@@ -2,12 +2,12 @@ Preface
22========
33
44The field of network security is roughly as old as networking
5- itself. Conventional wisdom is that the original Internet was built
6- without security features and we have been dealing with the effects of
7- those design decisions ever since. And it is not that the Internet's
8- designers, implementers and architects were unaware of security
9- concerns; many of them were directly involved in developing security
10- technologies in early operating systems. But building a
5+ itself. Conventional wisdom tells us that the original Internet was
6+ built without security features and we have been dealing with the
7+ effects of those design decisions ever since. It is not that the
8+ Internet's designers, implementers and architects were unaware of
9+ security concerns; many of them were directly involved in developing
10+ security technologies in early operating systems. But building a
1111high-performance network that could scale to global proportions and
1212accommodate the heterogeneous set of technologies that existed (and
1313those still to come) presented more than enough challenges. To quote
@@ -29,48 +29,50 @@ the first edition of *Computer Networks: A Systems Approach*
2929in 1995. There is an adage in security circles that no-one should
3030write their own cryptography code because it is so hard to get right,
3131and something similar might be said about trying to write a security
32- book. It is very easy to make mistakes, especially if you are not
33- deeply immersed in the security world and the "look for every possible
32+ book. It is easy to make mistakes, especially if you are not deeply
33+ immersed in the security world and the "look for every possible
3434weakness" mentality. We've had to make a few corrections over the
35- years to our security section in the big textbook.
35+ years to our security section in the big textbook. It is our
36+ perspective on security as viewed in the broader networking context
37+ that we have endeavored to bring to the topic.
3638
3739So why did we decide to write the current book? First, we saw an
3840opportunity to write about security in a way that would make sense to
39- a networking person. Also, we saw an opportunity to take more of a
40- systems approach to the topic. While we always try to
41- take a system-level view in everything we write, it's easy with
42- security to get bogged down in the details of individual components
43- such as cryptographic algorithms without really tackling the systems
44- issues. Cryptography is cool and interesting (in our view at least) but
45- it isn't really the main thing to focus on if you are building secure
46- systems. So while we do explain the basics of cryptography here, it's
47- not the focus. We're aiming to explain how a system that comprises
48- many moving parts, both in the network and the end-system, can be made
49- secure.
41+ a networking person. Also, we wanted to take more of a systems
42+ approach to the topic. While we always try to take a system-level view
43+ in everything we write, it's easy with security to get bogged down in
44+ the details of individual components such as cryptographic algorithms
45+ without really tackling the systems issues. Cryptography is cool and
46+ interesting (in our view at least) but it isn't really the main thing
47+ to focus on if you are building secure systems. So while we do explain
48+ the basics of cryptography here, it's not the focus. We're aiming to
49+ explain how a system that comprises many moving parts, both in the
50+ network and the end-system, can be made secure.
5051
5152This question of focus caused us to examine how much we wanted to say
5253about end-system security. There are entire books to be written on
53- operating system security, processor architecture bugs such as spectre
54- and meltdown , and preventing malware on end-systems. We made a
55- conscious decision to draw a line around the network and focus there,
56- recognizing that, just as TCP is an important network protocol that
57- runs in end-systems, protocols like HTTPS and TLS need to be covered
58- in a book on network security. In fact TLS provides an excellent case
59- study in the system-level issues that come into play when you try to
60- secure traffic that flows between end-systems over the Internet, and
61- we devote an entire chapter to it.
54+ operating system security, processor architecture bugs such as Spectre
55+ and Meltdown , and mitigating or preventing malware such as viruses on
56+ end-systems. We made a conscious decision to draw a line around the
57+ network and focus there, recognizing that, just as TCP is an important
58+ network protocol that runs in end-systems, protocols like HTTPS and
59+ TLS need to be covered in a book on network security. In fact TLS
60+ provides an excellent case study in the system-level issues that come
61+ into play when you try to secure traffic that flows between
62+ end-systems over the Internet, and we devote an entire chapter to it.
6263
6364With the never-ending set of threats and vulnerabilities that need to
6465be dealt with, it is all too easy to start thinking of security as
6566just a collection of point solutions to the problems that have been
6667identified so far. But in fact there is a well-established set of
6768principles that have been identified and written down by pioneers in
68- the field, such as the principle of least privilege, defense in depth,
69- and so on. We have dedicated a chapter to exploring some of the most
70- widely accepted principles, and then we see them applied repeatedly
71- throughout the book. Perimeter firewalls, for example, can be a part of a defense
72- in depth strategy, while *distributed * firewalls have been proposed
73- as a way to apply least privilege to datacenter networks.
69+ the field. The principle of least privilege and defense in depth are
70+ two noteworthy examples. We have dedicated a chapter to exploring some
71+ of the most widely accepted principles, and then we see them applied
72+ repeatedly throughout the book. Perimeter firewalls, for example, can
73+ be a part of a defense in depth strategy, while distributed firewalls
74+ have been proposed as a way to apply least privilege to datacenter
75+ networks.
7476
7577Inevitably there are security technologies and types of attack that we
7678have not covered in this book. What we have tried to do is to give the
@@ -85,10 +87,22 @@ continues to evolve.
8587
8688
8789
90+
91+
92+
93+
94+
95+
96+
97+
98+
8899Acknowledgements
89100----------------
90101
91- Brad Karp
92- Cecilia Testart
93- Motonori Shindo
94- Nick Feamster
102+ Thanks to all the people who provided feedback on our book at various
103+ stages in its development, particulary the following people:
104+
105+ - Brad Karp
106+ - Cecilia Testart
107+ - Motonori Shindo
108+ - Nick Feamster
0 commit comments