Neil, I'd recommend the following few books to help you out

1)Linux Network Toolkit by Paul G. Sery - nice intro to many of the security issues in 
question and good sections on setting up logging, proxies etc, using the TIS fwtk, 
tripwire etc. Specific to Redhat linux 5.x

http://www.amazon.com/exec/obidos/ASIN/0764531468/qid%3D908552014/002-
5802003-1840866

2)Building Internet Firewalls by Brent D. Chapman and Elizabeth Zwicky - very good 
grouding on building firewalls and securing them. A bit out of date now (published in 
93 
ot 95), but the theory is very good. Most of the book is dedicated to actuall 
techniques 
for putting your firewall together. Also explains locking down the system very well. 
Tied 
in with book number 3 or 5 would be great.

http://www.amazon.com/exec/obidos/ASIN/1565921240/qid%3D908551966/002-
5802003-1840866

3)Internet Security: Professional reference - Fairly up to date, mainly tailored 
towards 
locking down commercial 'nixes.

http://www.amazon.com/exec/obidos/ASIN/156205760X/qid=908551442/sr=1-5/002-
5802003-1840866

4)Firewalls Complete (McGraw-Hill Publishing), published 1998. Excellent book, talks 
about lots of the security issues involved. Section on roll your own firewalls is a 
bit 
sparse. Lots of coverage on current commercial firewall solutions.

http://www.amazon.com/exec/obidos/ASIN/0070246459/qid%3D908551849/002-
5802003-1840866

5)Practical Unix and Internet Security by Garfinkel and Spafford - A classic, highly 
recommended. Heavy book (in pounds, not just in reading <VBG>)

http://www.amazon.com/exec/obidos/ASIN/1565921488/qid=908551442/sr=1-13/002-
5802003-1840866

6)Firewalls and Internet Security : Repelling the Wily Hacker - another classic

http://www.amazon.com/exec/obidos/ASIN/020163466X/qid=908551442/sr=1-15/002-
5802003-1840866


On 15 Oct 98, at 19:56, Neil Moore-Smith wrote:

> I'll need to disable most services on the gateway, so that no one can
> telnet/ftp etc to it and compromise the system that way. I gather that the
> TIS toolkit allows a further degree of control in this area, so that I can
> log suspicious events.
> 
> My next project will be testing the theory. I've set up a Linux box as
> above and know that it can be done technically, but I need to find out if
> there are security weaknesses or known exploits which blow the paper
> theory wide apart.
> 
> Regards
> 
> Neil


Cheers
Harondel J. Sibble
[EMAIL PROTECTED]
-
To unsubscribe from this list: send the line "unsubscribe linux-net" in
the body of a message to [EMAIL PROTECTED]

Reply via email to