summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorHolger Dengler <dengler@linutronix.de>2018-01-15 16:35:01 +0100
committerJohn Ogness <john.ogness@linutronix.de>2018-01-15 16:53:17 +0100
commit4666d19e5b7efa763c25e54c3a90d9ef38f9b234 (patch)
treeaec1f5859ac14c8182cf5e84864c0eac84476acc
parent4d5f8223acb7ab90af7fc4b8aa1c391838c1af21 (diff)
security: change code fontsize to scriptsize
Fontsize "scriptsize" is a good alternative between default fontsize and "tiny". Signed-off-by: Holger Dengler <dengler@linutronix.de>
-rw-r--r--security/advanced/frm_exploit_mitigation.tex8
-rw-r--r--security/advanced/frm_process_thread.tex10
-rw-r--r--security/basics/pres_password_en.tex6
-rw-r--r--security/firewall/pres_iptables.tex52
-rw-r--r--security/firewall_ex/pres_ex_firewall.tex48
5 files changed, 70 insertions, 54 deletions
diff --git a/security/advanced/frm_exploit_mitigation.tex b/security/advanced/frm_exploit_mitigation.tex
index 559b60e..09a3744 100644
--- a/security/advanced/frm_exploit_mitigation.tex
+++ b/security/advanced/frm_exploit_mitigation.tex
@@ -27,7 +27,7 @@
\begin{frame}[fragile]
\frametitle{Stack: Code Example I}
\begin{beamerboxesrounded}[shadow=true]{Bad copy to stack local buffer}
-\begin{tiny}
+\begin{scriptsize}
\begin{verbatim}
#include <string.h>
@@ -40,7 +40,7 @@ int main (int argc, char **argv) {
foo(argv[1]);
}
\end{verbatim}
-\end{tiny}
+\end{scriptsize}
\end{beamerboxesrounded}
\end{frame}
@@ -48,7 +48,7 @@ int main (int argc, char **argv) {
\begin{frame}[fragile]
\frametitle{Stack: Code Example II}
\begin{beamerboxesrounded}[shadow=true]{Manipulation of return address}
-\begin{tiny}
+\begin{scriptsize}
\begin{verbatim}
#include <stdio.h>
#include <string.h>
@@ -74,7 +74,7 @@ void main(void)
}
\end{verbatim}
-\end{tiny}
+\end{scriptsize}
\end{beamerboxesrounded}
\end{frame}
diff --git a/security/advanced/frm_process_thread.tex b/security/advanced/frm_process_thread.tex
index 1c2123a..67954e0 100644
--- a/security/advanced/frm_process_thread.tex
+++ b/security/advanced/frm_process_thread.tex
@@ -198,30 +198,40 @@ char *envp[] = {
\begin{itemize}
\item Requirements
\begin{itemize}
+ \begin{scriptsize}
\item communicate between Processes (e.g. Child to Parent)
\item private communication channel
+ \end{scriptsize}
\end{itemize}
\item Solution Statement
\begin{enumerate}
+ \begin{scriptsize}
\item open an anonymous pipe
\item duplicate process with fork()
\item Parent and Child choose a communication role
\begin{itemize}
+ \begin{scriptsize}
\item Sender: close the read-FD and send data to write-FD
\item Listener: close the write-FD and listen on read-FD
+ \end{scriptsize}
\end{itemize}
+ \end{scriptsize}
\end{enumerate}
\item Note:
\begin{itemize}
+ \begin{scriptsize}
\item pipe-syscall opens two file-descriptors \\
(one for read from, and one for write to the pipe)
\item after fork-syscall, both processes has access to pipe file-descriptors
\item pipe communication is unidirectional
+ \end{scriptsize}
\end{itemize}
\item Result
