Mac" Security Bible
Total Page:16
File Type:pdf, Size:1020Kb
Mac" Security Bible Joe Kissell WILEY Wiley Publishing, Inc. чСчйш&§аШ!а Part I: Mac Security Basics 1 Chapter 1: Mac Security Overview 3 Mac Security: Myth versus Fact 3 Is it true that Macs don't get viruses? 4 Can Macs spread viruses to Windows computers? 5 Is web browsing safe on a Mac? 5 Can someone eavesdrop on my network , if I use a Mac? 6 Are Mac servers more secure than Windows servers? 6 What's the biggest threat to Mac security? 7 Major Mac OS X Security Features 7 Open-source infrastructure 8 Access permissions 8 Keychain 8 Firewalls 8 Encrypted disk images 8 FileVault 9 VPN client 9 Firmware password protection 9 Download tagging 9 Application signing 9 Privacy versus Security 10 Weighing Convenience against Security 11 Understanding Your Risks 14 The Theory and Practice of Best Practices 15 Seven Things You Should Do Right Now 16 Update your software 16 Setup a standard user account 17 Change your keychain password 19 Turn off all unneeded sharing features 20 Turn on your firewall 22 Switch from WEP or nothing to WPA 23 Back up your Mac 25 Summary 26 xix Contents Chapter 2: Securing Your Mac against Theft 27 Security Cables and Locks 27 Laptop Lockers 29 Other Theft Deterrents 29 Laptop alarms (hardware) 29 Laptop alarms (software) 29 Login banners 30 Markinga Mac for Recovery 32 Tracking labels 32 Operation Identification 33 Tracking and Recovering Stolen Macs 33 Using tracking software and services 34 Using command-line software to track a Mac 38 Tracking a Mac with Back to My Mac 43 Summary 48 Chapter 3: Working with User Accounts 49 How Accounts Affect Security 49 The notion of accounts 49 What a Mac OS X account is 50 How accounts work 51 The principle of least privilege 51 Understanding POSIX Permissions 52 Read, write, and execute 52 User, group, and other 53 Viewing file permissions 53 Octal permissions 54 Modifying file permissions 55 Modifying file ownership 56 Using the Get Info window 56 Using the umask 58 The other permission bits 61 Types of Accounts 62 Administrator accounts 62 Standard accounts 64 Managed accounts with parental controls 64 Guest account 65 Sharing Only accounts 66 The root account 67 System accounts 68 Groups 68 Configuring an Account 69 Creating a new user 69 Setting user options 71 Creating groups 73 Adjusting Login Options 75 XX Contents Using Parental Controls 77 Using the Sudo Command 83 Howsudo works 84 Sudo syntax 84 Sudo limitations and risks 85 Modifying the sudoers file 86 Using Access Control Lists 87 ' What's an access control list? 87 Configuring access control lists 87 Access control list options 88 Summary 91 Chapter 4: Configuring Basic Security Settings 93 General Settings 93 Requiring a password to wake a computer 93 Disabling automatic login 95 Locking System Preferences 96 Setting automatic logout 98 Secure virtual memory 99 Location Services settings 100 Infrared receiver settings 100 FileVault 102 How File Vault works 102 Setting up FileVault 103 Firewall 105 MobileMe Settings 108 Account settings 109 Sync settings 110 iDisk settings Ill Back to My Mac settings 112 Energy Saver Settings 114 Setting computer, display, and disk sleep 115 Waking for network access 116 Spotlight Settings 118 AirPort Preferences 119 Assistive Device Access 121 Software Update 122 Terminal 125 Summary 125 Chapter 5: The Mac OS X Keychain 127 How Keychains Work 127 What Keychains Can Store 130 Passwords 130 Public keys, private keys, and certificates 130 Secure notes 131 xxi Contents Understanding Keychain Alerts 131 Request to use your keychain 132 Permission to use an existing item 132 Alert that an application has changed 133 Safari and the Keychain 134 Using Keychain Access 137 Customizing the view 137 Managing keychain items 139 Managing keychains 141 Using secure notes 144 Working with certificates 145 Repairing damaged keychains 149 Resetting a keychain 151 Summary 152 Chapter 6: Working with Passwords 153 Understanding Passwords 153 What makes a password secure? 154 Exploring password threats 155 Identification versus security 158 Multifactor authentication 159 Managing your passwords 160 The Varieties of Mac OS X Passwords 161 User account passwords 161 File Vault master password 162 The root password 163 Keychain passwords 163 Firmware passwords 163 Wi-Fi passwords 163 Disk image passwords 164 Apple ID password 165 Network passwords 165 Creating Good Passwords 165 Avoiding easily guessed passwords 166 Password length and complexity 166 Password mnemonics 167 Using patterns safely 168 Reusing passwords 169 Using Password Assistant 170 Using Third-Party Password Utilities 172 Password generators 172 Password managers 173 Resetting an Administrator's Password 176 Using the original administrator account 176 Using a Mac OS X Install