C&C Secure Services Project Nathan Dors & Brad Greer, Project Managers Primary Objective: To eliminate the use of clear-text passwords for accessing all.

Slides:



Advertisements
Similar presentations
Introduction Updates & Reminders Telephone Directory Impact of Consolidations on Websites.
Advertisements

Impact of the Recent UC Denver Remote Computing Audit May, 2010.
RedRover Wireless Program Update for TSP Forum. RedRover Topics for the Forum The Basics of RedRover RedRover and Security Recent RedRover Enhancements.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Network Redesign and Palette 2.0. The Mission of GCIS* Provide all of our users optimal access to GCC’s technology resources. *(GCC Information Services:
Nancy Firestone M-Pathways Web Site Retirement Plan May 24, 2006 MAIS Joint Unit Liaison Meeting.
Imaging Services, WebNow and ImageNow are provided by MAIS - Document Imaging Services. Presentation originally developed by Michigan Business Services.
Agenda Survey service transition and retirement Examining your survey needs Evaluating application features Service providers.
University of Michigan Administrative Information Services Upgrade to Citrix Presentation Server 4.0 & Resulting Changes Aaron Landy Michigan Administrative.
University of California, Davis1 Draft Wireless Network Policy Administrative Computing Coordinating Council September 10, 2001.
FileNET to WebNow Conversion University of Michigan Administrative Information Services FileNET to WebNow Conversion Financial Unit Liaisons Mike Easter.
ServiceTrak Meets NLOG/NMAP Jon Finke Rensselaer Polytechnic Institute.
Secure Services A user support perspective Frank J. Reda Director, Distributed Computing Support Rutgers University Computing Services – New Brunswick.
University of Michigan Administrative Information Services Merit Information HRMS Unit Liaison Meeting June 15, 2007.
Bear Access Fall 2006 Dan Bartholomew Lee Brink April 19, 2006.
University of Michigan Administrative Information Services 2006 Merit Information HRMS Unit Liaison Meeting May 19, 2006.
1 Technology Readiness Maryland /2015 Admin Schedule 2 AssessmentOnline/CBT Testing Dates PARCC - PBAMarch 2 – May 8 MSA ScienceApril 13.
Update and Discussions on Technology Initiatives TSAG Meeting 4/11/02.
Chapter 6 Security & Privacy Web servers continue to be attractive target for hacker for variety of reasons –Most easy target –Personal satisfaction –Political.
Activating Pilot Account ( first time users ) Web-based Activation Browse to 1. Click on the link on the lower right that says.
Windows XP Professional Deployment and Support Microsoft IT Shares Its Experiences Published: May 2002 (Revised October 2004)
What is the UF VPN Client, and How Do I Use it? (for Windows XP/7/ 8 Users). Presented by the Course Reserves Unit, George A. Smathers Libraries
© 2005,2006 NeoAccel Inc. Training Access Modes. © 2005,2006 NeoAccel Inc. Agenda 2. Access Terminals 6. Quick Access Terminal Client 3. SSL VPN-Plus.
Linux Basics. What is an Operating System (OS)? An Operating System (OS) is an interface between hardware and user which is responsible for the management.
February 2006Colby College ITS Using FTP. February 2006Colby College ITS Topics FTP Options at Colby For Mac Users For Windows Users.
Brian Arkills Software Engineer, LDAP geek, AD bum, Senior Heckler, and Associate Troublemaking Officer State of Windows Services at the UW.
Telnet/SSH: Connecting to Hosts Internet Technology1.
MIT Libraries’ FileMaker Use Policy as an example local DLC policy.
Course 201 – Administration, Content Inspection and SSL VPN
Computation for Physics 計算物理概論 Introduction to Linux.
National Energy Research Scientific Computing Center (NERSC) Computer Security – The New Threats Stephen Lau NERSC Center Division, LBNL June 24, 2004.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Roshnee Ravikumar Suneetha Tedla Not to be confused with Simple File Transfer Protocol or Secure file Transfer Protocol.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
Web Trnsport – Beta Testing and Implementation TUG Roundtable Discussion Elizabeth Rodgers Info Tech, Inc. October 9, 2007.
Week Nine Publishing your web site. Publishing ??? Cajee’s’s web class Vol. 1 Publishing: Transfer of files from Client to Server “Your” Computer Computer.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
Customer Relationship Management. Content CRM SugarCRM System Requirement Installation Process Configuration.
AE6382 Secure Shell Usually referred to as ssh, the name refers to both a program and a protocol. The program ssh is one of the most useful networking.
Introduction to SSH Making connections donna Bair-Mundy.
The NICE 2000 Web Services Ivan Deloose, Frédéric Hemmer, Alberto Pace, Maciej Sobczac, and others Information Technology Division - CERN.
TRC Mini-Grant 2002 Dell PowerEdge 2500 Server. Project Goals Provide CS students with exposure to Linux (Unix) computing environment in CS courses Provide.
Tools: SSH, SFTP, dunx1, Nvu David Tristano Drexel IRT Dept.
Logging into the linux machines This series of view charts show how to log into the linux machines from the Windows environment. Machine name IP address.
Technology Update TSAG Meeting 6/10/04. Old Voic System New Voic System installed on May 17 Remaining Issues:  Migrating calling trees  Some.
1 Introducing WebNow for Viewing Document Images 2006 User Interchange Dates: Thu Feb 16 1:00 – 2:30 pm Suite 18 Wolverine Tower * Mon Feb 20 8:30 – 10:00.
Remote Access Usages. Remote Desktop Remote desktop technology makes it possible to view another computer's desktop on your computer. This means you can.
Website Design:. Once you have created a website on your hard drive you need to get it up on to the Web. This is called "uploading“ or “publishing” or.
Microsoft ® Official Course Module 6 Managing Software Distribution and Deployment by Using Packages and Programs.
On the Road to Eliminating Cleartext Reusable Passwords HEPNT and HEPiX 06 October 1999 Bob Cowles, SLAC Computer Security Officer
LM/NTLMv1 Retirement Hosted by LSP Services.
JLAB Password Security Ian Bird Jefferson Lab HEPiX-SLAC 6 Oct 1999.
Why Invest in FTP? Shipping Out-of-Band What FTP 7 Provides What FTP 7 Doesn't Provide Demonstrations Other FTP 7 Improvements.
WARCS (Wide Area Remote Control for SPring-8)‏ A. Yamashita and Y.Furukawa SPring-8, Japan Control System Cyber-Security Workshop (CS)2/HEP Oct
Secure Communications ● Cleartext vs. encryption and encapsulation ● Protocols not to use ● SSH – scp/ftp – SSH tunnelling ● VPN.
What’s New in WatchGuard Mobile VPN with IPSec WatchGuard Training.
Lesson 19: Configuring and Managing Updates
Overview of CSE and UW Computing Facilities
Hillsborough Community College
Logging into the linux machines
Aplikasi Jaringan.
Overview of CSE and UW Computing Facilities
How to Install Quicken Software
Overview of CSE and UW Computing Facilities
Overview of CSE and UW Computing Facilities
Help Desk Survey June 2008.
Overview of CSE and UW Computing Facilities
Overview of CSE and UW Computing Facilities
IT Office hours – 1 Data Sharing 101
SLIS Technology Orientation
Presentation transcript:

