Access control and user management in Apache

Slides:



Advertisements
Similar presentations
1 Web Servers / Deployment Alastair Dawes Original by Bhupinder Reehal.
Advertisements

Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Configuring Windows Vista Security Chapter 3. IE7 Pop-up Blocker Pop-up Blocker prevents annoying and sometimes unsafe pop-ups from web sites Can block.
Initial web server configuration Dr Jim Briggs 1WUCM1.
Apache Configuration Setting up a web server. Basic Server Facts Runs on port 80 Server application -> httpd Richly configurable Many defaults will let.
Apache Access Controls. Ways to control Allow/Deny access control –By IP –By domain name Password –Apache managed passwords –Realms.
Access control and user management in Apache 1WUCM1.
Introduction To Windows NT ® Server And Internet Information Server.
Apache : Installation, Configuration, Basic Security Presented by, Sandeep K Thopucherela, ECE Department.
SSL (Secure Socket Layer) and Secure Web Pages Rob Sodders, University of Florida CIS4930 “Advanced Web Design” Spring 2004
Sharepoint Portal Server Basics. Introduction Sharepoint server belongs to Microsoft family of servers Integrated suite of server capabilities Hosted.
Setting up a Subversion repository By: Matt Krass Last Updated: 4/11/07.
Installing Samba Vicki Insixiengmay Jonathan Krieger.
Web Technology – Web Server Setup : Chris Uriarte Meeting 4: Advanced Topics, Continued: Securing the Apache Server and Apache Performance Tuning Rutgers.
By Jeerarat Boonyanit. As you can see I have chosen Cpanel for my server management tool. cPanel is a Linux based web hosting control panel that provides.
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
An introduction to Apache. Different Types of Web Servers Apache is the default web server for may Unix servers. IIS is Microsoft’s default web server.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Copyright 2000 eMation SECURITY - Controlling Data Access with
Web Services CSCI N321 – System and Network Administration Copyright © 2007,2008 by Scott Orr and the Trustees of Indiana University.
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
Troubleshooting Windows Vista Security Chapter 4.
1 Apache. 2 Module - Apache ♦ Overview This module focuses on configuring and customizing Apache web server. Apache is a commonly used Hypertext Transfer.
Set 13: Web Servers (configuration and security) (Chapter 21) IT452 Advanced Web and Internet Systems.
CN1176 Computer Support Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+
Apache and... Virtual Hosts ---- aliases mod_rewrite ---- htaccess AFNOG 11 Kigali, Rwanda May 2010 Dorcas Muthoni Courtesy: Hervey Allen.
User authentication, passwords
Lesson 17-Windows 2000/Windows 2003 Server Security Issues.
Simplify and Strengthen Security with Oracle Application Server Allan L Haensgen Senior Principal Instructor Oracle Corporation Session id:
Computer Emergency Notification System (CENS)
Hands On Networking Network Applications Ram P Rustagi, ISE Dept Kundan Kumar, MCA Dept Manini Sahoor, MCA Dept Ravi Teja, MCA Dept Sourav.
Web Site Access Control with Apache Fort Collins, CO Copyright © XTR Systems, LLC Web Site Access Control Using the Apache Web Server Instructor: Joseph.
ColdFusion Security Michael Smith President TeraTech, Inc ColdFusion, Database & VB custom development
Apache Security Travis Jeffries. Introduction Authentication and Authorization Strict Access Methods Defending against Attacks Bad CGI Programs Apache.
September 2003 SIGUCCS ‘03 Paper # 62 WebDAV: What It Is, What It Does, Why You Need It by Luis O. Hernández Mahmoud Pegah.
Overview Managing a DHCP Database Monitoring DHCP
Section 11: Implementing Software Restriction Policies and AppLocker What Is a Software Restriction Policy? Creating a Software Restriction Policy Using.
Securing the Apache Server and Apache Performance Tuning 1.
Guide to MCSE , Second Edition, Enhanced1 The Windows XP Security Model User must logon with: Valid user ID Password User receives access token Access.
Computer Security Risks for Control Systems at CERN Denise Heagerty, CERN Computer Security Officer, 12 Feb 2003.
Authentication Names and Passwords Names and Passwords Also can use Groups Also can use Groups Webmaster can “require” authentication Webmaster can “require”
The world leader in serving science Overview of Thermo 21 CFR Part 11 tools Overview of software used by multiple business units within the Spectroscopy.
Module 10: Windows Firewall and Caching Fundamentals.
Web Technology – Web Server Setup : Chris Uriarte Meeting 4: Advanced Topics, Continued: Securing the Apache Server and Apache Performance Tuning Rutgers.
Web Server Administration Chapter 10 Securing the Web Environment.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
Computer Security Sample security policy Dr Alexei Vernitski.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Working at a Small-to-Medium Business or ISP – Chapter 8
Common Methods Used to Commit Computer Crimes
Authentication & .htaccess
Securing the Network Perimeter with ISA 2004
Chapter 27: System Security
Lesson 16-Windows NT Security Issues
Web Servers / Deployment
Network hardening Chapter 14.
APACHE WEB SERVER.
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Access control and user management in Apache WUCM1

