Book description
Linux consistently appears high up in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services such as DNS and delivering mail. But security is the foremost concern of anyone providing such a service. Any server experiences casual probe attempts dozens of time a day, and serious break-in attempts with some frequency as well. This highly regarded book, originally titled Building Secure Servers with Linux, combines practical advice with a firm knowledge of the technical tools needed to ensure security. The book focuses on the most common use of Linux--as a hub offering services to an organization or the Internet--and shows readers how to harden their hosts against attacks. An all-inclusive resource for Linux users who wish to harden their systems, Linux Server Security covers general security such as intrusion detection and firewalling a hub, as well as key services such as DNS, the Apache Web server, mail, and secure shell. Author Michael D. Bauer, a security consultant, network architect, and lead author of the popular Paranoid Penguin column in the Linux Journal, carefully outlines the security risks, defines precautions that can minimize those risks, and offers recipes for robust security. He is joined on several chapters by administrator and developer Bill Lubanovic. A number of new security topics have been added for this edition, including:
Database security, with a focus on MySQL
Using OpenLDAP for authentication
An introduction to email encryption
The Cyrus IMAP service, a popular mail delivery agent
The vsftpd FTP server
Geared toward Linux users with little security expertise, the author explains security concepts and techniques in clear language, beginning with the fundamentals. Linux Server Security with Linux provides a unique balance of "big picture" principles that transcend specific software packages and version numbers, and very clear procedures on securing some of those software packages on several popular distributions. With this book in hand, you'll have both the expertise and the tools to comprehensively secure your Linux system.
Table of contents
- Table of Contents
- Preface
- Threat Modeling and Risk Management
-
Designing Perimeter Networks
- Some Terminology
- Types of Firewall and DMZ Architectures
- Deciding What Should Reside on the DMZ
- Allocating Resources in the DMZ
-
The Firewall
- Types of Firewall
- Selecting a Firewall
-
General Firewall Configuration Guidelines
- Harden your firewall’s OS
- Configure anti-IP-spoofing rules
- Deny by default
- Strictly limit incoming traffic
- Strictly limit all traffic out of the DMZ
- Don’t give internal systems unrestricted outbound access
- If you have the means, use an application-gateway firewall
- Don’t be complacent about host security
-
Hardening Linux and Using iptables
-
OS Hardening Principles
- Installing/Running Only Necessary Software (1/2)
- Installing/Running Only Necessary Software (2/2)
- Keeping Software Up to Date (1/4)
- Keeping Software Up to Date (2/4)
- Keeping Software Up to Date (3/4)
-
Keeping Software Up to Date (4/4)
- Distribution (global) updates versus per-package updates
- Whither X-based updates?
- How to be notified of and obtain security updates: Red Hat
- RPM updates for the extremely cautious
- Yum: a free alternative to up2date
- How to be notified of and obtain security updates: SUSE
- SUSE’s online-update feature
- How to be notified of and obtain security updates: Debian
- Deleting Unnecessary User Accounts and Restricting Shell Access
- Restricting Access to Known Users
- Running Services in chrooted Filesystems
- Minimizing Use of SUID root
- Using su and sudo
- Configuring, Managing, and Monitoring Logs
- Every System Can Be Its Own Firewall: Using iptables for Local Security
- Checking Your Work with Scanners (1/4)
- Checking Your Work with Scanners (2/4)
- Checking Your Work with Scanners (3/4)
-
Checking Your Work with Scanners (4/4)
- Types of scans and their uses
- Why we (good guys) scan
- nmap, world champion port scanner
- Getting and installing nmap
- Using nmap
- Some simple port scans
- Nessus, a full-featured security scanner
- Security scanners explained
- Nessus’s architecture
- Getting and installing Nessus
- Nessus clients
- Performing security scans with Nessus
- Understanding and Using Available Security Features
- Documenting Bastion Hosts’ Configurations
- Automated Hardening with Bastille Linux
-
OS Hardening Principles
- Secure Remote Administration
- OpenSSL and Stunnel
-
Securing Domain Name Services (DNS)
- DNS Basics
- DNS Security Principles
- Selecting a DNS Software Package
-
Securing BIND
- Making Sense out of BIND Versions
- Obtaining and Installing BIND
- Preparing to Run BIND (or, Furnishing the Cell) (1/2)
- Preparing to Run BIND (or, Furnishing the Cell) (2/2)
- Securing named.conf (1/2)
- Securing named.conf (2/2)
- Zone File Security
- Advanced BIND Security: TSIGS and DNSSEC
- Sources of BIND (and IS Security) Information
- djbdns
- Resources
- Using LDAP for Authentication
- Database Security
-
Securing Internet Email
- Background: MTA and SMTP Security
- Using SMTP Commands to Troubleshoot and Test SMTP Servers
- Securing Your MTA
- Sendmail
- Postfix
- Mail Delivery Agents
- A Brief Introduction to Email Encryption
- Resources
-
Securing Web Servers
- Web Security
- The Web Server
- Web Content
-
Web Applications
- Processing Forms
- Including Files
- Executing Programs
- Uploading Files from Forms
- Accessing Databases
- Authentication
- Access Control and Authorization
- SSL
- Sessions and Cookies
- Site Management: Uploading Files
- XML, Web Services, and REST
- Detecting and Deflecting Attackers
- Caches, Proxies, and Load Balancers
- Layers of Defense
- Resources
-
Securing File Services
- FTP Security
- Other File-Sharing Methods
- Resources
-
System Log Management and Monitoring
- syslog
- Syslog-ng
- Testing System Logging with logger
- Managing System Logfiles with logrotate
- Using Swatch for Automated Log Monitoring
- Some Simple Log-Reporting Tools
- Resources
-
Simple Intrusion Detection Techniques
- Principles of Intrusion Detection Systems
- Using Tripwire
- Other Integrity Checkers
- Snort
- Resources
- Two Complete iptables Startup Scripts (1/3)
- Two Complete iptables Startup Scripts (2/3)
- Two Complete iptables Startup Scripts (3/3)
- Index (1/5)
- Index (2/5)
- Index (3/5)
- Index (4/5)
- Index (5/5)
Product information
- Title: Linux Server Security, Second Edition
- Author(s):
- Release date: January 2005
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9780596006709
You might also like
book
Linux Server Hacks
A competent system administrator knows that a Linux server is a high performance system for routing …
book
Linux Server Hacks, Volume Two
Today's system administrators deal with a vast number of situations, operating systems, software packages, and problems. …
book
Security Strategies in Linux Platforms and Applications, 2nd Edition
The Second Edition of Security Strategies in Linux Platforms and Applications covers every major aspect of …
book
LPI Linux Certification in a Nutshell, 2nd Edition
LPI Linux Certification in a Nutshell,Second Edition is an invaluable resource for determining what you needto …