Online Tutorial 24-Jan-03 Online Systems Tutorial 24-Jan-2003 S. Fuess.

Slides:



Advertisements
Similar presentations
Enabling Secure Internet Access with ISA Server
Advertisements

DMZ (De-Militarized Zone)
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
1 Topic 2 – Lesson 4 Packet Filtering Part I. 2 Basic Questions What is packet filtering? What is packet filtering? What elements are inside an IP header?
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Module 10: Troubleshooting Network Access. Overview Troubleshooting Network Access Resources Troubleshooting LAN Authentication Troubleshooting Remote.
Module 5: Configuring Access for Remote Clients and Networks.
Linux Networking TCP/IP stack kernel controls the TCP/IP protocol Ethernet adapter is hooked to the kernel in with the ipconfig command ifconfig sets the.
(Remote Access Security) AAA. 2 Authentication User named "flannery" dials into an access server that is configured with CHAP. The access server will.
Chapter 13 Chapter 13: Managing Internet and Network Interoperability.
Firewall and Proxy Server Director: Dr. Mort Anvari Name: Anan Chen Date: Summer 2000.
1 Chapter Overview Introduction to Windows XP Professional Printing Setting Up Network Printers Connecting to Network Printers Configuring Network Printers.
© 2010 VMware Inc. All rights reserved VMware ESX and ESXi Module 3.
Network Security1 – Chapter 3 – Device Security (B) Security of major devices: How to protect the device against attacks aimed at compromising the device.
Implementing RADIUS AAA Phil & Rick. Content Terms and Concepts Access Control What is AAA? Benefits of AAA What is RADIUS? Microsoft IAS Overview Installation.
11 SYSTEMS ADMINISTRATION AND TERMINAL SERVICES Chapter 12.
Installing Samba Vicki Insixiengmay Jonathan Krieger.
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 10 – Implementing the Cisco Adaptive Security.
4-1 PSe_4Konf.503 EAGLE Getting Started and Configuration.
1 Remote Access July 10, What we’ll cover Remote access to NCAR’s network Remote access to Servers, Routers, Switches.
Advanced Networking for DVRs
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
1 Figure 5-4: Drivers of Performance Requirements: Traffic Volume and Complexity of Filtering Performance Requirements Traffic Volume (Packets per Second)
Linux Filesystem Management
Configuring Routing and Remote Access(RRAS) and Wireless Networking
The Operator Neutral Access At KistaIP. KistaIP ? Is a student dorm with 144 apartments.
© 2005,2006 NeoAccel Inc. Partners Presentation SSL VPN-Plus 2.0 Quick Start Guide.
Connecting to Network. ♦ Overview ► A network connection is required to communicate with other computers when they are in a network. Network interface.
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e
Microsoft Internet Security and Acceleration (ISA) Server 2004 is an advanced packet checking and application-layer firewall, virtual private network.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Chapter 13 – Network Security
INSTALLING MICROSOFT EXCHANGE SERVER 2003 CLUSTERS AND FRONT-END AND BACK ‑ END SERVERS Chapter 4.
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
1. 2 Device management refers to the IDS Sensor's ability to dynamically reconfigure the filters and access control lists (ACL) on a router, switch, and.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
1 The Firewall Menu. 2 Firewall Overview The GD eSeries appliance provides multiple pre-defined firewall components/sections which you can configure uniquely.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
Windows 7 Firewall.
Module 9: Configuring IPsec. Module Overview Overview of IPsec Configuring Connection Security Rules Configuring IPsec NAP Enforcement.
SUSE Linux Enterprise Desktop Administration Chapter 2 Use the Linux Desktop.
Linux+ Guide to Linux Certification Chapter Fifteen Linux Networking.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
User Access to Router Securing Access.
Linux Networking and Security
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 1 ver.2 Module 6 City College.
Topics Network topology Virtual LAN Port scanners and utilities Packet sniffers Weak protocols Practical exercise.
1 Linux Security. 2 Linux is not secure No computer system can ever be "completely secure". –make it increasingly difficult for someone to compromise.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 ver.2 Module 8 City College.
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
Phil Hurvitz Securing UNIX Servers with the Secure.
Security and Firewalls Ref: Keeping Your Site Comfortably Secure: An Introduction to Firewalls John P. Wack and Lisa J. Carnahan NIST Special Publication.
XWN740 X-Windows Configuring and Using Remote Access (Chapter 13: Pages )‏
Module 10: Windows Firewall and Caching Fundamentals.
Linux Operations and Administration
JLAB Password Security Ian Bird Jefferson Lab HEPiX-SLAC 6 Oct 1999.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Module Overview Installing and Configuring a Network Policy Server
Securing the Network Perimeter with ISA 2004
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Lab 7 - Topics Establishing SSH Connection Install SSH Configure SSH
– Chapter 3 – Device Security (B)
OPS235: Configuring a Network Using Virtual Machines – Part 2
Firewalls By conventional definition, a firewall is a partition made
Lock and Key by Linda Wier 2/23/2019.
Presentation transcript:

