An introductory chapter offers some security truisms, hints on choosing a security policy, broad strategies for securing networks, and a note on ethics. This is followed by a security review of Internet protocols, from IP and routing and addressing, through FTP, the network time protocol, and others to the web. (A basic familiarity with these protocols is assumed, along with some Unix experience and a little cryptography, though an appendix offers a basic introduction to the last.)
Next comes a survey of the different classes of attacks — social engineering, bugs and back-doors, denial of service attacks, viruses and worms, protocol failures, etc. — and a look at some of the tools and techniques of the hacker.
There's a survey of authentication systems: one-time passwords, challenge-response passwords, smart cards, biometrics, RADIUS, SASL and PKI. And there are hints on how to secure particular Unix services — inetd, apache, POP, named, samba, and so forth — in which chroot jails feature prominently.
An overview of the different kinds of firewalls and filtering services is followed by some detailed tips on writing firewall rulesets, with an example using ipchains under Linux. And there's a chapter on VPNs, with a focus on minimising the security risks with employees working from home.
Of course many organisations are so big that perimeter defence is less effective. So there's also an overview of network layout issues, host security, and intrusion detection.
The first edition's case study "An Evening with Berferd", an example of keeping an intruder in a controlled "jail", is still there. And there's a new case study "The Taking of Clark", illustrating forensic analysis after a break-in.
Rather than trying to be systematic, Firewalls and Internet Security is more of a personal account, describing some of the things the authors have done and some of the things they've found useful. A page on securing Samba, for example, describes a limited — no printer support! — experimental system for Windows users on a home network: each user is directed to a different TCP port, on which runs a jailed smbd process specific to that user. The approach also reflects the authors' backgrounds — as they mention themselves in their introduction, they have an academic computer science perspective and are heavily Unix-oriented.
It's not a reference, and it may not one of the first books an Internet security professional would put on their shelves, but the experts may find some new ideas or approaches in Firewalls and Internet Security. And it's not an introductory book either, but for those of us on the edge of the field — computer science students and Unix system administrators in particular — it's an entertaining, chatty, and informative read.