ubuntu server guide
Replication 3 service-ldap-usage Simple LDAP user and group management 3 service-ldap-with-tls SSL/TLS 3 service-ldap-backup-restore Backup and restore 2 Kerberos 3 kerberos-introduction Introduction openssh-crypto-configuration OpenSSH crypto configuration 3 Level Path Navlink 3 troubleshooting-tls-ssl Troubleshooting TLS/SSL 2 Virtualisation and containers 3 Virtual machines 4 vm-tools-in-the-ubuntu-space VM OpenLDAP Introduction Installation Access control Replication Simple LDAP user and group management SSL/TLS Backup and restore Kerberos Introduction Kerberos server Service principals Kerberos encryption0 码力 | 486 页 | 3.33 MB | 1 年前3Ubuntu Server Guide 18.04
https://localhost/ or to the IP address of your remote server. As Zentyal creates its own self-signed SSL certificate, you will have to accept a security exception on your browser. Log in with the same username for slapd.access4. 1.8. TLS When authenticating to an OpenLDAP server it is best to do so using an encrypted session. This can be accomplished using Transport Layer Security (TLS). Here, we will be our the gnutls-bin and ssl-cert packages: sudo apt install gnutls-bin ssl-cert 2. Create a private key for the Certificate Authority: sudo sh -c "certtool --generate-privkey > /etc/ssl/private/cakey.pem"0 码力 | 413 页 | 1.40 MB | 1 年前3This Debian Reference (version 2.109)
crypt(3) library openssl V:838, I:995 2294 openssl passwd compute password hashes (OpenSSL). passwd(1ssl) Table 4.4: List of tools to generate password 4.4 Creating encrypted password There are independent for libnss-ldap. • You must make libpam-ldap to use SSL (or TLS) connection for the security of password. • You may make libnss-ldap to use SSL (or TLS) connection to ensure integrity of data at the cost be intercepted. You can run these services over ”Transport Layer Security” (TLS) or its predecessor, ”Secure Sockets Layer” (SSL) to secure entire communication including password by the encryption. insecure0 码力 | 266 页 | 1.25 MB | 1 年前3Cilium v1.9 Documentation
and HTTP-Aware Policy Enforcement Locking down external access with DNS-based policies Inspecting TLS Encrypted Connections with Cilium Securing a Kafka cluster How to secure gRPC Getting Started Securing cilium cilium/cilium --version $CILIUM_VERSION \\ --namespace $CILIUM_NAMESPACE \\ --set hubble.tls.auto.method="cronJob" \\ --set hubble.listenAddress=":4244" \\ --set hubble.relay.enabled=true cilium cilium/cilium --version $CILIUM_VERSION \\ --namespace $CILIUM_NAMESPACE \\ --set hubble.tls.auto.method="cronJob" \\ --set hubble.listenAddress=":4244" \\ --set hubble.relay.enabled=true0 码力 | 1263 页 | 18.62 MB | 1 年前3Cilium v1.10 Documentation
and HTTP-Aware Policy Enforcement Locking down external access with DNS-based policies Inspecting TLS Encrypted Connections with Cilium Securing a Kafka cluster How to secure gRPC Getting Started Securing consider setting identityAllocationMode: --set identityAllocationMode=kvstore Optional: Configure the SSL certificates Create a Kubernetes secret with the root certificate authority, and client-side key and key=client.key \ --from-file=etcd-client.crt=client.crt Adjust the helm template generation to enable SSL for etcd and use https instead of http for the etcd endpoint URLs: helm install cilium cilium/cilium0 码力 | 1307 页 | 19.26 MB | 1 年前3Moxa Industrial Linux 3.0 (Debian 11) Manual for Arm-based Computers Version 1.0, January 2023