Apache access control Include appropriate module: mod_auth for basic authentication mod_digest for digest authentication mod_access control by host - not user Access control can be: Site wide usually set up in the httpd.conf file Per directory – often using an "access control file" Unix: .htaccess Windows: htaccess.hta Access control files need to be protected themselves, especially when used per directory WUCM1

Access control policy Access control needs designing What should go in the httpd.conf file site-wide? What do you want to be mandatory and not permit users to change? For per directory controls: who can control access to their own bit? who can add/remove/manage users? who can overrule site-wide structures? Beware a proliferation of userIDs/passwords WUCM1

Access by user Access control usually on a "per directory" basis Need to be able to override site-wide control Configured on a "realm" basis htaccess.hta file might be: AuthName "RogerSecrets" AuthType Basic AuthUserFile "N:/WebRoot/Users/users.pwd" require valid-user WUCM1

Require option Require can be general or specific: require valid-user require user martin jane Users can be grouped Need a group file – plain text You can the require a specific group of users, e.g. require group staff WUCM1

Access by host 1 Restrict access by host using allow and deny The order directive specifies which rule to apply first: Order allow,deny When you want to let most hosts in but keep a few out Order deny,allow When you want to keep most hosts out and let a few in Order mutual-failure When you want to let in only those on the allow list and who are not on the deny list – not very common! WUCM1

Access by host 2 Example: setup so access to directory admin can be from your office PC or home PC (assume fixed IP) <Directory "N:/WebRoot/Roger/htdocs/admin"> Order deny,allow Deny from all Allow from 148.192.255.5 155.6.122.9 </Directory> WUCM1

Mixing access controls User access control and host access control can be applied to the same site/directory Satisfy directive tells Apache how to mix the rules: satisfy any either host or user (id/password) valid satisfy all must be valid user and from a permitted host WUCM1

User management Need a database of user name/password pairs A flat file is easy for small numbers of users For larger user bases, use a proper database Apache has a password utility htpasswd that builds a simple flat file WUCM1

htpasswd htpasswd has three (or 4) parameters: flags (e.g. -c to create file from scratch) password file user to add optional: the password - but not hidden e.g. htpasswd -c n:\WebRoot\Users\user.pwd roger If you don't specify password, it will prompt you for it Windows version uses MD5 encryption by default WUCM1

htpasswd: examples of use WUCM1

Anonymous access Needs module mod_auth_anon Permits access via a "guest" user id with a password of user's email address You should publish a privacy policy in respect of your use of these emails WUCM1

Example <Directory "C:/WebRoot/downloads"> Anonymous guest anonymous guestuser Anonymous_MustGiveEmail on Anonymous_LogEmail on Anonymous_VerifyEmail on Anonymous_NoUserId off Require valid-user </Directory> WUCM1

Search engine spider control (1) "Robots" or "spiders" are automated clients used to traverse websites Most used to gather information for search engines Reasons to keep spiders out (of all or part of site): It is incomplete It is private It is time sensitive (i.e. the contents will be rapidly out of date) It is dynamically generated Bad spiders may hit too fast and block user access WUCM1

Search engine spider control (2) Most spiders/robots will voluntarily adhere to your robot policies Bad spiders will ignore it so it is not a guarantee of protection A file robots.txt in the DocumentRoot directory (e.g. htdocs) controls robot behaviour See http://www.robotstxt.org/wc/norobots.html for details of the standard WUCM1

Example robots.txt User-agent: WebCrawler User-agent: excite Disallow: /cgi-bin Disallow: /private Allow: / User-agent: * Disallow: / WUCM1

Logging access Generating access logs is usually a component of any security policy: Why? Who looks at them? Authority part of your policy? How long to keep? Use of tools to extract statistics Should logs include user identifiers? WUCM1

Security of CGI scripts Main recommendation – only enable CGI if needed CGI issues: Do you allow users to install their own CGI scripts? What user does the CGI script run as? Use a CGI wrapper – suEXEC or CGIwrap Keep the patch level monitored – Open Source CGI scripts regularly updated WUCM1

Intruder detection An Intruder Detection System (IDS) is software for larger public sites An IDS looks for suspicious behaviour on your system, this may be: Altered files Non-normal activity Multiple login attempts, etc. WUCM1

IDS features Nobles (2001) sets out important IDS features: Detect behaviour outside the norm - abnormal actions or results Sensitive to common attack signatures Low overhead – minimal impact on service Should start and stop automatically following web server Resistant to cracker attack Configurable so can focus on specific triggers WUCM1

IDS products Typical products include: Responses to intrusion: Network ICE Cisco Intrusion Detection System RealSecure Kane Security Monitor Responses to intrusion: Restore/Repair – backups vital here Patch security hole – prevent recurrence Alert community/authorities WUCM1