Podcast
Questions and Answers
What command can be used to see a list of daemons that are running?
What command can be used to see a list of daemons that are running?
Which of the following services is recommended to be disabled on a server for improved security?
Which of the following services is recommended to be disabled on a server for improved security?
What command is used to enable the imap daemon?
What command is used to enable the imap daemon?
What is a secure alternative to Telnet that encrypts credentials during transmission?
What is a secure alternative to Telnet that encrypts credentials during transmission?
Signup and view all the answers
Which email server is considered complex and may lead to misconfigurations for a beginner admin in Linux?
Which email server is considered complex and may lead to misconfigurations for a beginner admin in Linux?
Signup and view all the answers
What is the primary purpose of SSH tunneling?
What is the primary purpose of SSH tunneling?
Signup and view all the answers
Which port should be configured for an SSH client connecting to a POP3 server?
Which port should be configured for an SSH client connecting to a POP3 server?
Signup and view all the answers
What should be done to enhance the security of a server?
What should be done to enhance the security of a server?
Signup and view all the answers
Which practice can improve password security?
Which practice can improve password security?
Signup and view all the answers
How can a Windows server's security be improved?
How can a Windows server's security be improved?
Signup and view all the answers
Which service should typically be disabled to enhance security on a Windows server?
Which service should typically be disabled to enhance security on a Windows server?
Signup and view all the answers
What is a recommended practice for securing Linux servers?
What is a recommended practice for securing Linux servers?
Signup and view all the answers
What is a potential risk of misconfiguring the registry for security?
What is a potential risk of misconfiguring the registry for security?
Signup and view all the answers
What is a primary benefit of using SSH on a virtual server?
What is a primary benefit of using SSH on a virtual server?
Signup and view all the answers
Which authentication method is considered the most secure for a web server?
Which authentication method is considered the most secure for a web server?
Signup and view all the answers
How can you prevent email spoofing in an Exchange environment?
How can you prevent email spoofing in an Exchange environment?
Signup and view all the answers
Which of the following actions can help secure a web server effectively?
Which of the following actions can help secure a web server effectively?
Signup and view all the answers
What can potentially fill a disk when managing email messages?
What can potentially fill a disk when managing email messages?
Signup and view all the answers
What is the function of the Urlscan tool in Exchange 2000?
What is the function of the Urlscan tool in Exchange 2000?
Signup and view all the answers
During user access control, which practice enhances security in server applications?
During user access control, which practice enhances security in server applications?
Signup and view all the answers
What is a characteristic of Digest authentication in a Windows domain?
What is a characteristic of Digest authentication in a Windows domain?
Signup and view all the answers
Which type of web page presents the least vulnerability to attacks?
Which type of web page presents the least vulnerability to attacks?
Signup and view all the answers
What is a common method for an attacker to compromise email servers?
What is a common method for an attacker to compromise email servers?
Signup and view all the answers
Why is it difficult for programmers to prevent software malfunctions?
Why is it difficult for programmers to prevent software malfunctions?
Signup and view all the answers
Which statement best describes PKI?
Which statement best describes PKI?
Signup and view all the answers
How are viruses often spread through email servers?
How are viruses often spread through email servers?
Signup and view all the answers
What role does remote access tool 'rlogin' play in Linux?
What role does remote access tool 'rlogin' play in Linux?
Signup and view all the answers
What is a major security risk associated with retrieving email over the Internet?
What is a major security risk associated with retrieving email over the Internet?
Signup and view all the answers
In what scenarios is PKI commonly applied?
In what scenarios is PKI commonly applied?
Signup and view all the answers
What is the purpose of using a hash function in digital communications?
What is the purpose of using a hash function in digital communications?
Signup and view all the answers
What role does the private key play in the PKI system during transmission?
What role does the private key play in the PKI system during transmission?
Signup and view all the answers
How are SSL connections typically established?
How are SSL connections typically established?
Signup and view all the answers
What is the primary function of a digital certificate in SSL?
What is the primary function of a digital certificate in SSL?
Signup and view all the answers
What happens to the message after the hash function is applied by the sender?
What happens to the message after the hash function is applied by the sender?
Signup and view all the answers
What ensures that both digests must match at the receiver's end?
What ensures that both digests must match at the receiver's end?
Signup and view all the answers
Which of the following is NOT a component of Public Key Infrastructure (PKI)?
Which of the following is NOT a component of Public Key Infrastructure (PKI)?
Signup and view all the answers
In the context of PKI, what does the public key allow others to do?
In the context of PKI, what does the public key allow others to do?
Signup and view all the answers
What is the main function of a firewall in network security?
What is the main function of a firewall in network security?