\begin{itemize}
+ \begin{scriptsize}
\item private communication between Parent and Child
\item decoupled, buffered communication through pipe
+ \end{scriptsize}
\end{itemize}
\item other IPC mechanisms (e.g. POSIX IPC) are also possible
\end{itemize}
diff --git a/security/basics/pres_password_en.tex b/security/basics/pres_password_en.tex
index a3a7ca9..38529b4 100644
--- a/security/basics/pres_password_en.tex
+++ b/security/basics/pres_password_en.tex
@@ -84,6 +84,7 @@
\begin{columns}[onlytextwidth]
\begin{column}[t]{0.5\textwidth}
Password
+ \begin{scriptsize}
\begin{itemize}
\item require minimum length and variance
\item large character namespace
@@ -93,14 +94,18 @@
\item Example: \textbf{meFx\_5}
\item usual consequences:
\begin{itemize}
+ \begin{scriptsize}
\item notes with passwords
\item shared passwords
\item password schemata
+ \end{scriptsize}
\end{itemize}
\end{itemize}
+ \end{scriptsize}
\end{column}
\begin{column}[t]{0.5\textwidth}
Passphrase
+ \begin{scriptsize}
\begin{itemize}
\item often > 10 characters
\item Mixed characters and spaces
@@ -113,6 +118,7 @@
\textbf{Th1s IS\_my\_buildserver!} \\
(length: 23, mixed alpha, space, symbols, non-dictionary)
\end{itemize}
+ \end{scriptsize}
\end{column}
\end{columns}
\end{frame}
diff --git a/security/firewall/pres_iptables.tex b/security/firewall/pres_iptables.tex
index b45eddf..e7fd23d 100644
--- a/security/firewall/pres_iptables.tex
+++ b/security/firewall/pres_iptables.tex
@@ -201,38 +201,38 @@ Note: Use penetration tools \emph{very} carefully!
\begin{frame}[containsverbatim]
\frametitle{iptables: Commands}
\begin{beamerboxesrounded}[shadow=true]{Show all Chains of Table \emph{filter}:}
-\begin{tiny}
+\begin{scriptsize}
\begin{verbatim}
iptables -t filter -L
iptables -L # Table filter is default
\end{verbatim}
-\end{tiny}
+\end{scriptsize}
\end{beamerboxesrounded}
\begin{beamerboxesrounded}[shadow=true]{Flush all Chains:}
-\begin{tiny}
+\begin{scriptsize}
\begin{verbatim}
iptables -F
\end{verbatim}
-\end{tiny}
+\end{scriptsize}
\end{beamerboxesrounded}
\begin{beamerboxesrounded}[shadow=true]{Set default Policies:}
-\begin{tiny}
+\begin{scriptsize}
\begin{verbatim}
iptables -P <CHAIN> <ACTION>
\end{verbatim}
-\end{tiny}
+\end{scriptsize}
\end{beamerboxesrounded}
\begin{beamerboxesrounded}[shadow=true]{User-defined Chains:}
-\begin{tiny}
+\begin{scriptsize}
\begin{verbatim}
iptables -N <CHAIN> # create new chain
iptables -X <CHAIN> # delete chain
iptables -E <old> <new> # rename chain
\end{verbatim}
-\end{tiny}
+\end{scriptsize}
\end{beamerboxesrounded}
\end{frame}
@@ -240,7 +240,7 @@ iptables -E <old> <new> # rename chain
\begin{frame}[containsverbatim]
\frametitle{iptables: Commands}
\begin{beamerboxesrounded}[shadow=true]{Rules:}
-\begin{tiny}
+\begin{scriptsize}
\begin{verbatim}
iptables -A <CHAIN> <rule-spec> # append rule to chain
iptables -C <CHAIN> <rule-spec> # find matching rule in chain
@@ -250,7 +250,7 @@ iptables -I <CHAIN> <rule-num> <rule-spec> # insert rule in chain as rule-num
