O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Linux Hardening in Hostile Networks: Server Security from TLS to TOR

Book Description

This is the Rough Cut version of the printed book.

The attacks that the average sysadmin faces today are the sophisticated nation-state attacks from the year before. The early chapters of Linux Hardening in Hostile Networks take a user-centric approach and walk the reader through improving their operational security and hardening their own workstation including a full guide on the security-focused Tails and Qubes OSes. The core of the book aims at securing the servers these users talk to, and guides the reader through how to set up secured versions of the services your average sysadmin manages every day, including web, email, and database servers that communicate over TLS, locked-down DNS servers with DNSSEC. The book also includes sections on Tor servers and hidden services. Additional topics include workstation security, network, web servers, email, DNS, and database.

The book itself organizes each of these categories into their own chapters, and each chapter is further divided into three sections that organize tips for each category based on difficulty level, time commitment, and overall threat. While the first section of each chapter contains tips just about anyone could follow in a few minutes to protect against the entry-level hacker, the second section of the chapter aims at intermediate, up to advanced, sysadmin and protecting against more sophisticated, knowledgeable attackers. The final section of each chapter describes techniques for advanced administrators to protect against nation-state-level adversaries.

Table of Contents

  1. Contents
  2. Chapter 2. Workstation Security
    1. Introduction
    2. Section 1: Workstation Security Fundamentals
    3. Web Security Fundamentals
    4. Introduction to Tails
    5. Download, Validate, and Install Tails
    6. Use Tails
    7. Section 2: Additional Workstation Hardening
    8. BIOS Passwords
    9. Tails Persistence and Encryption
    10. Section 3: Qubes
    11. Introduction to Qubes
    12. Qubes Download and Installation
    13. The Qubes Desktop
    14. An AppVM Compartmentalization Example
    15. Split-GPG
    16. USB VM
  3. Chapter 3. Server Security
    1. Introduction
    2. Section 1: Server Security Fundamentals
    3. SSH Configuration
    4. Sudo
    5. Section 2: Intermediate Server Hardening Techniques: SSH Key Authentication
    6. Apparmor
    7. Remote Logging
    8. Section 3: Advanced Server Hardening Techniques: Server Disk Encryption
    9. Secure NTP Alternatives
    10. Two-factor Authentication with SSH
  4. Chapter 5. Web Servers
    1. Section 1: Web Server Security Fundamentals
    2. Section 2
    3. Section 3: Title
  5. Chapter 7. DNS
    1. Introduction
    2. Section 1: DNS Security Fundamentals
    3. Authoritative DNS Server Hardening
    4. Recursive DNS Server Hardening
    5. Section 2: DNS Amplification Attacks and Rate Limiting
    6. DNS Query Logging
    7. Dynamic DNS Authentication
    8. Section 3: DNSSEC
    9. How DNS Works
    10. DNS Security Issues
    11. How DNSSEC Works
    12. DNSSEC Terminology
    13. Add DNSSEC to a Zone
  6. Chapter 9. Incident Response
    1. Section 1: Incident Response Fundamentals
    2. Who Performs Incident Response?
    3. Do You Prosecute?
    4. Pull the Plug
    5. Image the Server
    6. Server Redeployment
    7. Forensics
    8. Section 2: Secure Disk Imaging Techniques
    9. Introduction to Sleuthkit and Autopsy
    10. Section 3: Walk Through a Sample Investigation
    11. Cloud Incident Response