To access the contents, click the chapter and section titles.
Internet Security Professional Reference
(Imprint: New Riders)
(Publisher: Macmillan Computer Publishing)
Authors: Derek Atkins, Paul Buis, Chris Hare, Robert Kelley, Carey Nachenberg, Anthony B. Nelson, Paul Phillips, Tim Ritchey, Tom Sheldom, Joel Snyder
ISBN: 156205760x
- Introduction
- About the Authors
- PART IManaging Internet Security
- Chapter 1Understanding TCP/IP
- Exploring Addresses, Subnets, and Hostnames
- Address Classes
- Subnets
- Hostnames
- Working with Network Interfaces
- Configuration Using ifconfig
- Reviewing the Network Configuration Files
- The /etc/hosts File
- The /etc/ethers File
- The /etc/networks File
- The /etc/protocols File
- The /etc/services File
- The /etc/inetd.conf File
- Understanding the Network Access Files
- /etc/hosts.equiv File
- The .rhosts File
- User and Host Equivalency
- Examining TCP/IP Daemons
- The slink Daemon
- The ldsocket Daemon
- The cpd Daemon
- The Line Printer Daemon (lpd)
- The SNMP Daemon (snmpd)
- The RARP Daemon (rarpd)
- The BOOTP Daemon (bootpd)
- The ROUTE Daemon (routed)
- The Domain Name Service Daemon (named)
- The System Logger Daemon (syslogd)
- InetdThe Super-Server
- The RWHO Daemon (rwhod)
- Exploring TCP/IP Utilities
- Administration Commands
- User Commands
- Chapter 2Understanding and Creating Daemons
- Examining the System Daemons
- init
- swapper
- update and bdflush
- lpd
- lpsched
- cpd and sco_cpd (SCO)
- cron
- syslog
- sendmail
- getty
- rlogind
- deliver
- inetd
- routed
- nfsd
- mountd
- pcnfsd
- statd, rpc.statd
- lockd, rpc.lockd
- Creating Daemons with the Bourne Shell
- Handling Input and Output
- Handling Messages
- Handling Signals
- The dfmon Program
- Creating Daemons with PERL
- Handling Input and Output
- Handling Signals
- The procmon Program
- Unix Run Levels
- Program Listings
- Listing 2.1The dfmon Program
- Listing 2.2The dfmon Configuration File
- Listing 2.3The procmon Command
- Listing 2.4The procmon.cfg File
- Chapter 3Using UUCP
- The UUCP Network
- How UUCP Works
- Naming Your Host
- The Naming Process
- The System V Basic Networking Utilities UUCP
- UUCP File Layout
- Configuring UUCP
- Testing the Connection
- The Dialers File
- The Systems File
- The UUCP Chat Script
- Testing the ConnectionUsing uucico
- Permissions File
- Allowing Anonymous UUCP Access
- UUCP Log Files
- Maintenance
- Configuring Version 2 UUCP
- What Is Version 2 UUCP?
- File Layout
- Configuring UUCP
- The L-devices File
- Testing the Connection
- The L.sys File
- Testing the Connection with uucico
- Version 2 Permissions
- Log Files
- Maintenance
- Configuring UUCP over TCP/IP
- Code Listings
- Listing 3.1gtimes.c
- Listing 3.2genUSER
- Chapter 4Audit Trails
- Common Unix Logs
- Process Accounting
- Useful Utilities in Auditing
- Other Reporting Tools Available Online
- Audit Trails Under Windows NT
- Using the Event Viewer
- Logging the ftp Server Service
- Logging httpd Transactions
- Logging by Other TCP/IP Applications Under NT
- Audit Trails Under DOS
- PC/DACS
- Watchdog
- LOCK
- Using System Logs to Discover Intruders
- Common Break-In Indications
- Potential Problems
- PART IIGaining Access and Securing the Gateway
- Chapter 5IP Spoofing and Sniffing
- Sniffing
- Sniffing: How It Is Done
- Sniffing: How It Threatens Security
- Protocol Sniffing: A Case Study
- Sniffing: How to Prevent It
- Hardware Barriers
- Avoiding Transmission of Passwords
- Spoofing
- Hardware Address Spoofing
- ARP Spoofing
- Preventing an ARP Spoof
