Web Technology – Web Server Setup : Chris Uriarte Meeting 4: Advanced Topics, Continued: Securing the Apache Server and Apache Performance Tuning Rutgers.

Slides:



Advertisements
Similar presentations
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Advertisements

Michelle J. Gosselin, Jennifer Schommer Guanzhong Wang.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Protecting Documents on the Web Friday Tech Briefing Timely Info for Power Users and Stanford's Technology Support Community Mark Branom ITSS Technology.
Working with Proxy Servers and Application-Level Firewalls Chapter 5.
Web Server Administration TEC 236 Securing the Web Environment.
Web Server Administration Chapter 10 Securing the Web Environment.
Access control and user management in Apache
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Apache Access Controls. Ways to control Allow/Deny access control –By IP –By domain name Password –Apache managed passwords –Realms.
Access control and user management in Apache 1WUCM1.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Web server security Dr Jim Briggs WEBP security1.
Apache : Installation, Configuration, Basic Security Presented by, Sandeep K Thopucherela, ECE Department.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
SSL (Secure Socket Layer) and Secure Web Pages Rob Sodders, University of Florida CIS4930 “Advanced Web Design” Spring 2004
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
APACHE SERVER By Innovationframes.com »
Setting up a Subversion repository By: Matt Krass Last Updated: 4/11/07.
1 Advanced Application and Web Filtering. 2 Common security attacks Finding a way into the network Exploiting software bugs, buffer overflows Denial of.
Linux Operations and Administration
Web Technology – Web Server Setup : Chris Uriarte Meeting 4: Advanced Topics, Continued: Securing the Apache Server and Apache Performance Tuning Rutgers.
Class 8Intro to Databases Authentication and Security Note: What we discuss in class today covers moderate to low security. Before you involve yourself.
An introduction to Apache. Different Types of Web Servers Apache is the default web server for may Unix servers. IIS is Microsoft’s default web server.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
5 Chapter Five Web Servers. 5 Chapter Objectives Learn about the Microsoft Personal Web Server Software Learn how to improve Web site performance Learn.
Copyright 2000 eMation SECURITY - Controlling Data Access with
Web Services CSCI N321 – System and Network Administration Copyright © 2007,2008 by Scott Orr and the Trustees of Indiana University.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
1 Apache. 2 Module - Apache ♦ Overview This module focuses on configuring and customizing Apache web server. Apache is a commonly used Hypertext Transfer.
Set 13: Web Servers (configuration and security) (Chapter 21) IT452 Advanced Web and Internet Systems.
Apache and... Virtual Hosts ---- aliases mod_rewrite ---- htaccess AFNOG 11 Kigali, Rwanda May 2010 Dorcas Muthoni Courtesy: Hervey Allen.
User authentication, passwords
Implementing a Port Knocking System in C Honors Thesis Defense by Matt Doyle.
Apache HTTP mod_ftp William A. Rowe, Jr. ASF Member, httpd and APR projects Sr. Software Engineer, Covalent Technologies.
Simplify and Strengthen Security with Oracle Application Server Allan L Haensgen Senior Principal Instructor Oracle Corporation Session id:
Hands On Networking Network Applications Ram P Rustagi, ISE Dept Kundan Kumar, MCA Dept Manini Sahoor, MCA Dept Ravi Teja, MCA Dept Sourav.
User Access to Router Securing Access.
Web Site Access Control with Apache Fort Collins, CO Copyright © XTR Systems, LLC Web Site Access Control Using the Apache Web Server Instructor: Joseph.
Apache Security Travis Jeffries. Introduction Authentication and Authorization Strict Access Methods Defending against Attacks Bad CGI Programs Apache.
September 2003 SIGUCCS ‘03 Paper # 62 WebDAV: What It Is, What It Does, Why You Need It by Luis O. Hernández Mahmoud Pegah.
Securing the Apache Server and Apache Performance Tuning 1.
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
1 Apache and... Virtual Hosts ---- aliases mod_rewrite ---- htaccess AFNOG X Cairo, Egypt May 2009 Hervey Allen.
Sessions, Cookies, &.htaccess IT 210. Procedural Issues  Quiz #3 Today!  Homework #3 Due Friday at midnight UML for Lab 4  Withdraw Deadline is Wed,
COSC 513 Operating Systems Project Presentation: Internet Security Instructor: Dr. Anvari Student: Ying Zhou Spring 2003.
CITA 310 Section 9 Securing the Web Environment (Textbook Chapter 10)
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
ITI-510 Computer Networks ITI 510 – Computer Networks Meeting 6 Rutgers University Center for Applied Computer Technologies Instructor: Chris Uriarte.
Authentication Names and Passwords Names and Passwords Also can use Groups Also can use Groups Webmaster can “require” authentication Webmaster can “require”
Module 10: Windows Firewall and Caching Fundamentals.
Web Server Administration Chapter 10 Securing the Web Environment.
How to maintain state in a stateless web Shirley Cohen
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
Winter 2001C.Watters1 Apache Proxy Notes. winter 2001C.Watters2 Proxy Intermediary between clients and the web Configure browser to go to the proxy Proxy.
Qmail Installation. Build Qmail tar zxvf qmailrocks.tar.gz tar zxvf qmailrocks.tar.gz Edit and Run : Edit and Run : /test/qmailrocks/scripts/install/qmr_install_linux-s1.script.
Session 11: Cookies, Sessions ans Security iNET Academy Open Source Web Development.
IS 4506 Windows NTFS and IIS Security Features.  Overview Windows NTFS Server security Internet Information Server security features Securing communication.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
Authentication & Authorisation Is the user allowed to access the site?
ArcGIS for Server Security: Advanced
Apache and... Virtual Hosts ---- aliases mod_rewrite ---- htaccess
Authentication & .htaccess
Configuring Windows Firewall with Advanced Security
Unix System Administration
مهندسی فناوری اطلاعات پاسخ به سوالات
Security in Web Applications
Web Server Design Week 11 Old Dominion University
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Web Technology – Web Server Setup : Chris Uriarte Meeting 4: Advanced Topics, Continued: Securing the Apache Server and Apache Performance Tuning Rutgers University Internet Institute Instructor: Chris Uriarte (CU WMPUPDT)

