Next Previous Contents

16. 安全

16.1 Access limitations

有许多服务使用 tcp_wrapper library 控制访问.Below is described the use of tcp_wrapper

内容有待增加...

16.2 IPv6安全审核

目前没有什么较好的商业工具来进行

Legal issues

警告:您只能扫瞄自己的系统,不然,可能会触及法律.开始之前,请检察您要扫瞄的IPv6目标地址两次!.

16.3 Security auditing using IPv6-enabled netcat(使用适应IPv6的netcat)

关于IPv6-enabled netcat的详细信息请参照: IPv6?status-apps/security-auditing

例子:


         # nc6 ::1 daytime
         13 JUL 2002 11:22:22 CEST
        

16.4 Security auditing using IPv6-enabled nmap

全世界最为优秀的扫瞄程序之一.它的首页: http://www.insecure.org/nmap/ 从 3.10ALPHA1 的版本开始支持IPv6. 例子:


         # nmap -6 -sT ::1
         Starting nmap V. 3.10ALPHA3 ( www.insecure.org/nmap/ ) 
         Interesting ports on localhost6 (::1): 
         (The 1600 ports scanned but not shown below are in state: closed) 
         Port       State       Service 
         22/tcp     open        ssh 
         53/tcp     open        domain 
         515/tcp    open        printer 
         2401/tcp   open        cvspserver
         Nmap run completed -- 1 IP address (1 host up) scanned in 0.525 seconds
        

16.5 Security auditing using IPv6-enabled strobe

Strobe 同 NMap相比更不具灵活性,但已经有 IPv6-enabling patch (see IPv6?status-apps/security-auditing for more). Usage example:


         # ./strobe ::1 strobe 1.05 (c) 1995-1999 Julian Assange <proff@iq.org>.
         ::1 2401 unassigned unknown
         ::1 22 ssh Secure Shell - RSA encrypted rsh 
         ::1 515 printer spooler (lpd)
         ::1 6010 unassigned unknown 
         ::1 53 domain Domain Name Server
        

16.6 审核结果

如果审核结果同您的IPv6安全策略有出入, 请堵上检测出的漏洞.


Next Previous Contents