian GNU/Linux.</p></item>
<item><p>Added info regarding finger daemon taken from the security mailing list.</p></item>
</list></p></sect1>
<sect1><heading>Version 1.97</heading>
<p>Changes by Javier Fernndez-Sanguino Pea.
<list>
<item><p>Fixed link for Linux Trustees</p></item>
<item><p>Fixed typos (patches from Oohara Yuuma and Pedro Zorzenon)</p></item>
</list></p></sect1>
<sect1><heading>Version 1.96</heading>
<p>Changes by Javier Fernndez-Sanguino Pea.
<list>
<item><p>Reorganized service installation and removal and added some new notes.</p></item>
<item><p>Added some notes regarding using integrity checkers as intrusion
detection tools.</p></item>
<item><p>Added a chapter regarding package signatures.</p></item>
</list></p></sect1>
<sect1><heading>Version 1.95</heading>
<p>Changes by Javier Fernndez-Sanguino Pea.
<list>
<item><p>Added notes regarding Squid security sent by Philipe Gaspar.</p></item>
<item><p>Fixed rootkit links thanks to Philipe Gaspar.</p></item>
</list></p></sect1>
<sect1><heading>Version 1.94</heading>
<p>Changes by Javier Fernndez-Sanguino Pea.
<list>
<item><p>Added some notes regarding Apache and Lpr/lpng.</p></item>
<item><p>Added some information regarding noexec and read-only partitions.</p></item>
<item><p>Rewrote how users can help in Debian security issues (FAQ item).</p></item>
</list></p></sect1>
<sect1><heading>Version 1.93</heading>
<p>Changes by Javier Fernndez-Sanguino Pea.
<list>
<item><p>Fixed location of mail program.</p></item>
<item><p>Added some new items to the FAQ.</p></item>
</list></p></sect1>
<sect1><heading>Version 1.92</heading>
<p>Changes by Javier Fernndez-Sanguino Pea.
<list>
<item><p>Added a small section on how Debian handles security</p></item>
<item><p>Clarified MD5 passwords (thanks to `rocky')</p></item>
<item><p>Added some more information regarding harden-X from Stephen van Egmond</p></item>
<item><p>Added some new items to the FAQ</p></item>
</list></p></sect1>
<sect1><heading>Version 1.91</heading>
<p>Changes by Javier Fernndez-Sanguino Pea.
<list>
<item><p>Added some forensics information sent by Yotam Rubin.</p></item>
<item><p>Added information on how to build a honeynet using Debian GNU/Linux.</p></item>
<item><p>Added some more TODOS.</p></item>
<item><p>Fixed more typos (thanks Yotam!)</p></item>
</list></p></sect1>
<sect1><heading>Version 1.9</heading>
<p>Changes by Javier Fernndez-Sanguino Pea.
<list>
<item><p>Added patch to fix misspellings and some new information (contributed
by Yotam Rubin)</p></item>
<item><p>Added references to other online (and offline) documentation both in a
section (see <ref id="references">) by itself and inline in some sections.</p></item>
<item><p>Added some information on configuring Bind options to restrict
access to the DNS server.</p></item>
<item><p>Added information on how to automatically harden a Debian system
(regarding the harden package and bastille).</p></item>
<item><p>Removed some done TODOs and added some new ones.</p></item>
</list></p></sect1>
<sect1><heading>Version 1.8</heading>
<p>Changes by Javier Fernndez-Sanguino Pea.
<list>
<item><p>Added the default user/group list provided by Joey Hess to the
debian-security mailing list.</p></item>
<item><p>Added information on LKM root-kits (<ref id="LKM">)
contributed by Philipe Gaspar.</p></item>
<item><p>Added information on Proftp contributed by Emmanuel Lacour.</p></item>
<item><p>Recovered the checklist Appendix from Era Eriksson.</p></item>
<item><p>Added some new TODO items and removed other fixed ones.</p></item>
<item><p>Manually included Era's patches since they were not all included in
the previous version.</p></item>
</list></p></sect1>
<sect1><heading>Version 1.7</heading>
<p>Changes by Era Eriksson.
<list>
<item><p>Typo fixes and wording changes</p></item>
</list></p>
<p>Changes by Javier Fernndez-Sanguino Pea.
