This document describes security in the Debian project. Starting with the process of securing and hardening the default Debian GNU/Linux distribution installation. It also covers some of the common tasks to set up a secure network environment using Debian GNU/Linux, gives additional information on the security tools available and talks about how security is enforced in Debian by the security team.
Copyright © 2002, 2003 Javier Fernández-Sanguino Peña
Copyright © 2001 Alexander Reelsen, Javier Fernández-Sanguino Peña
Copyright © 2000 Alexander Reelsen
Permission is granted to copy, distribute and/or modify this document under the
terms of the GNU Public
License, Version 2
or any later version published by the Free
Software Foundation. It is distributed in the hope that it will be useful, but
WITHOUT ANY WARRANTY.
Chroot
environment for SSH
SSH
to enable chroot
functionalityChroot
environment for Apache
Securing Debian Manual
2.99 18 April 2004Wed, 3 Mar 2004 09:18:54 +0100jfs@computer.org