Guide to Operating Systems 0-619-16040-3 Guide to Operating Systems Security Chapter 9 Solutions Answers to the Chapter 9 Review Questions 1. ______________________________ is a security method that is commonly used by S-HTTP Answer: a. Cryptographic Message Syntax 2. You are configuring Internet Explorer in Windows Server 2003. It is important to have tight security when using this Web browser, because it is primarily used for the Windows Update process and to access the Microsoft Web site for other information. Which of the following Internet Explorer security measures should you configure? (Choose all that apply.) Answer: a., b., and c. 3. Microsoft RAS is compatible with which of the following protocols? (Choose all that apply.) Answer: a., b., c., and d. 4. Your organization is setting up a Microsoft RAS server that will have only Windows XP Professional clients using smart cards. Which of the following options should you configure for authentication? (Choose all that apply.) Answer: b. and c. 5. The bank for which you work operates as an automated payroll clearing house, in which companies contact your server through dial-up access and RAS, which is running on the server. Which of the following represents the best method for security for client accounts that access the RAS server to send their data? Answer: c. set callback on each account to Always Callback to and provide the specific telephone number for the client 6. The IT management in your organization is thinking about simply turning off the RAS servers on the weekends so that users cannot access them when the staff is away. Which of the following is your response? Answer: c. A simpler method is to configure a remote security policy so that RAS is only accessed on Mondays through Fridays. 7. _______________________________ creates a tunnel over the Internet for secure VPN communications. Answer: b. Point-to-Point Tunneling Protocol 8. Which of the following communications methods is (are) compatible with Microsoft RAS? (Choose all that apply.) Answer: a., b., c., and d. 9. While you are in an IT department meeting, one of the programmers is concerned about using Microsoft RAS because he states that it does not allow for data encryption. What is your reaction? Answer: d. RAS does support up to 128-bit encryption. 10. HTTPS uses __________________________ for security. Answer: a. SSL 11. One of the scientists in your company is using Red Hat Linux and the Mozilla Web browser. She wants to protect her computer so that information is not permanently written on it through the Internet. Which of the following are options available in Mozilla for her to configure? (Choose all that apply.) Answer: a., b., and d. 1 © 2004 Course Technology and Michael Palmer. All rights reserved. Guide to Operating Systems 0-619-16040-3 12. Several of the users in your organization have used Internet Explorer to access Internet sites that download Trojan horses to their computers. Which of the following is the best measure you can take to prevent the users from accessing these and other known hazardous sites? Answer: b. Place the known hazardous sites in the restricted sites zone in Internet Explorer. 13. Your organization currently has a shortage of user consultants to train users about security for users of Internet Explorer, Mozilla, and Netscape Navigator. Which of the following might help in this situation? Answer: a. Combine security training for Mozilla and Netscape Navigator, because they use similar security features. 14. FTP can be used from _________________________. (Choose all that apply.) Answer: a., b., and c. 15. Your company uses NFS for sharing files. The new Linux server administrator says that NFS is UNIXbased and is naturally safe without any configuration. Do you agree with this assessment? Answer: c. The /etc/hosts.allow and /etc/hosts.deny files should be configured to enhance security. 16. Your organization uses Internet Explorer and has decided that the access to scripts should be disabled for users when they access the Internet. How is this possible? Answer: c. This can be configured in the Internet zone, by controlling the use of scripts. 17. What tool enables you to configure a remote access policy on a Windows 2000/2003 server? Answer: c. Routing and Remote Access 18. From where do you configure the security settings in Netscape Navigator? Answer: a. Click the Edit menu, click Preferences, and click Privacy & Security. 19. A colleague has set up a Samba server in Red Hat Linux, and has determined that anonymous users are logging on. What security has he most likely configured? Answer: d. security = share 20. The remote access protocol, PPP, can be used to encapsulate which of the following? (Choose all that apply.) Answer: a., c., and d. 2 © 2004 Course Technology and Michael Palmer. All rights reserved. Guide to Operating Systems 0-619-16040-3 Hands-On Projects Tips and Solutions for Chapter 9 Project 9-1 In this project, students find out how to use FTP services through an Internet browser. In Step 4, students might list a few of the folders that they see, such as a2ps, acct, binutils, calc, gcc, and so on. Project 9-2 This project enables students to learn about the security parameters built into Internet Explorer. In Step 2, students should report the Internet Explorer version level, such as 6.0.3790.0, and the Cipher Strength, such as 128-bit. In Step 7, the main categories at this writing include: .NET Framework-reliant components Active-X controls and plug-ins Downloads Miscellaneous Scripting User Authentication Also in Step 7, to disable ActiveX controls and plug-ins students