Preface |
|
xiii | |
I. Network Security |
|
1 | (72) |
|
|
3 | (30) |
|
What Are You Trying to Protect? |
|
|
4 | (3) |
|
What Are You Trying to Protect Against? |
|
|
7 | (9) |
|
|
16 | (1) |
|
How Can You Protect Your Site? |
|
|
17 | (4) |
|
What Is an Internet Firewall? |
|
|
21 | (7) |
|
|
28 | (5) |
|
|
33 | (26) |
|
Secure Services and Safe Services |
|
|
35 | (1) |
|
|
35 | (5) |
|
|
40 | (3) |
|
File Transfer, File Sharing, and Printing |
|
|
43 | (5) |
|
|
48 | (3) |
|
Real-Time Conferencing Services |
|
|
51 | (1) |
|
Naming and Directory Services |
|
|
52 | (2) |
|
Authentication and Auditing Services |
|
|
54 | (1) |
|
|
55 | (3) |
|
|
58 | (1) |
|
|
58 | (1) |
|
|
59 | (14) |
|
|
59 | (2) |
|
|
61 | (1) |
|
|
62 | (1) |
|
|
63 | (1) |
|
|
64 | (3) |
|
|
67 | (1) |
|
|
68 | (2) |
|
|
70 | (1) |
|
Security Through Obscurity |
|
|
71 | (2) |
II. Building Firewalls |
|
73 | (242) |
|
|
75 | (27) |
|
What Does a Packet Look Like? |
|
|
75 | (4) |
|
|
79 | (6) |
|
|
85 | (8) |
|
|
93 | (1) |
|
Application Layer Protocols |
|
|
94 | (1) |
|
|
94 | (2) |
|
|
96 | (1) |
|
Attacks Based on Low-Level Protocol Details |
|
|
97 | (5) |
|
|
102 | (20) |
|
Some Firewall Definitions |
|
|
102 | (2) |
|
|
104 | (6) |
|
|
110 | (4) |
|
Network Address Translation |
|
|
114 | (5) |
|
|
119 | (3) |
|
|
122 | (35) |
|
|
122 | (4) |
|
Screened Host Architectures |
|
|
126 | (2) |
|
Screened Subnet Architectures |
|
|
128 | (5) |
|
Architectures with Multiple Screened Subnets |
|
|
133 | (4) |
|
Variations on Firewall Architectures |
|
|
137 | (11) |
|
Terminal Servers and Modem Pools |
|
|
148 | (1) |
|
|
149 | (8) |
|
|
157 | (8) |
|
|
157 | (2) |
|
Evaluate the Available Products |
|
|
159 | (3) |
|
|
162 | (3) |
|
|
165 | (59) |
|
What Can You Do with Packet Filtering? |
|
|
166 | (5) |
|
Configuring a Packet Filtering Router |
|
|
171 | (2) |
|
What Does the Router Do with Packets? |
|
|
173 | (5) |
|
Packet Filtering Tips and Tricks |
|
|
178 | (2) |
|
Conventions for Packet Filtering Rules |
|
|
180 | (3) |
|
|
183 | (2) |
|
|
185 | (5) |
|
Choosing a Packet Filtering Router |
|
|
190 | (13) |
|
Packet Filtering Implementations for General-Purpose Computers |
|
|
203 | (11) |
|
Where to Do Packet Filtering |
|
|
214 | (2) |
|
What Rules Should You Use? |
|
|
216 | (1) |
|
|
216 | (8) |
|
|
224 | (17) |
|
|
225 | (1) |
|
|
226 | (5) |
|
|
231 | (1) |
|
Proxying Without a Proxy Server |
|
|
232 | (1) |
|
|
233 | (4) |
|
Using the TIS Internet Firewall Toolkit for Proxying |
|
|
237 | (1) |
|
Using Microsoft Proxy Server |
|
|
238 | (1) |
|
|
239 | (2) |
|
|
241 | (32) |
|
|
242 | (1) |
|
Special Kinds of Bastion Hosts |
|
|