Signup and view all the answers
Which type of authentication sends the user name and password in clear text?
Which type of authentication sends the user name and password in clear text?
Signup and view all the answers
What type of filtering determines whether to pass a packet based on predefined rules?
What type of filtering determines whether to pass a packet based on predefined rules?
Signup and view all the answers
Which type of filtering allows traffic initialized from within the network to return but restricts outside initiated traffic?
Which type of filtering allows traffic initialized from within the network to return but restricts outside initiated traffic?
Signup and view all the answers
What is a characteristic of Passport authentication?
What is a characteristic of Passport authentication?
Signup and view all the answers
Which command-line utility is used on Linux to filter packets?
Which command-line utility is used on Linux to filter packets?
Signup and view all the answers
What should be restricted for security between an organization's internal network and the internet?
What should be restricted for security between an organization's internal network and the internet?
Signup and view all the answers
Which of the following options represents a method of filtering that involves setting up a separate connection for applications?
Which of the following options represents a method of filtering that involves setting up a separate connection for applications?
Signup and view all the answers
Study Notes
Web Server Administration - Chapter 10
- This chapter focuses on securing web environments.
- Identifying threats and vulnerabilities is crucial.
- Securing data transmission is a critical security measure.
- Securing the operating system is fundamental to website security.
- Protecting server applications is essential for prevention.
- Authenticating web users is a key part of access control.
- Employing firewalls, proxy servers, and intrusion detection software are vital security measures.
Identifying Threats and Vulnerabilities
- Security's trade-off with ease of use, availability, and user-friendliness.
- Internet threats are the primary attack vector.
- Hacker motivations include data theft (credit card numbers, user credentials, etc.).
- Penetrating and vandalizing systems are hacking goals.
- Exploiting system vulnerabilities is a common attack method.
- Information is often gathered while it's transmitted.
- Operating system flaws frequently aid hackers.
Examining TCP/IP
- TCP/IP is a vulnerable system due to its design emphasis on ease of communication over security.
- Complicated TCP/IP structures are leveraged by malicious code for injection and subsequent difficulty in detection.
- The IP header's source and destination addresses, flags, fragmentation offset, total length, and protocol (TCP, UDP, ICMP) are crucial for security analysis.
TCP Delivering Data to Applications
- IP (Internet Protocol) routes the packet and provides IP address data to the header.
- TCP (Transmission Control Protocol) delivers data to applications utilizing ports.
- Data segmentation, and the connection states (like SYN, ACK, FIN) are indicated by header fields (pg. 498).
- TCP establishes a connection as shown in a step-by-step illustration (Figure 10-2, provided in the text).
TCP Flood Attacks
- SYN flood is an attack type where the server is overwhelmed by malformed SYN requests and rendered unresponsive.
- UDP is a non-reliable protocol.
- UDP attacks are difficult to prevent.
- UDP is a point of interest for bad actors.
- ICMP (Internet Control Message Protocol) is a network layer protocol that responds to ping requests, and an IP scan can use ICMP (Page 499).
DNS Vulnerabilities
- BIND 8 (a common DNS implementation) has inherent vulnerabilities facilitating unauthorized root user access, and IP address modification.
- BIND 9 is a more secure current version, addressing remote access-based denial-of-service issues.
Operating System Vulnerabilities
- Operating systems' complexity results in more opportunities for attacks.
- Inattentive administrators, and users running insecure applications, may lead to compromise.
- Attacks such as buffer overruns permit attackers to control the computer.
- Linux systems offer remote access tools (rlogin), and resource access (mapping) vulnerability potential, which can differ from Windows NT.
Vulnerabilities in Web Servers
- Static HTML pages present minimal security risk.
- Dynamic web pages (programming environments, forms,databases) offer more opportunities for exploits.
- Programmers typically focus on functionality over security.
- Prevention methods are generally more difficult than building functionality, as there are more ways to introduce malfunctions than to create error-free solutions.
- E-commerce system vulnerabilities are given as an example (see page 501).
Vulnerabilities of E-mail Servers
- Email servers, by design, frequently accept data from anonymous sources increasing vulnerability.
- Denial-of-service (DoS) attacks can be realized by overwhelming the server with a large number of messages.
- Viruses can spread through email, infecting recipients' computers when they open contaminated messages.
- Emails often send user credentials, this information can be captured by attackers allowing them to intercept emails, redirect or delete messages.
PKI (Public Key Infrastructure)
- PKI is an asymmetric cryptography-based security system for digital communication over insecure channels.
- Its usual applications include e-commerce and e-governance.
- Authenticates senders, and protects communication integrity.
- Key pairs (private and public) are crucial in PKI.
- A trusted third party (certification authority) validates entities.