DVD 176 Using a Firmware Password 177 xxii Contents Using Smart Cards, Tokens, and Biometrie Authentication Devices 180 Smart cards and tokens 180 One-time password tokens 181 Biometrie devices 181 Summary 181 Chapter 7: Securely Sharing System Resources 183 Using Shared System Resources Wisely 183 DVD or CD Sharing 184 Screen Sharing 186 File Sharing 188 Activating File Sharing 188 Choosing file-sharing protocols 190 Changing which items are shared 191 Granting access to users and groups 192 Printer Sharing 193 Scanner Sharing 195 Web Sharing 198 Activating Web Sharing 198 Publishing web pages 198 Making your web server visible to the outside world 199 Web-sharing negatives 201 Remote Login 201 Remote Management 203 Remote Apple Events 206 Xgrid Sharing 208 Internet Sharing 210 Bluetooth Sharing 213 Sharing files via Bluetooth 214 Setting up Bluetooth Sharing 215 Sharing an Internet connection via Bluetooth 218 Summary 219 Chapter 8: Backing Up Your Mac 221 Backup Basics 221 What to back up 222 Which media to use 223 How often to backup 223 Versioned backups 224 Bootable duplicates 224 Offsite backups 225 Choosing Backup Software 225 How many computers are you backing up? 226 What type(s) of backup do you need? 227 What media will you use? 227 How should data be restored? 227 What other special features do you need? 228 Bottom-line recommendations 229 Using Time Machine 229 How Time Machine works 230 Choosing hardware for Time Machine 231 Configuring Time Machine 232 Managing Time Machine behavior 234 Restoring data from Time Machine 235 Creating Bootable Duplicates 238 What's a bootable duplicate? 238 Using SuperDuper! 239 Using Carbon Copy Cloner 242 Other options 245 Starting up from a bootable duplicate 246 Using Internet Backup Services 247 Internet backup basics 247 Choosing a provider 248 Managing Backup Media 250 Offsite backups 250 Keeping media comfortable 251 Testing and recopying media 251 RAID and Data Redundancy 251 Mirrored RAIDs and backup 252 Do you need a RAID? 252 Choosing a RAID system 253 Configuring a RAID with Disk Utility 254 Summary 256 Part II: Protecting Your Privacy 257 Chapter 9: Securing Email, Chat, and Voice over IP 259 Understanding Email Security 259 Using secure authentication 261 Using SSL for sending and receiving email 262 Signingemail messages 262 Encrypting email messages 263 Encrypting data on your disk 263 Logging In Securely 263 Secure logins in Mail 264 Secure logins in Entourage 265 Secure logins in Thunderbird 266 Using SSL for Incoming and Outgoing Mail 266 How SSL works for email 267 Configuring SSL for incoming mail 267 Configuring SSL for outgoing mail 271 Contents Using SSL for webmail 274 Gmail 275 Hotmail 275 MobileMe 275 Yahoo! Mail 275 Digitally Signing and Encrypting Email 276 When and why to encrypt your email 277 Using S/MIME in Apple Mail 278 Using PGP or GPG for encrypted email 286 Stopping Spam 290 Understanding spammers 290 Learning basic spam-filtering concepts 292 Configuring your email client's spam filter 295 Using third-party spam filters 301 Other spam-filtering strategies 302 Examining Message Headers and Source 303 Message headers 304 Message source 307 iChat Security 308 Adjusting iChat privacy settings 308 Using encryption for iChat 310 Securing Instant Messaging and Voice over IP with Third-Party Software 311 Skype 312 Zfone 312 Adium 313 Psi 313 Summary 313 Chapter 10: Browsing the Web Securely 315 The Challenges of Secure Browsing 316 Privacy 316 Fraud 317 Malware 318 Inappropriate content 318 Annoyances 319 Using SSL Encryption 320 Checkinga certificate 322 Responding to certificate warnings 322 Keeping Form Information Safe 325 Using your browser's form-filling feature 326 Third-party web form password tools 331 Protecting Yourself from Harmful Downloads 334 Protecting Yourself from Phishing Schemes 338 Checking source URLs 338 Using Extended Validation certificates 339 XXV Contents Using a password manager to fill in data 340 Using third-party anti-phishing software 340 Covering Your Browsing Tracks 340 The browsing records your Mac stores 341 Prevention versus cleanup 342 Managing cookies 343 Using Safari's Private Browsing feature 351 Using Safari's data removal features 352 Handling private data with Firefox 354 Using third-party web privacy software 356 Cleaning up other browsing traces 360 Browsing Anonymously 363 What information you normally reveal 364 Hiding your IP address by using anonymous proxy servers 365 Hiding your IP address by using onion routing 369 Masking other browser details 370 Blocking Ads, Pop-up Windows, and Flash 371 Using browser settings 372 Using Hostal 374 Using other ad-blocking software 375 Blocking Other Undesirable Content 377 Summary 378 Chapter 11: Securely Accessing Other Computers 379 Transferring Files 379 FTP, SCP, SFTP,