20.19. Exercises

E20.1

Discuss the strength of SSH authentication with Linux passwords vs. SSH authentication with a passphrase and key pair. If one is clearly more secure than the other, should you automatically require the more secure authentication method?

E20.2

Samhain identifies files that have changed.

a. What is required to set up and use samhain on your machine?

b. What recent Internet diseases would samhain be effective against?

c. What recent Internet diseases would samhain be helpless against?

d. Given physical access to a system, how could samhain be circumvented?

e. What can you conclude if samhain says that /bin/login has changed, but it seems to have the same size and modification date as before? What if the ...

Get Linux Administration Handbook, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.