- Amazon Student members save an additional 10% on Textbooks with promo code TEXTBOOK10. Enter code TEXTBOOK10 at checkout. Here's how (restrictions apply)
Mastering FreeBSD and OpenBSD Security Paperback – Apr 7 2005
|New from||Used from|
Special Offers and Product Promotions
Customers Who Bought This Item Also Bought
No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.
To get the free app, enter your e-mail address or mobile phone number.
About the Author
Yanek Korff graduated with a Bachelor's degree in Computer Science from the College of William and Mary and is currently a Certified Information Systems Security Professional (CISSP). Mr. Korff joined Bell Atlantic as a Systems Engineer where he played a major role in the strategy, design, and deployment of a key Northern Virginia test facility. He later joined Cigital, Inc., a software quality management company, where he played a central role in the design of their systems infrastructure. He is now an essential member of the Information Security division at America Online. During his career, Mr. Korff has been able to identify and mitigate information security risks particularly relating to host-based BSD security. By leveraging his experience, he has been able to apply security fundamentals to influence business and industry practices.
Paco Hope is a Technical Manager with Cigital. His areas of expertise software security, security testing, and casino gaming. He specializes in analyzing the security of software, software systems, and software development processes. Paco frequently speaks at conferences such as the Better Software Conference, STAR East, and STAR West. He conducts training on risk-based security testing, writing security requirements, and software security fundamentals. He can be reached at email@example.com.
Bruce Potter is a Senior Associate at Booz Allen Hamilton. Prior to working at Booz Allen Hamilton, Bruce served as a software security consultant for Cigital in Dulles, VA. Bruce is the founder of the Shmoo Group of security professionals. His areas of expertise include wireless security, large-scale network architectures, smartcards, and promotion of secure software engineering practices. Bruce coauthored the books 802.11 Security and Mac OS X Security. He was trained in computer science at the University of Alaska, Fairbanks.
Inside This Book(Learn More)
Most Helpful Customer Reviews on Amazon.com (beta)
Mastering FreeBSD and OpenBSD Security
By Yanek Korff, Paco Hope, Bruce Potter
First Edition March 2005
464 pages, $49.95 US
This book has been long awaited as the *BSD community has been lacking the number of security geared books compared to the Linux and Windows communities. I found that this book is almost the equal of "Linux Server Security", but for OpenBSD and FreeBSD. With OpenBSD being said to be one of the most secure operating systems, you would think there would be more books about the security other than the normal online documentation.
I'm glad O'Reilly finally put out this book as it covers a broad area of security within OpenBSD and FreeBSD.
This covers *BSD basics, initial install and hardening of the specific OS, security practices, running secure servers (DNS, Mail, Web), firewall, intrusion detection, system audits, incident response, and forensics. This is a broad coverage of security, but I wish on some of the specifics they would have went into detail discussing.
Some points I wish were added in detail was coverage on OpenNTPD's security and/or atleast mentioning that it is contained within OpenBSD. Another would be more coverage of Qmail on FreeBSD/OpenBSD as there really wasn't much more than a mention of Qmail and basic information. Compared to the details given to Sendmail and Postfix, Qmail info was really slacking. The last point I would like to mention that I found lacking was possibly a more in-depth guide to CARP and what it's capable of doing. The main thing dealing with CARP that I would have liked to see would be about load balancing firewalls using CARP and PFSYNC.
Other than these few minor lacking areas, I found this book to be great addition to other security books based around general Linux and BSD servers. I almost wish this book would have waited a little while longer before releasing or hope they plan an update soon as OpenBSD 3.7 is scheduled for release on May 19th and this book mainly just covers versions 3.5/3.6 for OpenBSD. Along with the new version of OpenBSD releasing, FreeBSD 5.4 was released not long after this book was published.
Even lacking the parts that it does, I enjoyed reading the sections about DJBDNS comparison to BIND with details of the specifics. On top of this, there is enough information to get anyone with general *nix knowledge going with a OpenBSD/FreeBSD firewall or secure server. By no means is this book the answer to first time OpenBSD/FreeBSD system administrators to learn the basics from, but seems to be more geared for those atleast somewhat familiar with the *BSD feel of things and aware of what's going on inside their machine. In the beginning of the book it mentions this book was written "by system administrators for system administrators". For someone just getting started with OpenBSD I'd recommend this book, but also would recommend picking up Absolute OpenBSD ([...]) for more coverage of the basics. Otherwise, it will be difficult picking up on what they are saying in this book. Also, on the FreeBSD side of things I'd recommend Absolute BSD ([...]) or The Complete FreeBSD ([...] If your new to *BSD this book will help but a book to compliment it will help even more. Atleast once you learn the basics, you will get a detailed bit of information on securing your new *BSD box.
I believe the writers met their goal of creating a book to solely cover the security features of OpenBSD and FreeBSD aswell as the types of servers run on those platforms. I'm glad this book arrived and look forward to seeing if they release a 2nd edition that is updated and possibly covers the parts that seem to be missing or lacking in detail. Congrats to O'Reilly and the writers.
Pensacola Linux User's Group
Note: I am in a somewhat awkward position as I write this review, since I know one of the authors as a fellow local security professional. I've spoken at a conference he organizes and I even have all three authors' signatures on my copy of MFAOS! Still, I hope they will consider incorporating my ideas when O'Reilly asks for a second edition.