should report that they would click the Disable option button for each subcategory under ActiveX controls and plug-ins. Also, to disable downloading files, click the Disable option button for File Download under Downloads. In Step 10 students should report that Use HTTP 1.1 should be checked under HTTP 1.1 settings. Also, SSL versions 2.0 and 3.0 can be enabled. Further, the options for controlling FTP access are: Enable folder view of FTP sites Use Passive FTP (for firewall and DSL modem compatibility) Project 9-3 In this project, students learn about the security options in Internet Explorer for Mac OS X. In Step 3, students should notice the parameters that can be configured on the Security tab, such as alerts. In Step 4, students should report the following security zones: Local intranet zone Trusted sites zone Internet zone Restricted sites zone In Step 7, the categories students should record are: ActiveX Controls and Plug-ins Downloads User Authorization Miscellaneous Scripting 3 © 2004 Course Technology and Michael Palmer. All rights reserved. Guide to Operating Systems 0-619-16040-3 Project 9-4 In this project, students install the Internet Explorer Enhanced Security Configuration. In Step 11, students should find that the security level is set to High for the Internet zone. In Step 13, students should determine that the Web sites entered by default are: hcp://system http;//localhost https://localhost In Step 15, the default trusted sites include: http://*.windowsupdate.microsoft.com http://oca.microsoft.com http://windowsupdate.microsfot.com http://*windowsupdate.com In Step 17, no sites are restricted by default. Project 9-5 In this project, students learn where to set up the Privacy & Security options for Mozilla in Red Hat Linux 9.x. In Step 4, to stop cookies from being written, click Disable cookies. In Step 7, the encryption options for SSL3/TLS include: RC4 encryption with a 128-bit key and an MDS MAC FIPS 140-1 compliant triple DES encryption with SHA-1 MAC Triple DES encryption with a 168-bit key and SHA-1 MAC FIPS 140-1 compliant DES encryption with SHA-1 MAC DES encryption with a 56-bit key and a SHA-1 MAC RC4 encryption with a 56-bit key and a SHA-1 MAC DES encryption with CBC mode and a 56-bit key and a SHA-1 MAC RC4 encryption with a 40-bit key and an MDS MAC RC2 encryption with a 40-bit key and an MDS MAC No encryption with an MDS MAC In Step 12, the HTTP versions supported are: HTTP 1.0 HTTP 1.1 Project 9-6 In this project, students view the Privacy & Security options in Netscape Navigator. In Step 4, the categories should be the same, with the addition of Popup Windows Control. In Step 8, students should note that the HTTP options are similar to those in Mozilla. 4 © 2004 Course Technology and Michael Palmer. All rights reserved. Guide to Operating Systems 0-619-16040-3 Project 9-7 This project enables students to configure dial-in security on an account that accesses a Windows 2000/2003 server remotely. Project 9-8 In this project, students set up a remote access policy for a RAS server. They will need access to a RAS server that is already installed, but that does not already have a remote access policy configured. In Step 7, some examples of restrictions are: Authentication Type (Windows Server 2003 only) Called-Station-Id Calling-Station-Id Client-Friendly-Name Client-IP-Address Client-Vendor Day-And-Time Restrictions Framed Protocol MS-RAS Vendor (Windows Server 2003 only) NAS-identifier NAS-IP-Address NAS-Port-Type Service-Type Tunnel-Type Windows-Groups In Step 12, the options selected by default are: MS-CHAP MS-CHAP v2 In Step 13, in Windows 2000, the EAP options include: MD5-Challenge Smart Card or other Certificate Also in Step 13, in Windows Server 2003, Smart Card or certificate is selected by default. In Step 19, to restrict the access: 1. Click the Restrict Dial-in media box (in Windows 2000 Server) or the Allow access only through these media (NAS-Port-Type) box (in Windows Server 2003). 2. Select Cable. 3. Select Ethernet. 5 © 2004 Course Technology and Michael Palmer. All rights reserved. Guide to Operating Systems 0-619-16040-3 Solutions to the Case Project Assignments Winnipeg Labs is a company that sets up chemistry and physics laboratories in North American high schools and colleges for student use. This company has sales representatives and lab setup technicians that are constantly traveling. To accommodate this business, the company wants to set up a Microsoft RAS server so that the employees in the field can use telephone lines to dial into their home network. The sales representatives will use the dial-up access to check prices and to show customers different configurations of laboratory models. The lab setup technicians will use the dial-up access to check on stocked items and to order and ship the appropriate laboratory equipment, furniture, and materials. The company views the ability to have remote access as an important sales strategy to increase the customer base and to enable the company to more quickly design and set up new laboratories. They hire you through Aspen IT Services to help them configure security for a Windows 2003 Microsoft Remote Access server. Also, the company has several issues regarding Internet security that they ask you to help resolve. Case Project 9-1: Remote Access Protocols The IT manager for Winnipeg Labs wants to learn more about remote access protocols. He asks you to prepare a report that discusses these protocols. Answer: Important remote access protocols include the following: Serial Line Internet Protocol (SLIP): Originally designed for UNIX environments