Apache Security (Paperback)
暫譯: Apache 安全性 (平裝本)

Ivan Ristic

  • 出版商: O'Reilly
  • 出版日期: 2005-04-05
  • 售價: $1,420
  • 貴賓價: 9.5$1,349
  • 語言: 英文
  • 頁數: 432
  • 裝訂: Paperback
  • ISBN: 0596007248
  • ISBN-13: 9780596007249
  • 相關分類: 資訊安全
  • 海外代購書籍(需單獨結帳)

買這商品的人也買了...

相關主題

商品描述

Description:

With more than 67% of web servers running Apache, it is by far the most widely used web server platform in the world. Apache has evolved into a powerful system that easily rivals other HTTP servers in terms of functionality, efficiency, and speed. Despite these impressive capabilities, though, Apache is only a beneficial tool if it's a secure one.

To be sure, administrators installing and configuring Apache still need a sure-fire way to secure it--whether it's running a huge e-commerce operation, corporate intranet, or just a small hobby site.

Our new guide, Apache Security, gives administrators and webmasters just what they crave--a comprehensive security source for Apache. Successfully combining Apache administration and web security topics, Apache Security speaks to nearly everyone in the field. What's more, it offers a concise introduction to the theory of securing Apache, as well as a broad perspective on server security in general.

But this book isn't just about theory. The real strength of Apache Security lies in its wealth of interesting and practical advice, with many real-life examples and solutions. Administrators and programmers will learn how to:

  • install and configure Apache
  • prevent denial of service (DoS) and other attacks
  • securely share servers
  • control logging and monitoring
  • secure custom-written web applications
  • conduct a web security assessment
  • use mod_security and other security-related modules


And that's just the tip of the iceberg, as mainstream Apache users will also gain valuable information on PHP and SSL/ TLS. Clearly, Apache Security is packed and to the point, with plenty of details for locking down this extremely popular and versatile web server.

 

 

Table of Contents:

Preface

1. Apache Security Principles

     Security Definitions

               Essential Security Principles

               Common Security Vocabulary

               Security Process Steps

               Threat Modeling

               System-Hardening Matrix

               Calculating Risk

     Web Application Architecture Blueprints

               User View

               Network View

               Apache View

2. Installation and Configuration

     Installation

               Source or Binary

               Static Binary or Dynamic Modules

               Folder Locations

               Installation Instructions

     Configuration and Hardening

               Setting Up the Server User Account

               Setting Apache Binary File Permissions

               Configuring Secure Defaults

               Enabling CGI Scripts

               Logging

               Setting Server Configuration Limits

               Preventing Information Leaks

     Changing Web Server Identity

               Changing the Server Header Field

               Removing Default Content

     Putting Apache in Jail

               Tools of the chroot Trade

               Using chroot to Put Apache in Jail

               Using the chroot(2) Patch

               Using mod_security or mod_chroot

3. PHP

     Installation

               Using PHP as a Module

               Using PHP as a CGI

               Choosing Modules

     Configuration

               Disabling Undesirable Options

               Disabling Functions and Classes

               Restricting Filesystem Access

               Setting Logging Options

               Setting Limits

               Controlling File Uploads

               Increasing Session Security

               Setting Safe Mode Options

     Advanced PHP Hardening

               PHP 5 SAPI Input Hooks

               Hardened-PHP

4. SSL and TLS

     Cryptography

               Symmetric Encryption

               Asymmetric Encryption

               One-Way Encryption

               Public-Key Infrastructure

               How It All Falls into Place

     SSL

               SSL Communication Summary

               Is SSL Secure?