First, I think MFAOS:2E should address FreeBSD, OpenBSD, and NetBSD. It's appropriate to read a book only about ONE of the BSDs, or all three of the BSDs. It's odd to cover FreeBSD and OpenBSD but not NetBSD. I think DragonFly BSD's miniscule userbase puts it on the fringe, and Mac OS X is not BSD.
Second, the authors should rigorously concentrate on covering BSD-specific administration and security issues. I do not need to read about generic security issues in Ch 1, or standard DNS/Mail/Web attacks in Chs 5/6/7. I definitely did not need YASD (Yet Another Snort Doc) in Ch 9 -- especially when ACID is explained as the console of choice. (BASE replaced ACID in Sep 04). I do not need the advice on incident response and forensics found in Ch 11. MFAOS should be a more of a BSD book and less of a security book.
Removing all of this generic material in a second edition would provide room to focus on BSD-specific material not found elsewhere. For example, Dru Lavigne's briefer, older, all-BSD book BSD Hacks gives more information on FreeBSD's Mandatory Access Controls than MFAOS -- and MFAOS is a BSD security book. I would have liked more details on building FreeBSD jails, especially with respect to creating a local package builder.
While reading MFAOS, I frequently felt the authors did not provide enough details on the subjects I felt were different from multi-platform Unix books. For example, why write five pages on Nagios in Ch 4 if that information really isn't enough to do anything useful?
It seemed the authors assumed many of their brief discussions of useful behavior was sufficient for the reader. In reality, I probably wouldn't be reading the book if I could get by on the information provided; I'd be implementing on my own. For example, the authors devote 3 1/2 pages in Ch 4 to using CVS to track changes to configuration files. While not BSD-specific, this is the sort of good practice not frequently covered elsewhere. Yet, when I hoped for more advanced discussions I see the phrase "beyond the scope of this book" on p 136.
I was disappointed that Qmail was ignored in Ch 6, even though Djbdns was addressed in Ch 5. Furthermore, when the authors repeatedly admit that Dan Berstein's software isn't well documented, they should recognize that as an opportunity! Say less on Apache, BIND, etc., and cover the lesser-known but potentially more secure alternatives.
I rate this book highly (four stars) because it's full of good advice. For example, I liked recommendations on using flags, secure levels, and similar topics in Ch 2. I liked the two-tiered Web server architecture in Ch 7, as well as comparisons of IPFW and Pf in Ch 8. You won't find me disagreeing with the authors of this book -- except when they configure Snort to log directly to a database. (Ouch -- that has been bad advice since Barnyard was released in Dec 02.)
A second edition should also keep in mind the binary upgrade and patching tools available since FreeBSD 5.x -- updating via source isn't necessary for many admins these days. Also, if they insist on demonstrating how to set up well-documented servers (DNS/Web/Mail), try picking one app and one BSD. Then thoroughly document setting up the entire system, from install to deployment. Consider providing templates, especially for automated and repeatable installations. Tie them to standards like CISecurity if possible. That would be exceptional.
I wish the authors had directed their talents toward BSD-specific quirks and less on topics covered elsewhere. This is still a solid BSD book, but I would be very glad to see MFAOS:2E take this advice to heart.
Although both FreeBSD and OpenBSD maintain very good online documentation and manual pages, it's nice to have a book such as "Mastering FreeBSD and OpenBSD Security" as a reference.
The book is broken into three sections. The first section emphasizes the cost of security and how cost should be directly related to the value of the system(s) or data being secured. Spending $60,000 to secure data valued at less than $100 is not a good idea. It's an inefficient use of scarce resources (time and money). The book encourages implementing an appropriate level of security, no more and no less. Secure installation and install tweaks are also covered in this section.
The second section covers implementation of services in detail. DNS, mail, Web, etc. Firewalls are discussed in depth along with the particulars of PF and IPFW. Differences between FreeBSD jails and chrooted environments on OpenBSD systems are clearly explained. Traditional Unix servers such as Sendmail, BIND and Apache are covered in depth, however, alternative (and arguably more secure) servers are covered as well... using software such as djbdns, postfix, qmail and thttpd in place of the more traditional solutions are described.
The third section goes over auditing, logging and incident response. From setting-up a secure log server to responding to break-ins. How to triage and decide how many resources should be spent on responses. Again, the book emphasizes an appropriate, cost-effective response. Resources are limited and both time and money should be used wisely.
In conclusion, Mastering FreeBSD and OpenBSD Security is a worthwhile book. It covers BSD security topics (in detail) that are not often seen in books. It's a good read and a good reference written in a terse manner that gets the points across without being overly verbose... unlike many technical books on the market today.
It's an easy read that will help you far more than the crummy Unix documentation. A good introduction as well as a long term resource.
Look for similar items by category
- Books > Computers & Technology > Certification Central > Exams > Security+
- Books > Computers & Technology > History & Culture > Privacy
- Books > Computers & Technology > Networking & Cloud Computing > Internet, Groupware, & Telecommunications
- Books > Computers & Technology > Networking & Cloud Computing > Network Security
- Books > Computers & Technology > Operating Systems > BSD
- Books > Computers & Technology > Operating Systems > Linux
- Books > Computers & Technology > Operating Systems > Unix
- Books > Computers & Technology > Security & Encryption
- Books > Computers & Technology > Software
- Books > Textbooks > Computer Science & Information Systems > Computer Science
- Books > Textbooks > Computer Science & Information Systems > Operating Systems