iptables -R <CHAIN> <rule-num> <rule-spec> # replace rule in chain
iptables -F <CHAIN> # flush all rules in chain
\end{verbatim}
-\end{tiny}
+\end{scriptsize}
\end{beamerboxesrounded}
\end{frame}
@@ -258,25 +258,25 @@ iptables -F <CHAIN> # flush all rules in chain
\begin{frame}[containsverbatim]
\frametitle{iptables: Commands}
\begin{beamerboxesrounded}[shadow=true]{Rule specifications:}
-\begin{tiny}
+\begin{scriptsize}
\begin{verbatim}
--source <addr>/<mask> # match source IP/IP-range
--sport <port> # match source port
--destination <addr>/<mask> # match destination IP/IP-range
--dport <port> # match destination port
\end{verbatim}
-\end{tiny}
+\end{scriptsize}
\end{beamerboxesrounded}
\begin{beamerboxesrounded}[shadow=true]{Match extensions:}
-\begin{tiny}
+\begin{scriptsize}
\begin{verbatim}
--modprobe <module> # load target or match extension module
--m connstate --ctstate <state> # extension connstate, match state
--m icmp --icmp-type <type> # extension icmp-type, match packet type
--m limit --limit <rate>/<ival> # extension limit, limit to rate per interval
\end{verbatim}
-\end{tiny}
+\end{scriptsize}
\end{beamerboxesrounded}
\end{frame}
@@ -298,7 +298,7 @@ iptables -F <CHAIN> # flush all rules in chain
\begin{frame}[containsverbatim]
\frametitle{Example}
\begin{beamerboxesrounded}[shadow=true]{Preparation}
-\begin{tiny}
+\begin{scriptsize}
\begin{verbatim}
# set default policy
iptables -P INPUT DROP # opt: REJECT, ACCEPT
@@ -308,7 +308,7 @@ iptables -P OUTPUT DROP # opt: REJECT, ACCEPT
iptables -F
...
\end{verbatim}
-\end{tiny}
+\end{scriptsize}
\end{beamerboxesrounded}
\end{frame}
@@ -316,7 +316,7 @@ iptables -F
\begin{frame}[containsverbatim]
\frametitle{Example}
\begin{beamerboxesrounded}[shadow=true]{SSH-Client}
-\begin{tiny}
+\begin{scriptsize}
\begin{verbatim}
#
# Allow incoming traffic only
@@ -325,7 +325,7 @@ iptables -F
iptables -A OUTPUT -o eth0 -p tcp --dport 22 -m state --state NEW,ESTABLISHED -j ACCEPT
iptables -A INPUT -i eth0 -p tcp --sport 22 -m state --state ESTABLISHED -j ACCEPT
\end{verbatim}
-\end{tiny}
+\end{scriptsize}
\end{beamerboxesrounded}
\end{frame}
@@ -333,7 +333,7 @@ iptables -A INPUT -i eth0 -p tcp --sport 22 -m state --state ESTABLISHED -j
\begin{frame}[containsverbatim]
\frametitle{Example}
\begin{beamerboxesrounded}[shadow=true]{Web-Server}
-\begin{tiny}
+\begin{scriptsize}
\begin{verbatim}
#
# Allow outgoing traffic only
@@ -344,7 +344,7 @@ iptables -A OUTPUT -o eth0 -p tcp --sport 80 -m state --state ESTABLISHED -
iptables -A INPUT -i eth0 -p tcp --dport 443 -m state --state NEW,ESTABLISHED -j ACCEPT
iptables -A OUTPUT -o eth0 -p tcp --sport 443 -m state --state ESTABLISHED -j ACCEPT
\end{verbatim}
-\end{tiny}
+\end{scriptsize}
\end{beamerboxesrounded}
\end{frame}
@@ -352,7 +352,7 @@ iptables -A OUTPUT -o eth0 -p tcp --sport 443 -m state --state ESTABLISHED -
\begin{frame}[containsverbatim]
\frametitle{Example}
\begin{beamerboxesrounded}[shadow=true]{FTP-Server (iptables-persistent script)}
-\begin{tiny}
