Book description
Linux consistently turns up high in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services like DNS and routing mail. But security is uppermost on the mind of anyone providing such a service. Any server experiences casual probe attempts dozens of time a day, and serious break-in attempts with some frequency as well. As the cost of broadband and other high-speed Internet connectivity has gone down, and its availability has increased, more Linux users are providing or considering providing Internet services such as HTTP, Anonymous FTP, etc., to the world at large. At the same time, some important, powerful, and popular Open Source tools have emerged and rapidly matured--some of which rival expensive commercial equivalents--making Linux a particularly appropriate platform for providing secure Internet services. Building Secure Servers with Linux will help you master the principles of reliable system and network security by combining practical advice with a firm knowledge of the technical tools needed to ensure security. The book focuses on the most common use of Linux--as a hub offering services to an organization or the larger Internet--and shows readers how to harden their hosts against attacks. Author Mick Bauer, a security consultant, network architect, and lead author of the popular Paranoid Penguin column in Linux Journal, carefully outlines the security risks, defines precautions that can minimize those risks, and offers recipes for robust security. The book does not cover firewalls, but covers the more common situation where an organization protects its hub using other systems as firewalls, often proprietary firewalls. The book includes:
Precise directions for securing common services, including the Web, mail, DNS, and file transfer.
Ancillary tasks, such as hardening Linux, using SSH and certificates for tunneling, and using iptables for firewalling.
Basic installation of intrusion detection tools.
Writing for Linux users with little security expertise, the author explains security concepts and techniques in clear language, beginning with the fundamentals. Building Secure Servers with Linux provides a unique balance of "big picture" principles that transcend specific software packages and version numbers, and very clear procedures on securing some of those software packages. An all-inclusive resource for Linux users who wish to harden their systems, the book covers general security as well as key services such as DNS, the Apache Web server, mail, file transfer, and secure shell. With this book in hand, you'll have everything you need to ensure robust security of your Linux system.
Table of contents
-
Building Secure Servers with Linux
- Preface
- 1. Threat Modeling and Risk Management
-
2. Designing Perimeter Networks
- Some Terminology
- Types of Firewall and DMZ Architectures
- Deciding What Should Reside on the DMZ
- Allocating Resources in the DMZ
-
The Firewall
- Types of Firewall
- Selecting a Firewall
-
General Firewall Configuration Guidelines
- Harden your firewall’s OS
- Configure anti-IP-spoofing rules
- Deny by default
- Strictly limit incoming traffic
- Strictly limit all traffic out of the DMZ
- Don’t give internal systems unrestricted outbound access
- If you have the means, use an application-Gateway firewall
- Don’t be complacent about host security
-
3. Hardening Linux
-
OS Hardening Principles
- Installing/Running Only Necessary Software
-
Keeping Software Up to Date
- Distribution (global) updates versus per-package updates
- Whither X-based updates?
- How to be notified of and obtain security updates: Red Hat
- RPM updates for the extremely cautious
- How to be notified of and obtain security updates: SuSE
- SuSE’s online-update feature
- How to be notified of and obtain security updates: Debian
- Deleting Unnecessary User Accounts and Restricting Shell Access
- Restricting Access to Known Users
- Running Services in chrooted Filesystems
- Minimizing Use of SUID=root
- Configuring, Managing, and Monitoring Logs
- Every System Can Be Its Own Firewall: Using iptables for Local Security
-
Checking Your Work with Scanners
- Types of scans and their uses
- Why we (good guys) scan
- nmap, world champion port scanner
- Getting and installing nmap
- Using nmap
- Some simple port scans
- Nessus, a full-featured security scanner
- Security Scanners Explained
- Nessus’ architecture
- Getting and installing Nessus
- Nessus clients
- Running and maintaining nessusd
- Performing security scans with Nessus
- Understanding and Using Available Security Features
- Documenting Bastion Hosts’ Configurations
- Automated Hardening with Bastille Linux
-
OS Hardening Principles
- 4. Secure Remote Administration
- 5. Tunneling
-
6. Securing Domain Name Services (DNS)
- DNS Basics
- DNS Security Principles
- Selecting a DNS Software Package
- Securing BIND
- djbdns
- Resources
-
7. Securing Internet Email
- Background: MTA and SMTP Security
- Using SMTP Commands to Troubleshoot and Test SMTP Servers
- Securing Your MTA
- Sendmail
- Postfix
- Resources
-
8. Securing Web Services
- Web Server Security
- Build Time: Installing Apache
- Setup Time: Configuring Apache
- Runtime: Securing CGI Scripts
- Special Topics
- Other Servers and Web Security
- 9. Securing File Services
- 10. System Log Management and Monitoring
-
11. Simple Intrusion Detection Techniques
- Principles of Intrusion Detection Systems
- Using Tripwire
- Other Integrity Checkers
- Snort
- Resources
- A. Two Complete Iptables Startup Scripts
- Index
- Colophon
Product information
- Title: Building Secure Servers with Linux
- Author(s):
- Release date: October 2002
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9780596002176
You might also like
video
Learning Linux Security
In this Learning Linux Security training course, expert author Ric Messier will teach you how to …
book
Linux: Powerful Server Administration
Get hands-on recipes to make the most of Ubuntu Server, CentOS 7 Linux Server and RHEL …
book
Linux Security Cookbook
Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good …
video
Linux Security: Red Hat Certificate of Expertise in Server Hardening (EX413) and LPIC-3 303 (Security) Exams
Duration More than 13 hours of video instruction. Overview Learn everything you need to know about …