Web Technology – Web Server Setup : Chris Uriarte Today’s Session Protecting your Web server against attacks. Providing authenticated access to your Web site. Overview of SSL-enabled Web Servers Apache Performance Tuning Wrap-up and Evaluations

Web Technology – Web Server Setup : Chris Uriarte Levels of Web Server Security Protecting data supplied through client browsers. Protecting or restricting access to data stored on your Web server. Protecting the Web server software. Protecting the server that houses your Web server.

Web Technology – Web Server Setup : Chris Uriarte Common Attacks on Systems that Run Web Servers CGI exploits –Badly-written or buggy web applications (CGIs) programs allow access to restricted resources or consume server resources. DoS (Denial of Service) –Software or operating system server exploits Packet sniffers –Hackers ‘sniff’ clear-text passwords Buffer overflows –Attacks that cause a piece of software to crash and possibly give unprivileged users privileged access

Web Technology – Web Server Setup : Chris Uriarte Securing Your Web Server Restrict access (by location or authentication) to file systems and resources. –Password or IP authentication/authorization Disable server-side technologies if they are not required. –Disable CGI Access and Server Side Includes –Remove ExecCGI and Includes from the Options directive of your httpd.conf Do not run your server as “root.” –The User directive in the httpd.conf should specify a user other than root (e.g. nobody, www, etc.)

Web Technology – Web Server Setup : Chris Uriarte Securing Your Web Server, con’t. Filter traffic with a firewall. –Use of a network device that only allows access to particular resources on a network Use encryption technologies (ssh, ssl). Monitor your logs for problems. Secure the system that hosts your Web server: disable ports and services not in use, install security patches, take preventative measures against popular exploits. –Websites like and have information on current exploitshttp://

Web Technology – Web Server Setup : Chris Uriarte Access by Authentication Standard Authentication Modules – mod_auth, mod_auth_anon, mod_auth_dbm, mod_auth_db, mod_digest Access in Apache can be defined by user or group: For Basic Authentication: AuthType Basic AuthName “Restricted Access” AuthUserFile/usr/local/apache/passwd.file AuthGroupFile /usr/local/apache/group.file require user1 group1 group2

Web Technology – Web Server Setup : Chris Uriarte Authentication, con’t. Authenticated access often setup through a.htaccess file in the directory you want to protect, but can be setup via httpd.conf. Passwords sent in the clear for basic authentication.

Web Technology – Web Server Setup : Chris Uriarte Basic Authentication: Line by Line You can keep authentication info in a block in the httpd.conf or in an.htaccess file First, specify the AuthType, which is Basic AuthType Basic Next, Specify the text string that will be displayed when the username/pw box is presented to the user: AuthName “My Secret Webpages” Next, specify the path to a file that will contain the usernames and passwords of your users: AuthUserFile /home/apache/passwd.file (best to keep this file out of the DocumentRoot)

Web Technology – Web Server Setup : Chris Uriarte Basic Authentication: con’t. Finally, add a require statement within a block, which can limit the access to a specific username, or group. This can contain a list of groups, user names or the text “valid-user” to represent any valid user in the password file require valid-user

Web Technology – Web Server Setup : Chris Uriarte Basic Authentication: con’t The final block looks like this: AuthType Basic AuthName “My Secret Webpage” AuthUserFile/home/apache/passwd.file require valid-user …which will prompt a user for a username/pw when any document under /home/iti1234/htdocs/restricted is requested.

Web Technology – Web Server Setup : Chris Uriarte Creating a Password File htpasswd is a utility for generating encrypted passwords and creating a password file Part of apache distribution, located in : {SERVER ROOT}/bin/htpasswd Usage: htpasswd [-c] password-file username The –c flag creates a new password file. Example, adds a user myname and creates a new password file (type all on one line): /home/iti1234/bin/htpasswd -c /home/iti1234/apache/passwdfile username

Web Technology – Web Server Setup : Chris Uriarte Exercise: Password Protecting Your Website For this exercise, you will make the Website running on your workstation password restricted using a.htaccess file. In the directory container for your document root (/home/itiXXXX/apache/htdocs), in httpd.conf set the following: AllowOverride AuthConfig

Web Technology – Web Server Setup : Chris Uriarte Exercise, con’t: In /home/itiXXX/apache/htdocs, create a.htaccess file with the following contents: AuthUserFile /home/itiXXXX/apache/.htpasswd AuthGroupFile /dev/null AuthName “My Protected Site” AuthType Basic require valid-user

Web Technology – Web Server Setup : Chris Uriarte Exercise, con’t. Next, create a password file using htpasswd: htpasswd –c /home/itiXXXX/apache/.htpasswd guest Provide the password for the guest user when prompted. Access your website ( and provide the username/password.

Web Technology – Web Server Setup : Chris Uriarte Restrict Access by Location Authorization As discussed in Meeting 2, you can restrict access to web resources by IP address, hostname, domain name and IP block by using a block in the httpd.conf or an.htaccess file: order deny,allow deny from all allow from rutgers.edu