C&C Secure Services Project Nathan Dors & Brad Greer, Project Managers Primary Objective: To eliminate the use of clear-text passwords for accessing all C&C services

Objectives Eliminate clear-text passwords Promote secure protocols Promote secure methods within C&C Encourage secure methods beyond C&C Ease deployment Minimize support burden

Project Scope “All services” UW requires SSL or Kerberos Homer/Dante/etc. req. SSH or Kerberos FTP req. Kerberos or secure alternative Web (MyUW, etc.) req. weblogin service Keynes & other administrative apps

Motivation Increased use of UW NetID High impact of stolen passwords –Provide foothold for hackers –Take staff resources –Can be embarrassing Domino effect: C&C can help other departments implement similar policy

Shut-off Dates June 13 th –Shut off insecure IMAP/POP –Shut off insecure telnet to Keynes June 20 th –Shut off insecure telnet to UA hosts Autumn 2001 –Shut off insecure FTP to UA hosts and administrative applications

Communication Plan Meetings with computing support staff announcements End-user Web site –Countdown to shut-off dates –How-to guides –Links to UWICK info and software download

Keynes Challenge: June 30 th is biennium close High stakes require addn’l communication –Targeted –Reminders on applications Must identify hardware/software havenots Users must seek help if needed, the sooner, the better

Spring UWICK “Starter Set” includes secure apps –TeraTerm, SFTP for Windows –BetterTelnet and Secure Fetch for Macintosh –Requires Windows 95 or Mac OS 8.1 Installers and instructions for Outlook Express, Netscape, PC-Pine Available early Spring Quarter

Status SSH version 2 now running on UA hosts SSH version 1 running on Keynes Site license for SSH Secure Shell

Schedule 1.Stabilize SSH version 2 2.Deploy end-user Web site 3.Release UWICK 4.Announce 5.Coax and Assist 6.Shut-off insecure services

Questions?