|Securing and Optimizing Linux: RedHat Edition -A Hands on Guide|
|Prev||Chapter 16. Software -Securties(commercial)||Next|
: All the configuration files required for each software described in this book has been provided by us as a gzipped file, floppy.tgz for your convenience. This can be downloaded from this web address: http://www.openna.com/books/floppy.tgz You can unpack this to any location on your local machine, say for example /tmp, assuming you have done this your directory structure will be /tmp/floppy. Within this floppy directory each configuration file has its own directory for respective software. For example SSH2 configuration file are organised like this:
You can either cut and paste this directly if you are faithfully following our instructions from the begining or manually edit these to modify to your needs. This facility is there though as a convenience but please don't forget ultimately it will be your responsibility to check, verify, etc. before you use them whether modified or as it is.
total 16 -rw-r--r-- 1 harrypotter harrypotter 326 Jun 8 13:00 Compile-SSH2 drwxr-xr-x 2 harrypotter harrypotter 4096 Jun 8 13:00 pam.d/ -rw-r--r-- 1 harrypotter harrypotter 462 Jun 8 13:00 ssh2_config -rw-r--r-- 1 harrypotter harrypotter 799 Jun 8 13:00 sshd2_config
To run the SSH2 Client/Server, the following files are required, and must be created or copied to the appropriate directories on your server.
Copy the sshd2_config file to the /etc/ssh2/ directory.
Copy the ssh2_config file to the /etc/ssh2/ directory.
Copy the ssh file to the /etc/pam.d/ directory.
: You can obtain the configuration files listed in the following section on our floppy.tgz archive. Copy the following files from the decompressed floppy.tgz archive to the appropriate places, or copy them directly from this book to the concerned file.