     OpenSSL

     Apache and SSL

               Installing mod_ssl

               Generating Keys

               Generating a Certificate Signing Request

               Signing Your Own Certificate

               Getting a Certificate Signed by a CA

               Configuring SSL

     Setting Up a Certificate Authority

               Preparing the CA Certificate for Distribution

               Issuing Server Certificates

               Issuing Client Certificates

               Revoking Certificates

               Using Client Certificates

     Performance Considerations

               OpenSSL Benchmark Script

               Hardware Acceleration

5. Denial of Service Attacks

     Network Attacks

               Malformed Traffic

               Brute-Force Attacks

               SYN Flood Attacks

               Source Address Spoofing

               Distributed Denial of Service Attacks

               Reflection DoS Attacks

     Self-Inflicted Attacks

               Badly Configured Apache

               Poorly Designed Web Applications

               Real-Life Client Problems

     Traffic Spikes

               Content Compression

               Bandwidth Attacks

               Cyber-Activism

               The Slashdot Effect

     Attacks on Apache

               Apache Vulnerabilities

               Brute-Force Attacks

               Programming Model Attacks

     Local Attacks

               PAM Limits

               Process Accounting

               Kernel Auditing

     Traffic-Shaping Modules

     DoS Defense Strategy

6. Sharing Servers

     Sharing Problems

               File Permission Problems

               Dynamic-Content Problems

               Sharing Resources

               Same Domain Name Problems

               Information Leaks on Execution Boundaries

     Distributing Configuration Data

     Securing Dynamic Requests

               Enabling Script Execution

               Setting CGI Script Limits

               Using suEXEC

               FastCGI

               Running PHP as a Module

     Working with Large Numbers of Users

               Web Shells

               Dangerous Binaries

7. Access  Control

     Overview

     Authentication Methods

               Basic Authentication

               Digest Authentication

               Form-Based Authentication

     Access Control in Apache

               Basic Authentication Using Plaintext Files

               Basic Authentication Using DBM Files

               Digest Authentication

               Certificate-Based Access Control

               Network Access Control

               Proxy Access Control

               Final Access Control Notes

     Single Sign-on

               Web Single Sign-on

               Simple Apache-Only Single Sign-on

8. Logging and Monitoring

     Apache Logging Facilities

               Request Logging

               Error Logging

               Special Logging Modules

               Audit Log

               Performance Measurement

               File Upload Interception

               Application Logs

               Logging as Much as Possible

     Log Manipulation

               Piped Logging

               Log Rotation

               Issues with Log Distribution

     Remote Logging

               Manual Centralization

               Syslog Logging

               Database Logging

               Distributed Logging with the Spread Toolkit

     Logging Strategies

     Log Analysis

     Monitoring

               File Integrity

               Event Monitoring

               Web Server Status

9. Infrastructure

     Application Isolation Strategies

               Isolating Applications from Servers

               Isolating Application Modules

               Utilizing Virtual Servers

     Host Security

               Restricting and Securing User Access

               Deploying Minimal Services

               Gathering Information and Monitoring Events

               Securing Network Access

               Advanced Hardening

               Keeping Up to Date

     Network Security

               Firewall Usage

               Centralized Logging

               Network Monitoring

               External Monitoring

     Using a Reverse Proxy

               Apache Reverse Proxy

               Reverse Proxy by Network Design

               Reverse Proxy by Redirecting Network Traffic

     Network Design

               Reverse Proxy Patterns

               Advanced Architectures

10. Web Application Security

     Session Management Attacks

               Cookies

               Session Management Concepts

               Keeping in Touch with Clients

               Session Tokens

               Session Attacks

               Good Practices

     Attacks on Clients

               Typical Client Attack Targets

               Phishing

     Application Logic Flaws

               Cookies and Hidden Fields

               POST Method

               Referrer Check Flaws

               Process State Management

               Client-Side Validation

     Information Disclosure

               HTML Source Code

               Directory Listings

               Verbose Error Messages

               Debug Messages

     File Disclosure

               Path Traversal

               Application Download Flaws

               Source Code Disclosure

               Predictable File Locations

     Injection Flaws

               SQL Injection

               Cross-Site Scripting

               Command Execution

               Code Execution

               Preventing Injection Attacks

     Buffer Overflows

     Evasion Techniques

               Simple Evasion Techniques

               Path Obfuscation

               URL Encoding

               Unicode Encoding

               Null-Byte Attacks

               SQL Evasion

     Web Application Security Resources

               General Resources

               Web Application Security Resources

11. Web Security Assessment

     Black-Box Testing

               Information Gathering

               Web Server Analysis

               Web Application Analysis

               Attacks Against Access Control

               Vulnerability Probing

     White-Box Testing

               Architecture Review

               Configuration Review

               Functional Review

     Gray-Box Testing

12. Web Intrusion Detection

     Evolution of Web Intrusion Detection

               Is Intrusion Detection the Right Approach?