<list>
<item><p>Minor changes to tags in order to keep on removing the tt tags
and substitute prgn/package tags for them.</p></item>
</list></p></sect1>
<sect1><heading>Version 1.6</heading>
<p>Changes by Javier Fernndez-Sanguino Pea.
<list>
<item><p>Added pointer to document as published in the DDP (should
supersede the original in the near future)</p></item>
<item><p>Started a mini-FAQ
(should be expanded) with some questions recovered from my mailbox.</p></item>
<item><p>Added general information to consider while securing.</p></item>
<item><p>Added a paragraph regarding local (incoming) mail delivery.</p></item>
<item><p>Added some pointers to more information.</p></item>
<item><p>Added information regarding the printing service.</p></item>
<item><p>Added a security hardening checklist.</p></item>
<item><p>Reorganized NIS and RPC information.</p></item>
<item><p>Added some notes taken while reading this document on my new
Visor :)</p></item>
<item><p>Fixed some badly formatted lines.</p></item>
<item><p>Fixed some typos.</p></item>
<item><p>Added a Genius/Paranoia idea contributed by Gaby
Schilders.</p></item>
</list></p></sect1>
<sect1><heading>Version 1.5</heading>
<p>Changes by Josip Rodin and Javier Fernndez-Sanguino Pea.
<list>
<item><p>Added paragraphs related to BIND and some FIXMEs. <!-- Removed
this because I found no evidence for it in the diffs. // era Rewrote
style in order to make it more formal. --></p></item>
</list></p></sect1>
<sect1><heading>Version 1.4</heading>
<p>
<list>
<item><p>Small setuid check paragraph</p></item> <item><p>Various minor cleanups</p></item>
<item><p>Found out how to use <tt>sgml2txt -f</tt> for the txt
version</p></item>
</list></p></sect1>
<sect1><heading>Version 1.3</heading>
<p>
<list>
<item><p>Added a security update after installation paragraph</p></item>
<item><p>Added a proftpd paragraph</p></item>
<item><p>This time really wrote something about XDM, sorry for last time</p></item>
</list></p></sect1>
<sect1><heading>Version 1.2</heading>
<p>
<list>
<item><p>Lots of grammar corrections by James Treacy, new XDM
paragraph</p></item>
</list></p></sect1>
<sect1><heading>Version 1.1</heading>
<p>
<list>
<item><p>Typo fixes, miscellaneous additions</p></item>
</list></p></sect1>
<sect1><heading>Version 1.0</heading>
<p>
<list>
<item><p>Initial release</p></item>
</list></p></sect1></sect>
<sect><heading>Crediti e ringraziamenti!</heading>
<p>
<list>
<item><p>Alexander Reelsen ha scritto il documento originale.</p></item>
<item>
<p>Javier Fernndez-Sanguino ha aggiunto maggiori informazioni
al documento originale.</p></item>
<item>
<p>Robert van der Meulen ha fornito i paragrafi su quota e molte
altre ottime idee.</p></item>
<item>
<p>Ethan Benson ha corretto il paragrafo su PAM ed ha avuto alcune
buone idee.</p></item>
<item>
<p>Dariusz Puchalak ha contribuito con informazioni in diversi
capitoli.</p></item>
<item>
<p>Gaby Schilders ha contribuito con una simpatica idea su
Genius/Paranoia.</p></item>
<item>
<p>Era Eriksson ha raffinato il linguaggio in un gran numero di
sezioni ed ha contribuito all'appendice checklist.</p></item>
<item>
<p>Philipe Gaspar ha scritto le informazioni su LKM.</p></item>
<item>
<p>Yotam Rubin ha contribuito correggendo molti errori di
battitura e anche fornendo le informazioni riguardanti le
versioni di bind e le password md5.</p></item>
<item>
<p>Tutte le persone che hanno fornito suggerimenti per
miglioramenti che (alla fine) sono state incluse qui
(vedete in <ref id="changelog">).</p></item>
<item>
<p>(Alexander) Tutte le persone che mi hanno incoraggiato a
scrivere questo HOWTO (che successivamente si trasformato in
un manuale).</p></item>
<item><p>L'intero progetto Debian.</p></item>
</list></p></sect></chapt>
|