18.12.2012 Views

O'Reilly - Practical UNIX & Internet Sec... 7015KB

O'Reilly - Practical UNIX & Internet Sec... 7015KB

O'Reilly - Practical UNIX & Internet Sec... 7015KB

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

[Chapter 18] 18.7 Summary<br />

18.7 Summary<br />

Chapter 18<br />

WWW <strong>Sec</strong>urity<br />

One of the principal goals of good security management is to prevent the disclosure of privileged<br />

information. Running a WWW service implies providing information, quickly and in volume. These two<br />

ideas pose a serious conflict, especially given how recently these services and software have appeared<br />

and how rapidly they are evolving. We have no way of anticipating all the failure modes and problems<br />

these services may bring.<br />

We strongly recommend that you consider running an WWW service on a stripped-down machine that<br />

has been especially designated for that purpose. Put the machine outside your firewall, and let the world<br />

have access to it ... and only to it.<br />

18.6 Dependence on Third<br />

Parties<br />

19. RPC, NIS, NIS+, and<br />

Kerberos<br />

[ Library Home | DNS & BIND | TCP/IP | sendmail | sendmail Reference | Firewalls | <strong>Practical</strong> <strong>Sec</strong>urity ]<br />

file:///C|/Oreilly Unix etc/<strong>O'Reilly</strong> Reference Library/networking/puis/ch18_07.htm [2002-04-12 10:45:50]

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!