243 | (1) |
|
|
244 | (4) |
|
Choosing a Physical Location |
|
|
248 | (1) |
|
Locating Bastion Hosts on the Network |
|
|
249 | (1) |
|
Selecting Services Provided by a Bastion Host |
|
|
250 | (3) |
|
Disabling User Accounts on Bastion Hosts |
|
|
253 | (2) |
|
|
255 | (1) |
|
|
256 | (3) |
|
Disabling Nonrequired Services |
|
|
259 | (10) |
|
Operating the Bastion Host |
|
|
269 | (1) |
|
Protecting the Machine and Backups |
|
|
270 | (3) |
|
Unix and Linux Bastion Hosts |
|
|
273 | (24) |
|
|
273 | (2) |
|
|
275 | (3) |
|
Disabling Nonrequired Services |
|
|
278 | (10) |
|
Installing and Modifying Services |
|
|
288 | (3) |
|
Reconfiguring for Production |
|
|
291 | (4) |
|
|
295 | (2) |
|
Windows NT and Windows 2000 Bastion Hosts |
|
|
297 | (18) |
|
Approaches to Building Windows NT Bastion Hosts |
|
|
297 | (1) |
|
Which Version of Windows NT? |
|
|
298 | (1) |
|
|
299 | (2) |
|
Disabling Nonrequired Services |
|
|
301 | (12) |
|
Installing and Modifying Services |
|
|
313 | (2) |
III. Internet Services |
|
315 | (406) |
|
Internet Services and Firewalls |
|
|
317 | (32) |
|
Attacks Against Internet Services |
|
|
319 | (8) |
|
Evaluating the Risks of a Service |
|
|
327 | (7) |
|
Analyzing Other Protocols |
|
|
334 | (2) |
|
What Makes a Good Firewalled Service? |
|
|
336 | (3) |
|
Choosing Security-Critical Programs |
|
|
339 | (8) |
|
Controlling Unsafe Configurations |
|
|
347 | (2) |
|
|
349 | (35) |
|
Remote Procedure Call (RPC) |
|
|
349 | (9) |
|
Distributed Component Object Model (DCOM) |
|
|
358 | (1) |
|
NetBIOS over TCP/IP (NetBT) |
|
|
359 | (2) |
|
Common Internet File System (CIFS) and Server Message Block (SMB) |
|
|
361 | (4) |
|
Common Object Request Broker Architecture (CORBA) and Internet Inter-Orb Protocol (IIOP) |
|
|
365 | (2) |
|
|
367 | (1) |
|
Transport Layer Security (TLS) and Secure Socket Layer (SSL) |
|
|
368 | (5) |
|
The Generic Security Services API (GSSAPI) |
|
|
373 | (1) |
|
|
373 | (4) |
|
Remote Access Service (RAS) |
|
|
377 | (1) |
|
Point-to-Point Tunneling Protocol (PPTP) |
|
|
378 | (3) |
|
Layer 2 Transport Protocol (L2TP) |
|
|
381 | (3) |
|
|
384 | (39) |
|
|
385 | (5) |
|
|
390 | (7) |
|
|
397 | (9) |
|
Mobile Code and Web-Related Languages |
|
|
406 | (6) |
|
Cache Communication Protocols |
|
|
412 | (3) |
|
|
415 | (2) |
|
|
417 | (2) |
|
|
419 | (4) |
|
|
423 | (31) |
|
|
423 | (7) |
|
Simple Mail Transfer Protocol (SMTP) |
|
|
430 | (11) |
|
Other Mail Transfer Protocols |
|
|
441 | (1) |
|
|
442 | (1) |
|
|
443 | (2) |
|
Post Office Protocol (POP) |
|
|
445 | (3) |
|
Internet Message Access Protocol (IMAP) |
|
|
448 | (2) |
|
Microsoft Messaging API (MAPI) |
|
|
450 | (1) |
