[Sussex] [fwd] [REVIEW] Building Secure Servers with Linux

Natalie S. Ford natalie at ourshack.com
Thu Jan 23 18:51:01 UTC 2003


Spotted on the london.pm mailing list.  I thought you guys might find it
interesting/useful and checked with Roger before I cross-posted it...

----- Forwarded message from Roger Burton West <roger at firedrake.org> -----

> Date: Thu, 23 Jan 2003 18:10:40 +0000
> From: Roger Burton West <roger at firedrake.org>
> To: london.pm at london.pm.org
> Subject: [REVIEW] Building Secure Servers with Linux
> 
> An excellent resource for the Linux administrator concerned with
> security.
> 
> Michael D. Bauer; Building Secure Servers with Linux; O'Reilly
> 0-596-00217-3, 432pp (softcover)
> 
> Review by Roger Burton West
> 
> This book is a comprehensive guide to Linux security. While many books
> deal with installation and setup of a basic server system, they tend to
> be lacking in any security consideration, preferring to emphasise ease
> of use; this is the requisite companion volume to those, assuming a
> basic competence in Linux use and concentrating on security concerns.
> 
> Throughout the book, the author emphasises that systems fail: the
> existence of a firewall doesn't entirely prevent attacks on systems
> within it, proxies can be subverted, and so on. This leads him to a
> preferred position of robust defence in depth.
> 
> Although the book is copyrighted 2003, its history is in a series of
> columns written by the author for _Linux Journal_; in places it is
> significantly outdated, for example considering Debian release 2.2 as
> the most recent version even though 3.0 was released in July 2002.
> 
> The book opens with a consideration of risk. Since there is no such
> thing as a perfectly secure system, against whom should one attempt to
> protect it, and with what level of resource will it be attacked?
> Obviously there are no quick answers, but the author provides a set of
> tools with which reasonable estimates can be made.
> 
> The next chapter deals with perimeter networks: how to position
> firewalls and routers to reach a useful compromise between accessibility
> and security. Various types of firewall are considered, including
> commercial hardware-based products; this book is a rare example of work
> by an author whose expertise is primarily in open-source systems but who
> is also familiar with current commercial software.
> 
> The book now starts to go into rather more detail, as it describes the
> process of hardening a Linux server; the basics of this are as they have
> been described for a long time (run only necessary software, keep up to
> date, read the security mailing list for your chosen distribution), but
> the author expands usefully on all these concepts. This is one of the
> more basic chapters, but even the experienced administrator can usefully
> refresh and expand his knowledge. This chapter also covers security
> scanning with nmap and Nessus, as well as the Bastille Linux automated
> hardening system.
> 
> Remote administration tools are the concern of the next chapter,
> starting with ssh (the author rightly deprecates telnet and related
> clear-text administration tools) in some details, then briefly coverying
> sudo. Next is SSL tunnelling with stunnel, probably the most convenient
> of the programs available, including its client-certificate
> authentication mode (probably the trickiest part of stunnel to set up).
> 
> The next four chapters deal with the security of specific applications,
> starting with DNS. Remarkably, the author is prepared to mention the
> existence of djbdns as well as bind, and gives it a substantial amount
> of space; this is one of very few descriptions of djbdns in print, and
> would deserve attention for that even if it were not rather more clearly
> written than the official documentation. Next comes email, with a long
> general section (mostly considering unauthorised relaying) and detail on
> two specific mail transport agents, sendmail (because of its popularity)
> and postfix (because of the author's admitted bias in its favour). It is
> unfortunate that no room could be found for exim or qmail as well, as
> this would have provided coverage of the vast majority of SMTP servers
> deployed on Linux platforms.
> 
> The web services chapter only covers Apache, which is perhaps a
> pardonable failing given its preponderance on Internet-connected hosts,
> though some coverage of the many lighter-weight servers would have been
> welcome; it also covers CGI script and authentication security, though
> not in any great depth (these are more properly the province of the
> developer than of the system administrator in any case). The final
> application chapter, on file services, describes ProFTPD in some detail
> with some limited consideration of sftp and rsync.
> 
> The book's final section returns to the business of system, rather than
> application, administration, with consideration of intrusion detection.
> One chapter covers inbuilt systems for this (syslog and its
> ramifications including remote loggin, syslog-ng, and the automated
> log-watcher swatch); the other deals with external monitoring packages
> such as tripwire (and some of its kin) and snort. An appendix gives
> pre-built iptables firewall scripts.
> 
> The book is rather shorter than some other security handbooks on the
> market, and more space could perhaps have been given to alternative
> application software, particuarly for email and web services (and client
> mail protocols such as POP3 and IMAP are not even considered). Moreover,
> a slightly expanded treatment of networking - covering security under
> N:N masquerading  rather than the simple N:1 described here and in a
> hundred existing articles - would have added significantly to the value
> of the book.
> 
> The quality of the prose is good and clear throughout, and examples are
> generous though not excessive. In summary, this is a book that I should
> recommend to anyone running a Linux server in an environment where not
> all potential users are fully trusted.
> 

----- End forwarded message -----

-- 
Natalie S. Ford   .................................   natalie at ourshack.com
.........................................  http://www.natalie.ourshack.org




More information about the Sussex mailing list