Online Tutorial 24-Jan-03 Online Systems Tutorial 24-Jan-2003 S. Fuess

Online Tutorial 24-Jan-03 Contents  Online subsystems u Complicated figure, but useful for reference  Node, disk assignments  Accounts  Access controls  Monitoring u Big Brother  Web servers  Control Room consoles

Online Tutorial 24-Jan-03 Online subsystems – a network view d0olcluster d0ola d0olb d0olc JBOD buffer disks: /buffer/bufNNN RAID disks: /home /online /projects etc Control Room d0olNN Control Room d0olNN Monitoring d0olNN Monitoring d0olNN to FCC Level 3 d0lxNNN Level 3 d0lxNNN Controls d0ol NN Controls d0ol NN Ethernet Switch s-d0-dab2cr-online Ethernet Switch s-d0-dab2cr-online Readout d0sbcNNN Readout d0sbcNNN Ethernet Switch s-d0-dab2cr-l3 Ethernet Switch s-d0-dab2cr-l3 ACNET gateway d0olgwNN ACNET gateway d0olgwNN MCH Ethernet Switch s-d0-ol-1 MCH Ethernet Switch s-d0-ol-1 MCH Ethernet Switches s-d0-dabmchN MCH Ethernet Switches s-d0-dabmchN to Offline Router Firewall Router Firewall Terminal Servers t-d0-mchN Terminal Servers t-d0-mchN Subnet Key: Interactive Level 2 Level 3 Event SAM Beams Offline ACNET X-terms ACNET X-terms Ethernet Switch Beams net Ethernet Switch Beams net Level 2 d0l2alphaNN Level 2 d0l2alphaNN MCH Ethernet Switch s-d0-ol-2 MCH Ethernet Switch s-d0-ol-2 Direct Attached Or SAN disks

Online Tutorial 24-Jan-03 Assignments  Node assignments  Disk assignments

Online Tutorial 24-Jan-03 Accounts  Two important factors: u Authorization – that an account is present for a user on a node s Granted to any DO user with need –Access to group account may be sufficient u Authentication – that one can demonstrate knowledge of a password s The only allowed mode of access originating from outside of the Online system is by –Kerberos, for UNIX systems –NTLMv2 for Windows systems eventually – Windows users should be aware of pending changes

Online Tutorial 24-Jan-03 Accounts  On the “interactive” (Control Room, Monitoring, Host) systems u Authorization s Local accounts for system use only s NIS accounts for personal and group users –NIS domain server is d0olcluster –Personal accounts are “locked out” from non-Kerberos authentication u Authentication s Only root account has a local password –Kerberos.k5login access for remote logins Personal Kerberos credentials (i.e. s Group NIS accounts –NIS password only for local logins –Kerberos.k5login access for remote logins Personal Kerberos credentials (i.e. Keytab Kerberos credentials (i.e. s Personal NIS accounts –Kerberos password for local logins (on most nodes) –Kerberos or.k5login access for remote logins If a.k5login exists, then must include own credentials

Online Tutorial 24-Jan-03 Accounts  On the “DAQ” (Readout, Level 2, Level 3) systems u Authorization s Local accounts for system, DAQ, and expert users u Authentication s Only root account has (should have) a local password –Kerberos.k5login access for remote logins Personal Kerberos credentials (i.e. s DAQ local accounts –Kerberos.k5login access for remote logins Personal Kerberos credentials (i.e. Keytab Kerberos credentials (i.e. s Expert user local accounts –Kerberos or.k5login access for remote logins Personal Kerberos credentials (i.e.

Online Tutorial 24-Jan-03 Accounts  On the Controls systems u Authorization s Local accounts for expert users u Authentication s Expert user local accounts –Local password for local login s No Kerberos! Remote logins are not allowed, and blocked by Online router

Online Tutorial 24-Jan-03 Accounts  Some useful commands u To check group account access, e.g. cat /home/d0cap/.k5login u To see if a user has an NIS account, e.g. ypcat passwd | grep fuess u To remotely log in to group account on an Online node, e.g. kinit fuess ssh –l d0cap d0ol04 u To log in to another node from a group account, e.g. as d0run setup d0online d0ssh –l d0cap d0ol04

Online Tutorial 24-Jan-03 Access controls  Essential components of the computer security plan for the Online system are that: u The detector can operate with the Online system completely isolated from the external world s Well-defined isolation points s Can isolate from Offline, FCC, or both s Local versions of essential services –DNS server –KDC s Sufficient space to buffer event data for > 24 hours u Network access to the Online system is tightly controlled s Enforced by router module in Online switch acting as a “firewall” s Policy is “default deny” All this leads to functional limitations and operational confusion…

Online Tutorial 24-Jan-03 Access controls External / Offline Internal / Online Node / Protocol / Port Router access control boundary Access lists are set for each VLAN (subnet) boundary *for each direction of network packets* Format example: [permit|deny] protocol source-host [eq port] destination-host [eq port] “Incoming” examples: permit tcp any any eq 22 permit tcp host odsoem host d0ola eq 1521 “Outgoing” examples: permit ip any any reflect allow-231-out

