Page 303 - DCAP403_Operating System
P. 303

Operating System




                    Notes                              Figure 13.16: Forwarding Information Database

                                      fib_zones
                                                                                     fib_node
                                                                                     fib_next
                                                                                     fib_dst
                                                                                                    fib_info
                                                                                     fib_use
                                                      fib_zone                       fib_info      fib_next
                                                                                     fib_metric    fib_prev
                                                      fz_next
                                                                                     fib_los       fib_gateway
                                                      fz_hash_table
                                                                                                   fib_dev
                                                      fz_list
                                                                                                   fib_befent
                                                      fz_nent
                                                                                                   fib_window
                                                      fz_logmask
                                                                                                   fib_flage
                                                      fz_mask
                                                                                                   fib_roto
                                                                                                   fib_itll
                                                                                     fib_node
                                                                                     fib_next
                                                                                     fib_dst
                                                                                                    fib_info
                                                                                     fib_use
                                                                                     fib_info      fib_next
                                                                                     fib_mmetric   fib_prev
                                                                                     fib_los       fib_gateway
                                                                                                   fib_dev
                                                                                                   fib_befent
                                                                                                   fib_window
                                                                                                   fib_flage
                                                                                                   fib_roto
                                                                                                   fib_itll
                                   Several routes may exist to the same IP subnet and these routes can go through one of several
                                   gateways. The IP routing layer does not allow more than one route to a subnet using the same
                                   gateway. In other words, if there are several routes to a subnet, then each route is guaranteed
                                   to use a different gateway. Associated with each route is its metric. This is a measure of how
                                   advantageous this route is. A route’s metric is, essentially, the number of IP subnets that it must
                                   hop across before it reaches the destination subnet. The higher the metric, the worse the route.
                                   13.10 Security


                                   Linux, like any computer system, has a set of security issues that need to be considered.
                                   Regardless of what mechanisms are in place, the basic concepts are the same. In fact, the security
                                   of a computer system is very much like the security of a house, just as running a computer system
                                   is like running a household.
                                   A knowledgeable user with root access to another Linux system can gain access to yours if
                                   they have physical access. Even without access to another system, if that user has access to
                                   the installation fl oppies, they can get into your system. Once in, it doesn’t matter what kind of
                                   security is has been configured on the hard disk since the only security the system knows is what

                                   it has been told by the fl oppy.
                                   Regardless of what security issue you are talking about, any breach in security can be prevented
                                   by not allowing access to the system. Now, this can be taken to extremes by not letting anyone to
                                   have access. However, by limiting access to the system to only authorized users, you substantially
                                   lower the risk of breaches in security. Keep in mind that there is no such thing as a secure system.
                                   This is especially important when you consider that the most serious threat comes from people
                                   who already have an account on that system.
                                   Access control has been a part of Linux for a long time. It is a fundamental aspect of any
                                   multi-user system. The most basic form of access control is in the form of user accounts. The only
                                   way you should be able to gain access to a Linux system is through an account. Users usually
                                   gain access to the system when they have an account set up for them. Each user is assigned an




          296                              LOVELY PROFESSIONAL UNIVERSITY
   298   299   300   301   302   303   304   305   306   307   308