- Sniffing Case Study Revisited
- Detecting an ARP Spoof
- Spoofing the IP Routing System
- ICMP-Based Route Spoofing
- Misdirecting IP Datagrams from Hosts
- Preventing Route Spoofing
- A Case Study Involving External Routing
- Spoofing Domain Name System Names
- Spoofing TCP Connections
- Chapter 6How to Build a Firewall
- The TIS Firewall Toolkit
- Understanding the TIS Firewall Toolkit
- How to Get the TIS Firewall Toolkit
- Compiling Under SunOS 4.1.3 and 4.1.4
- Compiling Under BSDI
- Installing the TIS Firewall Toolkit
- Preparing for Configuration
- Configuring TCP/IP
- IP Forwarding
- The netperm Table
- Configuring netacl
- Connecting with netacl
- Restarting inetd
- Configuring the Telnet Proxy
- Connecting Through the Telnet Proxy
- Host Access Rules
- Verifying the Telnet Proxy
- Configuring the rlogin Gateway
- Connecting Through the rlogin Proxy
- Host Access Rules
- Verifying the rlogin Proxy
- Configuring the FTP Gateway
- Host Access Rules
- Verifying the FTP Proxy
- Connecting Through the FTP Proxy
- Allowing FTP with netacl
- Configuring the Sendmail Proxy: smap and smapd
- Installing the smap Client
- Configuring the smap Client
- Installing the smapd Application
- Configuring the smapd Application
- Configuring DNS for smap
- Configuring the HTTP Proxy
- Non-Proxy-Aware HTTP Clients
- Using a Proxy-Aware HTTP Client
- Host Access Rules
- Configuring the X Windows Proxy
- Understanding the Authentication Server
- The Authentication Database
- Adding Users
- The Authentication Shellauthmgr
- Database Management
- Authentication at Work
- Using plug-gw for Other Services
- Configuring plug-gw
- plug-gw and NNTP
- plug-gw and POP
- The Companion Administrative Tools
- portscan
- netscan
- Reporting Tools
- Where to Go for Help
- Sample netperm-table File
- Manual Reference Pages
- AuthmgrNetwork Authentication Client Program
- authsrvNetwork Authentication Third Party Daemon
- ftp-gwFTP Proxy Server
- http-gwGopher/HTTP Proxy
- login-shAuthenticating Login Shell
- netaclTCP Network Access Control
- plug-gwGeneric TCP Plug-board Proxy
- rlogin-gwrlogin Proxy Server
- smapSendmail Wrapper Client
- smapdSendmail Wrapper Daemon
- tn-gwtelnet Proxy Server
- x-gwX Gateway Service
- Chapter 7How to Buy a Firewall
- Firewall Refresher
- Architectures
- Three Buzzwords to Know
- Choosing a Firewall
- Firewall Architecture
- Router Architectures
- Advanced Firewall Architectures
- Evaluating Firewalls
- Choosing Between Stateful Packet Filter and Transport Firewalls
- Evaluating Paths Through the Firewall
- Evaluating Management Interface and GUI
- Evaluating Flexibility and Features
- Evaluating Reporting and Accounting
- Evaluating Firewall Performance
- Packet Filtering Performance Issues
- Transport Proxies Performance Issues
- Performance Testing Results
- Evaluating the Security of Firewalls
- Assessment Strategies
- Summary
- Chapter 8SATAN and the Internet Inferno
- The Nature of Network Attacks
- Internet Threat Levels (ITL)
- Common Attack Approaches
- An Overview of Holes
- Learning About New Security Holes
- Thinking Like an Intruder
- Gathering Information on Systems
- Know the Code
- Try All Known Problems
- Match Vulnerabilities with Opportunities
- Look for Weak Links
- Summarize the Remote Network Attack
- Automate the Search
- The First Meeting with SATAN
- History
- The Creators
- Comparison to Other Tools
- Vendor Reactions
- Long-Term Impact
- Detecting SATAN
- Courtney
- Gabriel
- TCP Wrappers
- netlog/TAMU
- Argus
