| OverviewFreeBSD and OpenBSD are increasingly gaining traction in
educational institutions, non-profits, and corporations
worldwide because they provide significant security
advantages over Linux. Although a lot can be said for the
robustness, clean organization, and stability of the BSD
operating systems, security is one of the main reasons
system administrators use these two platforms.
There are plenty of books to help you get a FreeBSD or
OpenBSD system off the ground, and all of them touch on
security to some extent, usually dedicating a chapter to the
subject. But, as security is commonly named as the key
concern for today's system administrators, a single chapter
on the subject can't provide the depth of information you
need to keep your systems secure.
FreeBSD and OpenBSD are rife with security "building blocks"
that you can put to use, and Mastering FreeBSD and
OpenBSD Security shows you how. Both operating
systems have kernel options and filesystem features that go
well beyond traditional Unix permissions and controls. This
power and flexibility is valuable, but the colossal range of
possibilities need to be tackled one step at a time. This
book walks you through the installation of a hardened
operating system, the installation and configuration of
critical services, and ongoing maintenance of your FreeBSD
and OpenBSD systems.
Using an application-specific approach that builds on your
existing knowledge, the book provides sound technical
information on FreeBSD and Open-BSD security with plenty of
real-world examples to help you configure and deploy a
secure system. By imparting a solid technical foundation as
well as practical know-how, it enables administrators to
push their server's security to the next level. Even
administrators in other environments--like Linux and
Solaris--can find useful paradigms to emulate.
Written by security professionals with two decades of
operating system experience, Mastering FreeBSD and
OpenBSD Security features broad and deep
explanations of how how to secure your most critical
systems. Where other books on BSD systems help you achieve
functionality, this book will help you more thoroughly
secure your deployments. Editorial ReviewsProduct DescriptionFreeBSD and OpenBSD are increasingly gaining traction in educational institutions, non-profits, and corporations worldwide because they provide significant security advantages over Linux. Although a lot can be said for the robustness, clean organization, and stability of the BSD operating systems, security is one of the main reasons system administrators use these two platforms. There are plenty of books to help you get a FreeBSD or OpenBSD system off the ground, and all of them touch on security to some extent, usually dedicating a chapter to the subject. But, as security is commonly named as the key concern for today's system administrators, a single chapter on the subject can't provide the depth of information you need to keep your systems secure. FreeBSD and OpenBSD are rife with security "building blocks" that you can put to use, and Mastering FreeBSD and OpenBSD Security shows you how. Both operating systems have kernel options and filesystem features that go well beyond traditional Unix permissions and controls. This power and flexibility is valuable, but the colossal range of possibilities need to be tackled one step at a time. This book walks you through the installation of a hardened operating system, the installation and configuration of critical services, and ongoing maintenance of your FreeBSD and OpenBSD systems. Using an application-specific approach that builds on your existing knowledge, the book provides sound technical information on FreeBSD and Open-BSD security with plenty of real-world examples to help you configure and deploy a secure system. By imparting a solid technical foundation as well as practical know-how, it enables administrators to push their server's security to the next level. Even administrators in other environments--like Linux and Solaris--can find useful paradigms to emulate. Written by security professionals with two decades of operating system experience, Mastering FreeBSD and OpenBSD Security features broad and deep explanations of how how to secure your most critical systems. Where other books on BSD systems help you achieve functionality, this book will help you more thoroughly secure your deployments. |
Other Readers Also Read | Top Sellers in This Category | Browse Similar Topics | | | Top Level Categories:Sub-Categories: | | | |
Reader Reviews From Amazon (Ranked by 'Helpfulness') Average Customer Rating: based on 6 reviews. Very Good BSD Book, 2008-01-24 Reviewer rating: FreeBSD and OpenBSD are popular server operating systems. They have a reputation for long, reliable uptimes and are considered by many to be much more unified and mature than GNU/Linux distributions. Unlike GNU/Linux, the BSDs are developed in a unified, systematic fashion. The kernel, system binaries and application packages are released together. It's not just a kernel, with a variety of file systems and shells and applications from various sources rolled-up together into a distribution. The BSDs are an entire operating system. In this regard, they are more similar to Microsoft Windows or Apple's Mac OS X.
Although both FreeBSD and OpenBSD maintain very good online documentation and manual pages, it's nice to have a book such as "Mastering FreeBSD and OpenBSD Security" as a reference.
The book is broken into three sections. The first section emphasizes the cost of security and how cost should be directly related to the value of the system(s) or data being secured. Spending $60,000 to secure data valued at less than $100 is not a good idea. It's an inefficient use of scarce resources (time and money). The book encourages implementing an appropriate level of security, no more and no less. Secure installation and install tweaks are also covered in this section.
The second section covers implementation of services in detail. DNS, mail, Web, etc. Firewalls are discussed in depth along with the particulars of PF and IPFW. Differences between FreeBSD jails and chrooted environments on OpenBSD systems are clearly explained. Traditional Unix servers such as Sendmail, BIND and Apache are covered in depth, however, alternative (and arguably more secure) servers are covered as well... using software such as djbdns, postfix, qmail and thttpd in place of the more traditional solutions are described.
The third section goes over auditing, logging and incident response. From setting-up a secure log server to responding to break-ins. How to triage and decide how many resources should be spent on responses. Again, the book emphasizes an appropriate, cost-effective response. Resources are limited and both time and money should be used wisely.