Online Tutorial 24-Jan-03 Access controls  “Reflective” access u Allowed outgoing packets create a temporary hole in the firewall, allowing return traffic between the specific node/port pairs s Lifetime of 5 minutes s Lifetime reset on each outgoing packet u Normal example: Online access to Offline web page s Web client on dynamically assigned port  port 80 on web server –Opens hole for return traffic s Port 80 from web server  web client port s Each new request “reopens” the hole –Note: automatically updating page will work, as tcp acknowledgement packet will reset timer

Online Tutorial 24-Jan-03 Access controls  “Reflective” access (cont’d) u Catch #1: telnet from Online to Offline s telnet client on dynamically assigned port  port 23 on Offline server –Opens hole for return traffic s Port 23 from Offline server  telnet client port –Allowed *within timeout period* for return traffic s If > 5 minutes inactivity, then initiate activity from Online client side –Works, opens new hole s If > 5 minutes inactivity, but then new activity from Offline server side –Blocked! Hole has expired –For example, output from long-running program on Offline server Solution: there is none

Online Tutorial 24-Jan-03 Access controls  “Reflective” access (cont’d) u Catch #2: telnet from Offline to Online s Offline telnet client on dynamically assigned port  port 23 on Online server –Explicitly allowed in Access Control Lists (ACLs) s Port 23 from Online server  Offline telnet client port –Explicitly allowed in ACLs s Start X application on Online server: Online X client on dynamically assigned port  port 6000 on Offline X server –Works, opens new hole for return traffic s Port 6000 from Offline X server  Online X client port –Allowed *within timeout period* for return traffic s If > 5 minutes inactivity, then initiate activity from Offline (X server) side –Blocked! Hole has expired –For example, attempting input into GUI Solution: tunnel X through an ssh connection

Online Tutorial 24-Jan-03 Access controls  “Reflective” access (cont’d) u Recommendation: ssh from Offline to Online (configured to forward X!) s Offline ssh client on dynamically assigned port  port 22 on Online server –Explicitly allowed in Access Control Lists (ACLs) s Port 22 from Online server  Offline ssh client port –Explicitly allowed in ACLs s Start X application on Online server: Online X client on dynamically assigned port  port 6010 on Online Accepted by Online sshd daemon, forwarded to Offline ssh client port –Through explicitly allowed ssh hole already in use s Received by Offline ssh client, forwarded to Offline port 6000 (X server) s All subsequent X communication tunneled through open ssh hole sshd server port 22 ssh client dynamic port X client GUI X server Display Online Offline

Online Tutorial 24-Jan-03 Access controls  Some useful commands u To see if X forwarding is on by default (UNIX) cat /etc/ssh_config s Should see ForwardX11 yes u To see if X forwarding is on for own account (UNIX) cat ~/.ssh/config s Should see ForwardX11 yes u To check that X is forwarded: Echo $DISPLAY s Should see the *remote* node with a server number 10 or higher

Online Tutorial 24-Jan-03 Monitoring – Big Brother Big Brother main display click buttons for more info

Online Tutorial 24-Jan-03 Monitoring – Big Brother Summary display click button

Online Tutorial 24-Jan-03 Monitoring – Big Brother Big Brother larrd display CPU, memory, disk usage

Online Tutorial 24-Jan-03 Monitoring – Big Brother Big Brother topp display Warning: all BB updates are synchronized, so often report themselves as current major user!

Online Tutorial 24-Jan-03 Monitoring – Big Brother Big Brother disk display Local disk usage See d0ola/b/c for cluster disks

Online Tutorial 24-Jan-03 Monitoring – Big Brother Big Brother procs display

Online Tutorial 24-Jan-03 Web Servers  There are several “internal” and “external” servers u Internal : visible only from within Online system u External : visible from anywhere  One strategy is to mount / display from *same* disks u NFS mounted from a central server u Read-only mount to external servers u Appropriate ACL holes in router u Internal server: s for d0ol01) u External server: s for d0online2)  Other strategy is for server to act as client of internal node u Appropriate ACL holes in router u External server: s

Online Tutorial 24-Jan-03 Control Room consoles  Linux provides, by default, 6 serial and 1 graphical sessions u Graphical session is default u Switch among them with CTRL-ALT-F1 through CTRL-ALT-F7 keys s CTRL-ALT-F7 is the graphical session  X is the windowing system for Linux Ref: u As opposed to Windows, where X has to be run “on top of” the native windowing system u The windowing system is the function of the “X server” s /etc/X11/X –Configured by /etc/X11/XF86config-4 Sets properties of graphics cards and monitors –Manages the DISPLAYs –Restart with CTRL-ALT-BACKSPACE – logs you out! u The X “display manager” runs to manage graphical logins s /usr/X11R6/bin/xdm u The X “window manager” runs upon login; we use fvwm s /usr/X11R6/lib/X11/fvwm2 –Configured to set virtual windows, menus, etc –Restartable “hot” from menu