- Using Secure Network Programs
- Kerberos
- Secure Shell (ssh)
- SSL
- Firewalls
- Investigating What SATAN Does
- SATANs Information Gathering
- Vulnerabilities that SATAN Investigates
- Other Network Vulnerabilities
- Investigating IP Spoofing
- Examining Structural Internet Problems
- Rendezvous with SATAN
- Getting SATAN
- Examining the SATAN Files
- Building SATAN
- Using SATANs HTML Interface
- Running a Scan
- Understanding the SATAN Database Record Format
- Understanding the SATAN Rulesets
- Extending SATAN
- Long-Term Benefits of Using SATAN
- Works Cited
- Chapter 9Kerberos
- How Kerberos Works
- The Kerberos Network
- RFCs
- Goals of Kerberos
- How Authentication Works
- What Kerberos Doesnt Do
- Encryption
- Private, Public, Secret, or Shared Key Encryption
- Private or Secret Key Encryption
- DES and Its Variations
- Encryption Export Issues
- Encryption and Checksum Specifications
- Versions of Kerberos
- Versions of Kerberos Version 4
- Versions of Kerberos Version 5
- Bones
- Selecting a Vendor
- Vendor Interoperability Issues
- DEC ULTRIX Kerberos
- Transarcs Kerberos
- DCE
- Interoperability Requirements
- Naming Constraints
- Realm Names
- Principal Names
- Cross-Realm Operation
- Ticket Flags
- Initial and Preauthenticated Tickets
- Invalid Tickets
- Renewable Tickets
- Postdated Tickets
- Proxiable and Proxy Tickets
- Forwardable Tickets
- Authentication Flags
- Other Key Distribution Center Options
- Message Exchanges
- Tickets and Authenticators
- The Authentication Service Exchange
- The Ticket Granting Service (TGS) Exchange
- Specifications for the Authentication Server and Ticket Granting Service Exchanges
- The Client/Server Authentication Exchange
- Client/Server (CS) Message Specifications
- The KRB_SAFE Exchange
- KRB_SAFE Message Specification
- The KRB_PRIV Exchange
- KRB_PRIV Message Specification
- The KRB_CRED Exchange
- KRB_CRED Message Specification
- Names
- Time
- Host Addresses
- Authorization Data
- Last Request Data
- Error Message Specification
- Kerberos Workstation Authentication Problem
- Kerberos Port Numbers
- Kerberos Telnet
- Kerberos ftpd
- Other Sources of Information
- PART IIIMessaging: Creating a Secure Channel
- Chapter 10Encryption Overview
- Overview of Encryption Techniques
- Crypto-Speak
- Applying Cryptography
- The Threats of Hackers and Eavesdroppers
- Goals of Cryptography
- Digital IDs, Certificates, and Certificate Authorities
- Digital Signatures
- Security for Network Logon and Authentication
- Secure Channels
- Secure Internet Tunnels
- Electronic Commerce
- Symmetric (Secret Key) Cryptography
- Transposition
- Deciphering
- Substitution
- Block and Stream Ciphers
- DES (Data Encryption Standard)
- DES Alternatives
- Blowfish
- Asymmetric (Public-Key) Cryptography
- Attacks and Cryptanalysis
- Crypto Links
- Summary
- Chapter 11PGP
- PGP Overview
- History of PGP
- Why Use PGP?
- Short Encryption Review
- PGP How-To
- Before You Use PGP
- Generate a PGP Key
- Distributing the Public Key
- Signing a Message
- Adding Someone Elses Key
- Encrypting a Message
- Decrypting and Verifying a Message
- PGP Keys
- Whats in a Name?
- PGP Key Rings
- The Web of Trust
- Degrees of Trust
- Key Management
- Key Generation
- Creating the PGP Userid
- Adding Keys to the Public Key Ring
- Extracting Keys from the Public Key Ring
- Signing Keys
- Viewing the Contents of a Key Ring
- Removing Keys and Signatures
- Key Fingerprints and Verifying Keys
- Revoking Your Key
- Basic Message Operations
- PGP: Program or Filter?
