Presentation is loading. Please wait.

Presentation is loading. Please wait.

Internet Services.  Basically, an Internet Service can be defined as any service that can be accessed through TCP/IP based networks, whether an internal.

Similar presentations


Presentation on theme: "Internet Services.  Basically, an Internet Service can be defined as any service that can be accessed through TCP/IP based networks, whether an internal."— Presentation transcript:

1 Internet Services

2  Basically, an Internet Service can be defined as any service that can be accessed through TCP/IP based networks, whether an internal network (Intranet) or external network (Internet).  Actually, TCP and IP are two of the protocols that are included in a group of protocols sometimes known as the Internet protocols. Common services are Telnet, FTP, SMTP, HTTP, ICMP, ARP, DNS, ssh, scp, sftp, and others. WHAT IS AN INTERNET SERVICE?

3  There are common services, such as telnet and ftp.  These services send all of their traffic in plain text, including passwords  Plain text traffic is extremely easy to eavesdrop on by anyone between the traffic’s source and destination. Since the Internet has exploded in popularity, running insecure services such as these is not a good idea. That’s why secure replacements have been developed.  These replacements provide stronger authentication controls and encrypt all their traffic to keep your data safe. You should always run secure services instead of insecure services. Secure Services

4  Secure Shell, also known as ssh, is a secure telnet replacement that encrypts all traffic, including passwords, using a public/private encryption key exchange protocol.  It provides the same functionality of telnet(insecure), plus other useful functions, such as traffic tunneling.  [root#]ssh john@example.com ssh

5  SSH asks if you want to accept and trust the host key being sent to you. This is asked only once when you log in into the machine for the very first time.  After this first login whenever ssh is done, system asks for password and a regular terminal in returned.  SSH tunnels almost any protocol through it.

6  This example creates tunnel for HTTP. This will forward port 80 of your localhost to port 80 if www.example.com www.example.com  [root#]ssh –f –N –q –L 80:localhost:80 username@www.example.com

7  Secure Copy, also known as scp, is part of the ssh package.  scp helps to copy files securely from any machine to any other linux machine provided ssh daemon is running.  The syntax of scp :  scp user@host:file1 user@host:file2user@host:file1 user@host:file2 scp

8  For eg :  [root#] scp user1@bscit:demofile user2@bscit:newfile  user1@bscit password :  user2@bscit password :

9  Secure File Transfer Program, also known as sftp, is an FTP client that performs all its functions over ssh.  The syntax for sftp :  sftp user@host:file fileuser@host:file file  For eg:  [root#] sftp user1@bscit:tyitfile newfile  Connecting to bscit..  user1@bscit password : sftp

10  These are insecure services that should not be used, since they trust that the network is absolutely secure. Their secure equivalents should be used instead. Less secure services

11  telnet is a protocol and application that enables someone to have access to a virtual terminal on a remote host. It resembles text-based console access on a Unix machine.  Telnet is an application that’s available almost everywhere.  Because of this distribution, most beginning Unix users use Telnet exclusively to communicate with other Unix and NT machines. telnet

12  SSH works almost similar to telnet but with encrypted traffic and passwords.  [root#]telnet example.com

13  ftp is a file transfer protocol that runs over ports 20 and 21.  Once you have successfully logged on to an ftp server, you can type help for a list of available commands.  Two important commands to remember are put to move a file from your machine to the remote machine, and get to pull a file from the remote server to your machine.  To send multiple files you can use mput, and to retrieve multiple files you can use mget. ftp

14  For eg:  ftp:> get file1  ftp:> put file2  ftp:> mget file1 file2 file3  ftp:> mput file1 file2 file3

15  rsync is an unencrypted file transfer program. It includes the feature of allowing to find the differences between two sets of files on two machines to be transferred across the network.  It listens to port 873. rsync

16  rlogin is a remote login program that connects your terminal to a remote machine’s terminal.  rlogin is an insecure protocol, because it sends all information, including passwords, in plain-text.  It also enables an mutual trust relationship to exist between machines.  Syntax :  [root#]rlogin remotehostname  Eg :  [root#] rlogin redhat rlogin

17  rsh is an unencrypted mechanism to execute commands on remote hosts.  rsh’s syntax is :  [root#]rsh remotehostname remotecommand  Eg :  [root#] rsh redhathost shutdown rsh