|
Network News Transfer Protocol (NNTP) |
|
|
450 | (4) |
|
File Transfer, File Sharing, and Printing |
|
|
454 | (34) |
|
File Transfer Protocol (FTP) |
|
|
455 | (13) |
|
Trivial File Transfer Protocol (TFTP) |
|
|
468 | (2) |
|
Network File System (NFS) |
|
|
470 | (9) |
|
File Sharing for Microsoft Networks |
|
|
479 | (3) |
|
Summary of Recommendations for File Sharing |
|
|
482 | (1) |
|
|
483 | (4) |
|
|
487 | (1) |
|
|
488 | (32) |
|
|
488 | (3) |
|
|
491 | (16) |
|
Remote Graphical Interfaces |
|
|
507 | (13) |
|
Real-Time Conferencing Services |
|
|
520 | (19) |
|
Internet Relay Chat (IRC) |
|
|
520 | (3) |
|
|
523 | (2) |
|
|
525 | (3) |
|
|
528 | (5) |
|
|
533 | (2) |
|
Multicast and the Multicast Backbone (MBONE) |
|
|
535 | (4) |
|
Naming and Directory Services |
|
|
539 | (52) |
|
|
539 | (24) |
|
Network Information Service (NIS) |
|
|
563 | (2) |
|
NetBIOS for TCP/IP Name Service and Windows Internet Name Service |
|
|
565 | (11) |
|
|
576 | (7) |
|
Lightweight Directory Access Protocol (LDAP) |
|
|
583 | (2) |
|
|
585 | (1) |
|
Information Lookup Services |
|
|
586 | (5) |
|
Authentication and Auditing Services |
|
|
591 | (39) |
|
|
592 | (4) |
|
|
596 | (4) |
|
Authentication Mechanisms |
|
|
600 | (4) |
|
Modular Authentication for Unix |
|
|
604 | (5) |
|
|
609 | (6) |
|
|
615 | (7) |
|
Remote Authentication Dial-in User Service (Radius) |
|
|
622 | (3) |
|
|
625 | (2) |
|
|
627 | (3) |
|
|
630 | (34) |
|
System Management Protocols |
|
|
630 | (7) |
|
|
637 | (7) |
|
Protocols for Booting and Boot-Time Configuration |
|
|
644 | (3) |
|
ICMP and Network Diagnostics |
|
|
647 | (7) |
|
Network Time Protocol (NTP) |
|
|
654 | (4) |
|
|
658 | (3) |
|
Mostly Harmless Protocols |
|
|
661 | (3) |
|
|
664 | (17) |
|
|
664 | (14) |
|
|
678 | (3) |
|
|
681 | (40) |
|
Screened Subnet Architecture |
|
|
681 | (23) |
|
Merged Routers and Bastion Host Using General-Purpose Hardware |
|
|
704 | (17) |
IV. Keeping Your Site Secure |
|
721 | (74) |
|
|
723 | (19) |
|
|
724 | (7) |
|
Putting Together a Security Policy |
|
|
731 | (3) |
|
Getting Strategic and Policy Decisions Made |
|
|
734 | (7) |
|
What If You Can't Get a Security Policy? |
|
|
741 | (1) |
|
|
742 | (22) |
|
|
742 | (4) |
|
|
746 | (12) |
|
|
758 | (4) |
|
|
762 | (1) |
|
When Should You Start Over? |
|
|
762 | (2) |
|
Responding to Security Incidents |
|
|
764 | (31) |
|
Responding to an Incident |
|
|
764 | (10) |
|
What to Do After an Incident |
|
|
774 | (1) |
|
Pursuing and Capturing the Intruder |
|
|
775 | (3) |
|
|
778 | (9) |
|
|
787 | (8) |
V. Appendixes |
|
795 | (54) |
|
|
797 | (16) |
|
|
813 | (10) |
|
|
823 | (26) |
Index |
|
849 | |