Cover image for Firewalls and Internet security : repelling the wily hacker
Title:
Firewalls and Internet security : repelling the wily hacker
Personal Author:
Publication Information:
Reading, MA : Addison-Wesley, 1994
ISBN:
9780201633573
Added Author:

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000003397035 TK5105.875.I57 C43 1994 Open Access Book Book
Searching...

On Order

Summary

Summary

- Cliff Stoll, author of The Cuckoos Egg: Tracking a Spy Through the Maze of Computer Espionage As a user of the Internet, you are fortunate to be tied into the worlds greatest communication and information exchange - but not without a price. As a result of this connection, your computer, your organizations network, and everywhere that network reaches are all vulnerable to potentially disastrous infiltration by hackers. Written by the AT&T Bell Labs researchers who tracked the infamous Berferd hacker and also built the firewall gateway at Bell Labs, Firewalls and Internet Security gives you invaluable advice and practical tools for protecting your organizations computers from the very real threat of a hacker attack through the Internet. You will learn how to plan and execute a security strategy that will thwart the most determined and sophisticated of hackers - while still allowing you easy access to Internet services. In particular, the authors show you a step-by-step plan for setting up a firewall gateway - a dedicated computer equipped with safeguards that acts as a single, more easily defended, Internet connection. They even include a description of their most recent gatewa


Author Notes

William R. Cheswick ( http://cheswick.com ) is Chief Scientist at Lumeta Corporation, which explores and maps clients' network infrastructures and finds perimeter leaks. Formerly he was a senior researcher at Lucent Bell Labs, where he did pioneering work in the areas of firewall design and implementation, PC viruses, mailers, and Internet munitions.

Steven M. Bellovin ( http://stevebellovin.com ) is a Fellow at AT&T Labs Research, where he works on networks, security, and, especially, why the two don't get along. He is a member of the National Academy of Engineering and is one of the Security Area directors of the Internet Engineering Task Force. Long ago he was one of the creators of NetNews.



0201633574AB01302003


Table of Contents

Preface
I Getting Started
1 Introduction
Why Security?
Picking a Security Policy
Strategies for a Secure Network
The Ethics of Computer Security
Warning
2 An Overview of TCP/IP
The Different Layers
Routers and Routing Protocols
The Domain Name System
Standard Services
RPC
Based Protocols
File Transfer Protocols
The r Commands
Information Services
The X11 System
Patterns of Trust
II Building Your Own Firewall
3 Firewall Gateways
Firewall Philosophy
Situating Firewalls
Packet-Filtering Gateways
Application-Level Gateways
Circuit-Level Gateways
Supporting Inbound Services
Tunnels Good and Bad
Joint Ventures
What Firewalls Can't Do
4 How to Build an Application-Level Gateway
Policy
Hardware Configuration Options
Initial Installation
Gateway Tools
Installing Services
Protecting the Protectors
Gateway Administration
Safety Analysis (Why Our Setup Is Secure and Fail-Safe)
Performance
The TIS Firewall Toolkit
Evaluating Firewalls
Living Without a Firewall
5 Authentication
User Authentication
Host-to-Host Authentication
6 Gateway Tools
Proxylib
Syslog
Watching the Network: Tcpdump and Friends
Adding Logging to Standard Daemons
7 Traps, Lures, and Honey Pots
What to Log
Dummy Accounts
Tracing the Connection
8 The Hacker's Workbench
Introduction
Discovery
Probing Hosts
Connection Tools
Routing Games
Network Monitors
Metastasis
Tiger Teams
Further Reading
III A Book Back
9 Classes of Attacks
Stealing Passwords
Social Engineering
Bugs and Backdoors
Authentication Failures
Protocol Failures
Information Leakage
Denial-of-Service
10 An Evening with Berferd
Introduction
Unfriendly Acts
An Evening with Berferd
The Day After
The Jail
Tracing Berferd
Berferd Comes Home
11 Where the Wild Things Are: A Look at the Logs
A Year of Hacking
Proxy Use
Attack Sources
Noise on the Line
IV Odds And Ends
12 Legal Considerations
Computer Crime Statutes
Log Files as Evidence
Is Monitoring Legal?
Tort Liability Considerations
13 Secure Communications over Insecure Networks
An Introduction to Cryptography
The Kerberos Authentication System
Link-Level Encryption
Network- and Transport-Level Encryption
Application-Level Encryption
14 Where Do We Go from Here?
Appendix A Useful Free Stuff
Building Firewalls
Network Management and Monitoring Tools
Auditing Packages
Cryptographic Software
Information Sources
Appendix B TCP and UDP Ports
Fixed Ports
MBone Usage
Appendix C Recommendations to Vendors
Everyone
Hosts
Routers
Protocols
Firewalls
Bibliography
List of Bombs
Index