+\begin{scriptsize}
\begin{verbatim}
*filter
:INPUT DROP [0:0]
@@ -367,7 +367,7 @@ iptables -A OUTPUT -o eth0 -p tcp --sport 443 -m state --state ESTABLISHED -
# Important: always necessary for iptables-restore
COMMIT
\end{verbatim}
-\end{tiny}
+\end{scriptsize}
\end{beamerboxesrounded}
\end{frame}
@@ -375,7 +375,7 @@ COMMIT
\begin{frame}[containsverbatim]
\frametitle{Example}
\begin{beamerboxesrounded}[shadow=true]{User-defined LOGDROP chain}
-\begin{tiny}
+\begin{scriptsize}
\begin{verbatim}
# create new chain
iptables -X LOGDROP
@@ -383,7 +383,7 @@ iptables -N LOGDROP
iptables -A LOGDROP -m limit --limit 2/min -j LOG --log-prefix "LOGDROP: " --log-level 7
iptables -A LOGDROP -j DROP
\end{verbatim}
-\end{tiny}
+\end{scriptsize}
\end{beamerboxesrounded}
\end{frame}
@@ -391,7 +391,7 @@ iptables -A LOGDROP -j DROP
\begin{frame}[containsverbatim]
\frametitle{Example}
\begin{beamerboxesrounded}[shadow=true]{Trace all outgoing traffic}
-\begin{tiny}
+\begin{scriptsize}
\begin{verbatim}
*filter
@@ -407,7 +407,7 @@ iptables -A LOGDROP -j DROP
# Important: always necessary for iptables-restore
COMMIT
\end{verbatim}
-\end{tiny}
+\end{scriptsize}
\end{beamerboxesrounded}
\end{frame}
diff --git a/security/firewall_ex/pres_ex_firewall.tex b/security/firewall_ex/pres_ex_firewall.tex
index e6bc755..7e8a444 100644
--- a/security/firewall_ex/pres_ex_firewall.tex
+++ b/security/firewall_ex/pres_ex_firewall.tex
@@ -25,7 +25,7 @@
\pause
\begin{beamerboxesrounded}[shadow=true]{Solution:}
-\begin{tiny}
+\begin{scriptsize}
\begin{verbatim}
mkdir ex_ipt
cd ex_ipt
@@ -36,7 +36,7 @@ iptables -X
iptables -F
iptables -Z
\end{verbatim}
-\end{tiny}
+\end{scriptsize}
\end{beamerboxesrounded}
\end{frame}
@@ -54,7 +54,7 @@ iptables -Z
\pause
\begin{beamerboxesrounded}[shadow=true]{Solution:}
-\begin{tiny}
+\begin{scriptsize}
\begin{verbatim}
iptables -P INPUT DROP
iptables -P OUTPUT DROP
@@ -63,7 +63,7 @@ iptables-save > step1
iptables -F
iptables-restore < step1
\end{verbatim}
-\end{tiny}
+\end{scriptsize}
\end{beamerboxesrounded}
\end{frame}
@@ -82,7 +82,7 @@ iptables-restore < step1
\pause
\begin{beamerboxesrounded}[shadow=true]{Solution:}
-\begin{tiny}
+\begin{scriptsize}
\begin{verbatim}
# New chain
:LOGDROP - [0:0]
@@ -93,7 +93,7 @@ iptables-restore < step1
-A INPUT -i eth0 -j LOGDROP
-A OUTPUT -o eth0 -j LOGDROP
\end{verbatim}
-\end{tiny}
+\end{scriptsize}
\end{beamerboxesrounded}
\end{frame}
@@ -109,13 +109,13 @@ iptables-restore < step1
\pause
\begin{beamerboxesrounded}[shadow=true]{Solution:}
-\begin{tiny}
+\begin{scriptsize}
\begin{verbatim}
# loopback
-A INPUT -i lo -j ACCEPT
-A OUTPUT -o lo -j ACCEPT
\end{verbatim}
-\end{tiny}
+\end{scriptsize}
\end{beamerboxesrounded}
\end{frame}
@@ -130,13 +130,13 @@ iptables-restore < step1
\pause
\begin{beamerboxesrounded}[shadow=true]{Solution:}
-\begin{tiny}
+\begin{scriptsize}
\begin{verbatim}
# DNS
-A OUTPUT -p udp --dport 53 -m state --state NEW,ESTABLISHED -j ACCEPT
-A INPUT -p udp -m state --state ESTABLISHED -j ACCEPT