18  finger enables users on remote systems to look up information about users on another system.  finger displays information as user’s login name, real name, terminal name, idle time, login time, home directory, shell etc.  finger should be disabled outside local network as user information could be accessed easily. finger

19  finger daemon listens on port 79.  Syntax :  [root#] finger username@hostname  [root#] finger john@example.com

20  Talk and ntalk are real-time chat protocols. The talk server runs on port 517 and the ntalk server runs on port 518.  To send someone else a talk request, type talk or ntalk username@hostname.  If their server is running a talk or ntalk daemon and they are logged in, they will see a message inviting them to chat with you. Talk and ntalk

21  Syntax :  [root#]talk username@hostname  [root#]ntalk username@hostname  Eg:  [root#]talk john@example.com  [root#]ntalk john@example.com

22  Following protocols are used :  1. http  The most common Web server used on Linux is Apache. Apache is easily configurable, and its configuration files live in /etc/httpd/conf/.  While Apache can be set to listen to many different network ports, the most common port it listens on is port 80. Linux as Server

23  To start httpd use command :  [root#] service httpd start  To enable it at boot :  [root#] chkconfig httpd ON

24  2. sshd  Its global system configuration files are in /etc/ssh, and users’ ssh configuration files are in $HOME/.ssh/.  The ssh server listens on port 22.  If the port is blocked by firewall and not available then ssh can be made to run on another port also.

25  To start sshd use command :  [root#] service sshd start  To enable it at boot :  [root#] chkconfig sshd ON

26  3. ftpd  The FTP daemon uses ports 20 and 21 to listen for and initiate FTP requests.  Its configuration files ftpaccess, ftpconversions, ftpgroups, ftphosts, and ftpusers, are located in the /etc directory.

27  4. dns  The Domain Name Service (DNS), which maps IP addresses to hostnames.  It runs on port 53.  Its configuration file is named.conf in the /etc directory.

28  To start dns use command :  [root#] service named start  To enable it at boot :  [root#] chkconfig named ON

29  inetd is called an Internet superserver. It is launched at boot time, and listens for connections on network sockets.  When inetd starts up, it checks the inetd.conf file to see what services should be running. It then reads the /etc/services file to see what ports those services should be running on. Inetd Server

30  It is an extended version of inetd that adds more security and features.  In has new features for system administrators.  It starts at boot time and listen for connections to come in from different ports in its configuration file.  Once xientd receives connection request, then xientd spawns a new server and keeps listening for a new connection on a different port. Xinetd Server

31  In xinetd anyone can start network service whereas in inetd only root can start the network service.  Xientd has inbuilt firewall capability as it provides access control on all services based on various criteria, such as remote host address, access time, remote hostname etc.

32  Xientd kills servers that are not in the configuration file thereby preventing configuration’s access criteria.  Xinetd also has log storage.  Configuration file for xientd is /etc/xientd.conf

33  defaults  {  instances=60  log_type=syslog  log_on_success=Host PID  log_on_failure = Host PID  }  includedir /etc/xientd.d /etc/xientd.conf

34  Start the service :  [root#] service xientd start  After Any changes in file :  [root#] service xientd restart

35  ntalk-chat server runs on port 518  rsync:remote ftp  telnet: telnet server  finger:user information lookup program  kshell:restricts user access to shell  rlogin:remote login trusted  rsh:remote shell to connect to remote host Xinetd started services

36  talk:chat server runs on port 517  klogin:rlogin server over kerboros  chargen:generates random charater on TCP  time:gives u time  chargen-udp : generates random charater on UDP  time-upd : gives time on UDP  comsat : sends notification of new mail

37  sendmail : mail server  apache : web server  sshd : ssh server  qmail : mail server  postfix : mail server  named : DNS server  xfs : X font server  portmap : maps RPC services to port  rpc.quotad : serves quota information  rpc.mountd : NFS mount server  squid : web proxy server  oracle : database server Stand-Alone Services

38  Linux provides a few different mechanisms for system security. One of these mechanisms is Linux’s firewall packages.  iptables is Fedora’s and Red Hat’s built-in firewall administration tool.  iptables also enables personal firewall on Linux machine. Linux Firewall

39  Commands to manage Iptables are :  [root#] service iptables start  [root#] service iptables stop  On Boot :  [root#] chkconfig iptables ON  [root#] chkconfig iptables OFF


Download ppt "Internet Services.  Basically, an Internet Service can be defined as any service that can be accessed through TCP/IP based networks, whether an internal."

Similar presentations


Ads by Google