In conclusion, Mastering FreeBSD and OpenBSD Security is a worthwhile book. It covers BSD security topics (in detail) that are not often seen in books. It's a good read and a good reference written in a terse manner that gets the points across without being overly verbose... unlike many technical books on the market today.
| Lots of sound information, but not what I hoped to read, 2006-08-20 Reviewer rating: Mastering FreeBSD and OpenBSD Security (MFAOS) more or less delivers on its subtitle: "Building, securing, and maintaining BSD systems." The book is chock full of absolutely sound administration advice from three experts with plenty of operational experience. I am also thrilled whenever I find a new BSD title on bookshelves. However, I believe a second edition of this book should be radically altered to better deliver value to the reader.
Note: I am in a somewhat awkward position as I write this review, since I know one of the authors as a fellow local security professional. I've spoken at a conference he organizes and I even have all three authors' signatures on my copy of MFAOS! Still, I hope they will consider incorporating my ideas when O'Reilly asks for a second edition.
First, I think MFAOS:2E should address FreeBSD, OpenBSD, and NetBSD. It's appropriate to read a book only about ONE of the BSDs, or all three of the BSDs. It's odd to cover FreeBSD and OpenBSD but not NetBSD. I think DragonFly BSD's miniscule userbase puts it on the fringe, and Mac OS X is not BSD.
Second, the authors should rigorously concentrate on covering BSD-specific administration and security issues. I do not need to read about generic security issues in Ch 1, or standard DNS/Mail/Web attacks in Chs 5/6/7. I definitely did not need YASD (Yet Another Snort Doc) in Ch 9 -- especially when ACID is explained as the console of choice. (BASE replaced ACID in Sep 04). I do not need the advice on incident response and forensics found in Ch 11. MFAOS should be a more of a BSD book and less of a security book.
Removing all of this generic material in a second edition would provide room to focus on BSD-specific material not found elsewhere. For example, Dru Lavigne's briefer, older, all-BSD book BSD Hacks gives more information on FreeBSD's Mandatory Access Controls than MFAOS -- and MFAOS is a BSD security book. I would have liked more details on building FreeBSD jails, especially with respect to creating a local package builder.
While reading MFAOS, I frequently felt the authors did not provide enough details on the subjects I felt were different from multi-platform Unix books. For example, why write five pages on Nagios in Ch 4 if that information really isn't enough to do anything useful?
It seemed the authors assumed many of their brief discussions of useful behavior was sufficient for the reader. In reality, I probably wouldn't be reading the book if I could get by on the information provided; I'd be implementing on my own. For example, the authors devote 3 1/2 pages in Ch 4 to using CVS to track changes to configuration files. While not BSD-specific, this is the sort of good practice not frequently covered elsewhere. Yet, when I hoped for more advanced discussions I see the phrase "beyond the scope of this book" on p 136.
I was disappointed that Qmail was ignored in Ch 6, even though Djbdns was addressed in Ch 5. Furthermore, when the authors repeatedly admit that Dan Berstein's software isn't well documented, they should recognize that as an opportunity! Say less on Apache, BIND, etc., and cover the lesser-known but potentially more secure alternatives.
I rate this book highly (four stars) because it's full of good advice. For example, I liked recommendations on using flags, secure levels, and similar topics in Ch 2. I liked the two-tiered Web server architecture in Ch 7, as well as comparisons of IPFW and Pf in Ch 8. You won't find me disagreeing with the authors of this book -- except when they configure Snort to log directly to a database. (Ouch -- that has been bad advice since Barnyard was released in Dec 02.)
A second edition should also keep in mind the binary upgrade and patching tools available since FreeBSD 5.x -- updating via source isn't necessary for many admins these days. Also, if they insist on demonstrating how to set up well-documented servers (DNS/Web/Mail), try picking one app and one BSD. Then thoroughly document setting up the entire system, from install to deployment. Consider providing templates, especially for automated and repeatable installations. Tie them to standards like CISecurity if possible. That would be exceptional.
I wish the authors had directed their talents toward BSD-specific quirks and less on topics covered elsewhere. This is still a solid BSD book, but I would be very glad to see MFAOS:2E take this advice to heart. | Well researched, illustrated and written, 2005-06-24 Reviewer rating: Another tight O'Reilly work. The text is tight. The illustrations are simple but effective. And the authors obviously know there stuff and have done a thorough job documenting it.
It's an easy read that will help you far more than the crummy Unix documentation. A good introduction as well as a long term resource. | Wonderful book, just missing one thing..., 2005-06-12 Reviewer rating: I was really hoping to see a chapter on systrace or other advanced host-based security tools (HIPS and other kernel utils). All in all, the book is a nice addition to any security library. The basic ideas of risk management and confidentiality, integrity and availability (CIA), are covered throughout the book. I would say this is a good reference to use in addition to the man pages for both operating systems. | Good read and a solid approach to security, 2005-06-09 Reviewer rating: If you are looking at implementing one of the BSD distributions of Linux and want to secure your installation this book is an excellent choice. The authors cover the basic security that applies to all Linux distributions such as filesystem security and creating a sandbox, and then follows up with security options specific to BSD. The chapters cover installation, secure administration, creating a secure DNS server, secure mail servers (including Sendmail, Postfix, and qmail), secure web server, firewalls, intrusion detection, system auditing and incident response, and some forensics. However, the forensics information provides a decent overview without being detailed enough to be very useful.
The authors do a really good job of explaining not only how to do various tasks but also the reasoning behind it and how it works to resolve specific problems. I like the fact that the authors don't do this in a piecemeal approach but provide a pathway to get to the system hardened before heading off into the specifics of harding particular services link DNS and Sendmail. They actually have a step by step procedure starting from a fresh install. This alone makes this one of the better books on hardening FreeBSD and OpenBSD. Mastering FreeBSD and OpenBSD Security is highly recommended. |
Some information above was provided using data from Amazon.com. View at Amazon > |
| |
|
|