               Log-Based Web Intrusion Detection

               Real-Time Web Intrusion Detection

               Web Intrusion Detection Features

     Using mod_security

               Introduction

               More Configuration Advice

               Deployment Guidelines

               Detecting Common Attacks

               Advanced Topics

Appendix: Tools

Index

商品描述(中文翻譯)

描述:
超過67%的網頁伺服器運行Apache,這使得它成為全球使用最廣泛的網頁伺服器平台。Apache已發展成為一個強大的系統,在功能、效率和速度上輕鬆與其他HTTP伺服器競爭。儘管擁有這些令人印象深刻的能力,Apache只有在安全的情況下才是一個有益的工具。
確保安裝和配置Apache的管理員仍然需要一種可靠的方法來保護它——無論是運行大型電子商務操作、企業內部網路,還是僅僅是一個小型的興趣網站。
我們的新指南《Apache Security》為管理員和網站管理員提供了他們所渴望的——一個全面的Apache安全資源。《Apache Security》成功地結合了Apache管理和網頁安全主題,幾乎涵蓋了該領域的每一個人。此外,它還提供了有關保護Apache的理論簡介,以及對伺服器安全的一個廣泛視角。
但這本書不僅僅是理論。《Apache Security》的真正優勢在於其豐富的有趣和實用建議,並包含許多現實生活中的例子和解決方案。管理員和程式設計師將學會如何:
- 安裝和配置Apache
- 防止拒絕服務(DoS)和其他攻擊
- 安全地共享伺服器
- 控制日誌記錄和監控
- 安全地保護自定義編寫的網頁應用程式
- 進行網頁安全評估
- 使用mod_security和其他安全相關模組

這僅僅是冰山一角,主流的Apache使用者還將獲得有關PHP和SSL/TLS的寶貴資訊。顯然,《Apache Security》內容豐富且切中要點,提供了大量細節以鎖定這個極受歡迎且多功能的網頁伺服器。

目錄:
前言
1. Apache安全原則
- 安全定義
- 基本安全原則
- 常見安全詞彙
- 安全過程步驟
- 威脅建模
- 系統加固矩陣
- 風險計算
- 網頁應用程式架構藍圖
- 使用者視圖
- 網路視圖
- Apache視圖
2. 安裝與配置
- 安裝
- 源碼或二進制
- 靜態二進制或動態模組
- 資料夾位置
- 安裝說明
- 配置與加固
- 設定伺服器使用者帳戶
- 設定Apache二進制檔案權限
- 配置安全預設值
- 啟用CGI腳本
- 日誌記錄
- 設定伺服器配置限制
- 防止資訊洩漏
- 更改網頁伺服器身份
- 更改伺服器標頭欄位
- 移除預設內容
- 將Apache放入監獄
- chroot工具
- 使用chroot將Apache放入監獄
- 使用chroot(2)補丁
- 使用mod_security或mod_chroot
3. PHP
- 安裝
- 使用PHP作為模組
- 使用PHP作為CGI
- 選擇模組
- 配置
- 禁用不必要的選項
- 禁用函數和類別
- 限制檔案系統訪問
- 設定日誌選項
- 設定限制
- 控制檔案上傳
- 增加會話安全性
- 設定安全模式選項
- 進階PHP加固
- PHP 5 SAPI輸入鉤子
- 加固的PHP
4. SSL和TLS
- 密碼學
- 對稱加密
- 非對稱加密
- 單向加密
- 公鑰基礎設施
- 如何將所有內容整合
- SSL
- SSL通訊摘要
- SSL是否安全?
- OpenSSL
- Apache和SSL
- 安裝mod_ssl
- 生成金鑰
- 生成證書簽署請求
- 簽署自己的證書
- 獲取CA簽署的證書
- 配置SSL
- 設定證書授權機構
- 準備CA證書以供分發
- 發放伺服器證書
- 發放客戶端證書
- 撤銷證書
- 使用客戶端證書
- 性能考量
- OpenSSL基準測試腳本
- 硬體加速
5. 拒絕服務攻擊
- 網路攻擊
- 異常流量
- 暴力攻擊
- SYN洪水攻擊
- 源地址欺騙
- 分散式拒絕服務攻擊
- 反射DoS攻擊
- 自我造成的攻擊
- 配置不當的Apache
- 設計不良的網頁應用程式
- 實際客戶問題
- 流量激增
- 內容壓縮
- 帶寬攻擊
- 網路行動主義
- Slashdot效應
- 對Apache的攻擊
- Apache漏洞
- 暴力攻擊
- 程式模型攻擊
- 本地攻擊
- PAM限制
- 程序會計
- 核心審計
- 流量整形模組
- DoS防禦策略