secure NTP, which provides a handshake (TLS) before using a NTP server and authentication of the NTP time synchronization packets using the results of the TLS handshake. The default NTP client in MIL validate data authenticity NTP client (NTS support) TLS/SSL, NTP NTS guarantees data integrity via NTS Authenticator and Encrypted EF NTS provides TLS layer to guarantee authenticity ATTENTION Yes APT client HTTPS Ethernet, cellular, Wi-Fi root/root Yes NTP client (NTS support) TLS/SSL, NTP Ethernet, cellular, Wi-Fi root/root Yes Security Configuration Check The secure models0 码力 | 111 页 | 2.94 MB | 1 年前3Cilium v1.11 Documentation
and HTTP-Aware Policy Enforcement Locking down external access with DNS-based policies Inspecting TLS Encrypted Connections with Cilium Securing a Kafka cluster How to secure gRPC Getting Started Securing consider setting identityAllocationMode: --set identityAllocationMode=kvstore Optional: Configure the SSL certificates Create a Kubernetes secret with the root certificate authority, and client-side key and key=client.key \ --from-file=etcd-client.crt=client.crt Adjust the helm template generation to enable SSL for etcd and use https instead of http for the etcd endpoint URLs: helm install cilium cilium/cilium0 码力 | 1373 页 | 19.37 MB | 1 年前3Referência Debian v2.124
crypt(3) openssl V:841, I:995 2111 openssl passwd computa hashes de palavras-passe (OpenSSL). passwd(1ssl) Tabela 4.4: Lista de ferramentas para gerar palavras-passe 4.5 PAM e NSS Os sistemas modernos tipo-Unix libnss-ldap. • Tem de fazer libpam-ldap para usar a ligação SSL (ou TLS) para a segurança da palavra-passe. • Pode fazer a libnss-ldap usar ligação SSL (ou TLS) para assegurar a integridade dos dados à custa de interceptadas. Pode correr estes serviços sobre ”Transport Layer Security” (TLS) ou o antecessor dele, ”Secure Sockets Layer” (SSL) para assegurar toda a comunicação incluindo a palavra-passe pela encriptação0 码力 | 281 页 | 1.39 MB | 1 年前3Debian Reference v2.124
libreria crypt(3) openssl V:841, I:995 2111 openssl passwd calcola hash di password (OpenSSL). passwd(1ssl) Tabella 4.4: Elenco di strumenti per generare password 4.5 PAM e NSS I moderni sistemi *nix come far sì che libpam-ldap usi una connessione SSL (o TLS). • Per assicurare l’integrità dei dati, si può far sì che libnss-ldap usi una connessione SSL (o TLS) a prezzo di un maggiore carico sulla rete LDAP intercettate. Si possono eseguire questi servizi attraverso ”TLS” (Transport Layer Security, sicurezza del livello di trasporto), o il suo predecessore ”SSL” (Secure Sockets Layer, livello per socket sicuri), per0 码力 | 283 页 | 1.40 MB | 1 年前3Debian 参考手册(版本 2.109)
mkpasswd 具备 crypt(3) 库所有特性的前端 openssl V:838, I:995 2294 openssl passwd 计算密码哈希 (OpenSSL). passwd(1ssl) Table 4.4: 生成密码的工具 4.4 设立加密的密码 下面是一些用于 生成加盐的加密密码 的独立工具。 4.5 PAM 和 NSS 现代的类 Unix 系统(例如 Debian 使用“/etc/libnss-ldap.conf”作为 libnss-ldap 的配置文件。 • 为了密码的安全,你必须让 libpam-ldap 使用 SLL(或 TLS)连接。 • 为了确保 LDAP 网络开销数据的完整性,你必须让 libpam-ldap 使用 SLL(或 TLS)连接。 • 为了减少 LDAP 网络流量,你应该在本地运行 nscd(8) 来缓存任何 LDAP 搜索结果。 参见由 libpam-doc 糕的做法,因为这样传输的密码很容易在网上被他人截获。为了确保整个沟通过程,包括密码信息在内都使用加密传 输来确保安全,您可以在“传输层安全(Transport Layer Security,TLS)”协议或者其前身,“安全套接字层(Secure Sockets Layer,SSL)”协议之上运行这些服务。 不安全的服务名 端口 安全的服务名 端口 www (http) 80 https 443 smtp (邮件) 25 ssmtp0 码力 | 261 页 | 1.39 MB | 1 年前3
共 44 条
- 1
- 2
- 3
- 4
- 5