Networking & Security
Download
Report
Transcript Networking & Security
Linux:
Networking & Security
Feng Gao
104504
2000-08-31
Objective (1)
Give an overview of the networking capacities of
the Linux OS
Networking protocols
Capacity for file sharing & printing
Capacity for Internet/Intranet services
Capacity for remote execution of application
Capacity for acting as network interconnection
Capacity for network management
Objective (2)
Talk about some security tools for Linux network
Monitoring tools
Network services
System integrity
Management & limitation
Brief Introduction of Linux OS
A Unix like operating system
Completely open source code
no royalty or licensing fees
the source code can be modified to fit users’ needs
Fast, powerful, and extremely stable
Cross hardware and platform
Tons of application software
Created by and for the Internet
Why Linux is a choice for network
Cheap & portable
Ideal for many small to medium businesses
Open source code
Tons of applications are freely available
Modifiable whenever/wherever needed
Robustness
Who uses Linux?
Besides ISPs and other Web companies, the following
companies had some Linux servers installed in 1997.
Ford Motor Co.
NASA
Disney
General Electric
IRS
UPS
NASDAQ
Boeing
many leading US
Universities
Used for gateways, routers, file and print servers,
database servers, computation servers, development
servers, CAD, besides being used as Web servers.
Part I
Linux Networking
Network protocols
supported by Linux
TCP/IP
IPv6 ( IP version 6 )
IPX/SPX
AppleTalk Protocol
WAN networking Protocols
Isdn4linux
PPP, SLIP, PLIP
ATM
More
File sharing and printing
Sharing with Apple environment
using AppleTalk family protocols ( NetaTalk)
Sharing with Windows environment
using Samba ( an implementation of SMB protocol)
Sharing with Novell environment
using IPX/SPX
Sharing with Unix environment
using NFS ( Network File system)
Internet / Intranet services
Mail
Mail Servers ( eg.Sendmail, smail, qmail, etc.)
Remote access to mail (POP, IMAP)
Fetchmail
Web Servers
Apache
Stable, Robust
Yahoo, Altavista, Geocities, Hotmail are based on this server
Internet/Intranet services
Web Browsers
Netscape Navagator, Mozilla , lynx, etc.
FTP servers & clients
News service
Domain Name System ( DNS )
NIS ( Network Information Service )
(cont’)
Remote execution of application
Telnet
Use a remote computer as if just at the site
Remote commands
Execution of a command on a remote machine
The X window system
The X server controls the display and I/O
The X client do the real computing work
VNC ( Virtual Network Computing)
eg. Execute in a Windows machine and output
displayed in a Linux machine
Acting as Network Interconnection
Bridge
Router
Firewall
Proxy Server
IP Masquerade
Load Balancing
Traffic Shaping
Port Forwarding
Virtual private
networks
Network Management
Network management applications
Webmin
Linuxconf
SNMP (Simple Network Management Protocol )
allows for remote monitoring and configuration of
routers, bridges , network cards, switches …
Part II
Security tools
for Linux network
Monitoring tools
Scan to determine if the machine is vulnerable
to a specific exploit on that server
Connect to target machine on all ports they can
Help to fix the found problems
Examples:
SATAN ( Security Administrator’s Tool for Analyzing
Networks )
ISS( Internet Security Scaner )
SAINT ( updated version of SATAN )
Nessus, xSid, Logcheck, PortSentry
Network Services
Problem
The more services the system offers, the more places
for attackers to find a hole
Network Services
(cont’)
Strategy
Disable or remove services not needed
Use tcp_wrappers to wrap all the TCP services
Use SSH to replace old, insecure remote programs
such as telnet, rlogin, rdist, rcp
SSH
A secure login program that revolutionized remote
management of networks hosts over the Internet
A powerful program that uses strong cryptography
for protecting all transmitted confidential data
System integrity
Problem
A typical Linux server handles about 30,400 files
In its busy times administrators can’t check the
integrities of all system files
A cracker can easily install or modify some files
System Integrity ( cont’ )
Security tools
Tripwire
Tripwire ASR ( Academic Source Release )
Create a database first Check the integrity of a
system at any time Compare the current system
and the stored database Find if malicious changes
exist
Management & Limitation
GnuPG
A tool for secure communication and data storage
Can be used to encrypt data and create digital
signatures
Quota
A system administration tool for monitoring and
limiting users’ and groups’ disk usage
With quota, the users are forced by the system
administrator to not consume unlimited disk space on
a system
Summary
We’ve talked about:
The network capacities of Linux OS :
Support of many network protocols
File sharing and printing
Internet / Intranet Services
Remote execution of application
Acting as network interconnection
Network managemet
Summary
Also talked about:
Some security tools for Linux network:
Monitoring tools
Network services
System integrity
Management & Limitation