- PKI's operation involves hashing, encryption, and decryption using the sender's private key and the recipient's public key (demonstrated diagrammatically in Figure 13).
- The sender encrypts a message digest with their private key and sends it to the receiver.
- The receiver uses the sender's public key to decrypt the message and compare it to its expected digest.
Securing Data Transmission
- Encrypting data is crucial on networks accessible by outside parties.
- SSL (Secure Sockets Layer) is a widely used method for encrypting data between browsers and web servers.
- Secure Shell (SSH) is a secure replacement for Telnet and FTP.
- SSL requires a digital certificate (issued by a Certification Authority), a digital certificate from a verified organization; the public key from the certification authority is used.
Establishing an SSL Connection
- TCP connection is established.
- Server supplies client with certificate & public key.
- Client verification, encryption level (e.g., 128-bit or 40-bit) negotiation.
- The client creates a session key
- Client encrypts the session key with the server's public key and sends it along with data.
- IIS and Exchange 2000 products are SSL-enabled.
- Apache is designed to work with SSL.
Using SSH for Tunneling
- SSH provides secure logins by replacing less secure protocols (like Telnet and POP3).
- SSH simplifies configuration of tunneling, avoiding modifications to server settings.
- SSH tunneling permits secure communication between the client and the POP3 server (port 110).
Securing the Operating System
- Configure servers for specific tasks (mail, databases, web servers).
- Minimize the number of user accounts.
- Disable unnecessary services and applications.
- Restrict access to the web server to only the browser.
- Ensure strong passwords, using a mix of uppercase, lowercase, numbers, and symbols.
- Maintain a balance between security and ease of use in implementation.
Securing Windows
- Rename the administrator account.
- (Disable unnecessary services like Alerter, Computer Browser, DHCP client, DNS client, Messenger, Server.)
Securing Linux
- Make sure to only run the required daemons.
- Daemons are generally disabled by default.
- Use tools like 'netstat -I' to list running daemons.
- Use 'chkconfig' to manage daemon startup/shutdown.
- Disable services like 'Printer Service', 'NFS', etc. (potentially accessible services, see page 21.)
- Keep software updated to fix vulnerabilities.
Securing Server Applications - FTP and Telnet
- FTP and Telnet send credentials in plain text, making them susceptible.
- Use SSH for secure logins and transferring FTP files.
- SSH uses the same OS username (e.g., Linux) for secure logins.
Securing Server Applications - Email
- Email servers configured for general access are relatively more vulnerable.
- Use safer alternatives like Qmail and properly configure email servers.
- Limit email message size and use virus protection to prevent infections.
- Spoofing emails can be prevented by setting up procedures to mitigate malicious actions.
Securing the Web Server
- Keep only absolutely necessary features enabled.
- Ensure programmers understand security best practices.
- Use SSL to protect sensitive information (e.g., credit card numbers).
- Use a review of third-party software to mitigate known vulnerabilities.
- Secure server communication using SSH on a virtual server, limit user access.
Securing the Web Server - Microsoft Exchange 2000
- Identify and remove unused virtual directories.
- Use tools like 'Urlscan' to restrict harmful requests
- Use 'Lockdown' for security policy adjustment.
Configuring User Authentication
- Authentication on the web server can be limited to certain directories or the whole site.
- Methods include Windows integrated authentication, Digest authentication.
- Basic Authentication is an older method that uses clear text to provide credentials.
- Windows integrated authentication is more secure, using encryption.
- Passport authentication is a Microsoft-centric centralized authentication system.
Using a Firewall
- Firewalls establish security policy boundaries between networks.
- Firewalls limit access to internal systems from external networks, specifically the internet to internal computers.
- Firewall restrictions are implemented on web servers, email servers, and other related servers.
- Access is allowed from your internal network to the internet.
Types of Filtering in Firewalls
- Packet filtering examines individual packets based on pre-defined rules to permit access.
- Circuit-level filtering oversees complete communication sessions, not just individual packets.
- Application-level filtering sets up separate connections to isolate applications.
A Packet-Filtering Firewall
- Packet filtering firewalls maintain lists of acceptable and unacceptable packet rules.
- The Linux
iptables
utility defines packet filtering rules. - A best practice is to deny all inbound and outbound traffic by default.
- Handling TCP, UDP, or ICMP packets can be controlled.
Summary
- User authentication manages server directory access.
- Firewalls control network access policies.
- Proxy servers forward content requests.
- Intrusion detection software recognizes but may not prevent attacks.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge on server security practices for Linux and Windows environments. This quiz covers key concepts such as daemons, secure communication, and best practices for improving server security. It's essential for system administrators to understand these topics to maintain a secure system.