- Compressing the Message
- Processing Text and Binary Files
- Sending PGP Messages Via E-Mail
- Conventional Encryption
- Signing a Message
- Encrypting a Message Using Public Key
- Signing and Encrypting Messages
- Decrypting and Verifying Messages
- Advanced Message Operations
- Clearsigning
- Detached Signatures
- For Her Eyes Only
- Wiping Files
- The PGP Configuration File
- Security of PGP
- The Brute Force Attack
- Secret Keys and Pass Phrases
- Public Key Ring Attacks
- Program Security
- Other Attacks Against PGP
- PGP Add-Ons
- PGP Public Keyservers
- PGPMenu: A Menu Interface to PGP for Unix
- Windows Front-Ends
- Unix Mailers
- Mac PGP
- PART IVModern Concerns
- Chapter 12Windows NT Internet Security
- Windows NT Overview
- Windows NT Architecture
- The Windows NT Operating Environment
- Domains
- User Accounts, Groups, Rights, and Permissions
- Windows NT Logon and Authentication
- Intranet-Related Features in Windows NT
- Using a DNS Server in an Intranet
- Using NetBIOS Name Resolution in an Intranet
- Using a WINS Server for an Intranet
- Considerations for Connecting to the Internet
- Public Web Server Connection for IIS
- Proxy Server Connections
- Configuring Services in Windows NT
- Configuring Ports in Windows NT
- Microsoft Internet Information Server
- IIS Security Features
- Microsoft Proxy Server
- Proxy Server Features
- The New Windows NT Directory Services Model
- Summary
- Chapter 13Java Security
- Javas Functionality
- Java Is Portable
- Java Is Robust
- Java Is Secure
- Java Is Object-Oriented
- Java Is High Performance
- Java Is Easy
- History of the Java Language
- Main Features of the Java Environment
- Features of the Java Language
- The Java Architecture
- From Class File to Execution
- The Compilation of Code
- Running Code
- The Java Virtual Machine
- Why a New Machine Code Specification?
- The Java Virtual Machine Description
- Setting Up Java Security Features
- Using the Appletviewer
- Netscape 3.0
- Other Issues in Using Java Programs
- Chapter 14CGI Security
- Why CGI Is Dangerous
- How CGI Works
- CGI Data: Encoding and Decoding
- CGI Libraries
- Understanding Vulnerabilities
- The HTTP Server
- The HTTP Protocol
- The Environment Variables
- GET and POST Input Data
- Minimizing Vulnerability
- Restrict Access to CGI
- Run CGIs with Minimum Privileges
- Execute in a chrooted Environment
- Secure the HTTP Server Machine
- CGIWrap: An Alternative Model
- Advantages and Disadvantages
- Bypassing CGI
- Server Side Includes (SSI)
- Restrict Access to SSI
- Alternatives to SSI
- Language Issues
- PERL
- C and C++
- Safe Languages
- Protecting Sensitive Data
- Logging
- Chapter 15Viruses
- A Reality Check
- What Is a Computer Virus?
- Most Likely Targets
- Key Hardware
- Key Software
- The Boot Record
- The FAT
- The Root Directory
- Floppy Boot Records (FBRs)
- Hard Drive Master Boot Record
- Partition Boot Records
- System Services
- Data Files with Macro Capabilities
- IBM PC Computer Virus Types
- Boot Record Viruses
- Floppy Boot Record Viruses
- Partition Boot Record Viruses
- Master Boot Record Viruses
- Program File Viruses
- Companion Viruses
- Potential Damage by File-Infecting Viruses
- Macro Viruses
- Worms
- Network and Internet Virus Susceptibility
- Network Susceptibility to File Viruses
- Boot Viruses
- Macro Viruses
- Virus Classes
- Polymorphic Viruses
- Stealth Viruses
- Slow Viruses
- Retro Viruses
- Multipartite Viruses
- How Antivirus Programs Work
- Virus Scanners
- Memory Scanners
- Integrity Checkers
- Behavior Blockers
- Heuristics
- Preventative Measures and Cures
- Preventing and Repairing Boot Record Viruses
- Preventing and Repairing Executable File Viruses
- Repairing Files Infected with a Read-Stealth Virus
- Preventing and Repairing Macro Viruses
- Profile: Virus Behavior Under Windows NT
- Master Boot Record Viruses Under Windows NT
- Boot Record Viruses Under Windows NT
- DOS File Viruses Under a Windows NT DOS Box
- Windows 3.1 Viruses Under Windows NT
- Macro Viruses Under Windows NT
- Native Windows NT Viruses
- Summary
Appendix A
Appendix B
Index
|