BKFARROW.RVW 930816 Addison-Wesley Publishing Co. 1 Jacob Way Reading, MA 01867-9984 800-527-5210 617-944-3700 5851 Guion Road Indianapolis, IN 46254 800-447-2226 "Unix System Security", Farrow, 1991, 0-201-57030-0, U$22.95/C$29.95 rik@uworld.com While this book is not exhaustive, it does, very definitely, give the basic information that a UNIX system administrator needs to know. I stress basic information: those who wish to provide greater levels of security may wish to look at other sources in addition to the material contained herein. On the other hand, the suggestions in Farrow's work, if followed, would greatly increase the security of the majority of UNIX sites. "UNIX System Security" is well-organized. The chapters contain logical groupings of information. As noted above, some material is not covered in this book, but that is not to say that it has been "left out" as such. There really isn't a great need for most system administrators to know the gory technical details of DES or kerberos. Therefore, those details have been left for other sources to provide. In addition to the good choice of material, the text is very easily readable, and the charts and figures, often rather confusing in many such works, are clear and supportive of the text. Chapter one is an "Introduction to UNIX System Security", although it really is more generic than that. Its presentation of the concept of security is less "textbook" than other works, and more practical. One section, in fact, is entitled, "How Much Security is Enough?", a question too seldom asked. Chapter two is where UNIX starts to come in, with the basics of system security. It is presented as the material that all users of the system should know, and it is, but this division is also quite logical in terms of the complexity and importance of the material. The basics of password choice, file permissions, and some other related materials are covered here. The items of interest primarily to the system administrator comprise chapter three. Administration and accounting, system files and directories, and user and group privileges are dealt with. Chapter four continues with system level duties, but related to communications and network topics. Modems, UUCP and network functions are examined. Some may feel the scope is too limited at this point, but a number of important issues are covered. This chapter might not be of interest to all UNIX sysadmins: on the other hand, those running major online systems might want to go beyond what is given here. "Stalking the Wily Cracker" deals with detection of an intrusion. Again, the contents are quite practical, even to inclusion of some discussion of the rules of evidence. The chapter also looks briefly at viral programs. Although Farrow's experience is more limited here, he has a very realistic perspective on viri in the UNIX environment: not yet, but very possible. Chapter six looks at the future: more realistically it looks at some recent and current developments. The book concludes with appendices giving sample programs supporting various aspects of security. The bibliography included is one of the only disappointments here; it is quite brief, and may not provide direction for further study in particular areas. "UNIX System Security" may not be the final word on the subject. It is, however, quite satisfactory for most systems and purposes. In addition, it may be more "accessible" for the average UNIX sysadmin today. (It will certainly be more accessible to French and German readers: the book has been translated into those two languages.) copyright Robert M. Slade, 1993 BKFARROW.RVW 930816 ====================== DECUS Canada Communications, Desktop, Education and Security group newsletters Editor and/or reviewer ROBERTS@decus.ca, RSlade@sfu.ca, Rob Slade at 1:153/733 Author "Robert Slade's Guide to Computer Viruses" (Oct. '94) Springer-Verlag