\end{verbatim}
-\end{tiny}
+\end{scriptsize}
\end{beamerboxesrounded}
\end{frame}
@@ -151,7 +151,7 @@ iptables-restore < step1
\pause
\begin{beamerboxesrounded}[shadow=true]{Solution:}
-\begin{tiny}
+\begin{scriptsize}
\begin{verbatim}
# PING limited accept
-A INPUT -p icmp --icmp-type 0 -m limit --limit 2/s -j ACCEPT
@@ -162,7 +162,7 @@ iptables-restore < step1
-A OUTPUT -p icmp --icmp-type 8 -m limit --limit 2/s -j ACCEPT
-A OUTPUT -p icmp -j DROP
\end{verbatim}
-\end{tiny}
+\end{scriptsize}
\end{beamerboxesrounded}
\end{frame}
@@ -177,7 +177,7 @@ iptables-restore < step1
\pause
\begin{beamerboxesrounded}[shadow=true]{Solution:}
-\begin{tiny}
+\begin{scriptsize}
\begin{verbatim}
# Allow established connections in and out
-A INPUT -m state --state ESTABLISHED -j ACCEPT
@@ -187,7 +187,7 @@ iptables-restore < step1
-A OUTPUT -p udp --dport 53 -m state --state NEW,ESTABLISHED -j ACCEPT
# -A INPUT -p udp -m state --state ESTABLISHED -j ACCEPT
\end{verbatim}
-\end{tiny}
+\end{scriptsize}
\end{beamerboxesrounded}
\end{frame}
@@ -203,14 +203,14 @@ iptables-restore < step1
\pause
\begin{beamerboxesrounded}[shadow=true]{Solution:}
-\begin{tiny}
+\begin{scriptsize}
\begin{verbatim}
# LOGNEW_ACCEPT Chain
:LOGNEW_ACCEPT - [0:0]
-A LOGNEW_ACCEPT -m state --state NEW -j LOG --log-prefix "New: "
-A LOGNEW_ACCEPT -j ACCEPT
\end{verbatim}
-\end{tiny}
+\end{scriptsize}
\end{beamerboxesrounded}
\end{frame}
@@ -224,13 +224,13 @@ iptables-restore < step1
\pause
\begin{beamerboxesrounded}[shadow=true]{Solution:}
-\begin{tiny}
+\begin{scriptsize}
\begin{verbatim}
# DNS
-A OUTPUT -p udp --dport 53 --sport 1024:65535 -m state --state NEW,ESTABLISHED \
-j LOGNEW_ACCEPT
\end{verbatim}
-\end{tiny}
+\end{scriptsize}
\end{beamerboxesrounded}
\end{frame}
@@ -239,7 +239,7 @@ iptables-restore < step1
\begin{frame}[fragile]
\frametitle{Full example with Ping, DNS, and SSH}
-\begin{tiny}
+\begin{scriptsize}
\begin{verbatim}
# Generated by iptables-save v1.4.14 on Sat Apr 6 19:47:41 2013
*filter
@@ -257,13 +257,13 @@ iptables-restore < step1
-A LOGNEW_ACCEPT -m state --state NEW -j LOG --log-prefix "New: "
-A LOGNEW_ACCEPT -j ACCEPT
\end{verbatim}
-\end{tiny}
+\end{scriptsize}
\end{frame}
% ----------------------------
\begin{frame}[fragile]
\frametitle{Full example with Ping, DNS, and SSH}
-\begin{tiny}
+\begin{scriptsize}
\begin{verbatim}
# loopback
-A INPUT -i lo -j ACCEPT
@@ -281,13 +281,13 @@ iptables-restore < step1
-A INPUT -m state --state ESTABLISHED -j ACCEPT
-A OUTPUT -m state --state ESTABLISHED -j ACCEPT
\end{verbatim}
-\end{tiny}
+\end{scriptsize}
\end{frame}
% ----------------------------
\begin{frame}[fragile]
\frametitle{Full example with Ping, DNS, and SSH}
-\begin{tiny}
+\begin{scriptsize}
\begin{verbatim}
# DNS
-A OUTPUT -p udp --dport 53 --sport 1024:65535 -m state --state NEW,ESTABLISHED \
@@ -307,7 +307,7 @@ iptables-restore < step1
COMMIT
# Completed on Sat Apr 6 19:47:41 2013
\end{verbatim}
-\end{tiny}
+\end{scriptsize}
\end{frame}
% ----------------------------