to provide point-to-point communications encapsulating TCP/IP. This is an older remote communications protocol with relatively high overhead. Compressed Serial Line Internet Protocol (CSLIP): Often now referred to as SLIP, a newer version of SLIP that compresses header information in each packet sent across a remote link. Point-to-Point Protocol (PPP): Used more commonly than SLIP/CSLIP for remote communications, offering relatively low overhead and the ability to encapsulate IPX/SPX, NetBEUI, and TCP/IP. It negotiates communications with several network communications layers at once, and it supports connection authentication. Point-to-Point Tunneling Protocol (PPTP): A remote communications protocol that enables connectivity to a network through the Internet and connectivity through intranets and VPNs, creating a private tunnel for communications. Layer Two Tunneling Protocol (L2TP): A protocol that transports PPP over a VPN, an intranet, or the Internet, that works similarly to PPTP, but that uses an additional network communications standard, called Layer Two Forwarding, which enables forwarding on the basis of MAC addressing. 6 © 2004 Course Technology and Michael Palmer. All rights reserved. Guide to Operating Systems 0-619-16040-3 Case Project 9-2: RAS Authentication and Encryption A server administrator has already installed RAS. Now she needs to know what authentication and encryption options exist. Prepare a paper that discusses these options in Microsoft RAS. Answer: Students might use Tables 9-3 and 9-4 as the basis for their descriptions of Microsoft RAS. Table 9-3 Authentication Types Authentication Protocol Challenge Handshake Authentication Protocol (CHAP) Description CHAP requires encrypted authentication between the server and the client, but uses a generic form of password encryption, which enables UNIX computers and other non-Microsoft operating systems to connect to a RAS server. EAP is used for clients who access RAS through special devices such as smart cards, token cards, and others that use certificate authentication. If you click this option, then Certificate Services should be installed so that you can configure them for a particular device or certificate type. The Certificate Services component is installed as a Windows component by using the Control Panel Add or Remove Programs tool. MS-CHAP v1 and MS-CHAP v2 are set as the defaults when you install a RAS server, which means that clients must use MS-CHAP with PPP. MS-CHAP is a version of CHAP that uses a challenge-and-response form of authentication along with encryption. Windows 95, 98, NT, 2000, XP, and Server 2003 support MS-CHAP v1. Developed especially for VPNs, MS-CHAP v2 provides better authentication than MS-CHAP v1, because it requires the server and the client to authenticate mutually. It also provides more sophisticated encryption by using a different encryption key for receiving than for sending. Windows 2000, Windows XP, and Windows Server 2003 clients support MS-CHAP v2 and clients such as Windows 95 and Windows 98 can be updated to support this protocol. VPNs attempt to use MSCHAP v2 with a client and then use MS-CHAP v1 if the client does not support version 2. PAP can perform authentication, but does not require it, which means that operating systems without password encryption capabilities, such as MS-DOS, are able to connect to RAS. SPAP provides PAP services for remote access clients, network equipment, and network management software manufactured by the Shiva Corporation which is owned by Intel Network Systems, Inc. This option is not recommended, because it means that no authentication takes place. Extensible Authentication Protocol (EAP) MS-CHAP v1 (also called CHAP with Microsoft extensions) MS-CHAP v2 (also called CHAP with Microsoft extensions version 2) Password Authentication Protocol (PAP) Shiva’s Password Authentication Protocol (SPAP) Unauthenticated 7 © 2004 Course Technology and Michael Palmer. All rights reserved. Guide to Operating Systems 0-619-16040-3 Table 9-4 RAS Encryption Options Encryption option Basic encryption (MPPE 40 bit) Description Enables clients using 40-bit encryption key MPPE (Microsoft Point-to-Point Encryption, see Chapter 3); or clients can use 56-bit IPSec or DES encryption (also see Chapter 3) Enables clients to connect and not employ data encryption Enables clients using 56-bit encryption key MPPE, 56-bit IPSec encryption, or DES Enables clients using 56-bit IPSec, Triple DES, or MPPE 128-bit encryption No encryption Strong encryption (MPPE 56-bit) Strongest (MPPE 128-bit) For additional research, students might refer to Chapter 3 to review information about IPSec, DES, and MPPE. Case Project 9-3: Configuring Authentication and Encryption As you are preparing the paper for Case Project 9-3, the server administrator asks you to supplement the information in your paper by outlining how to set up authentication and encryption. Prepare an outline of the steps in this process. Answer: The steps for configuring authentication and encryption (in this case for a single RAS server) are as follows: 1. Click Start, point to All Programs, point to Administrative Tools, and click Routing and Remote Access. 2. In the tree under the RAS server, double-click Remote Access Policies. 3. In Windows Server 2003, double-click Connections to Microsoft Routing and Remote Access server. 4. Click Grant remote access permission, if it is not already selected. 5. Click the Edit Profile button. 6. Click the Authentication tab. 7. Configure the desired authentication, such as EAP (and the appropriate method) and the appropriate versions of MS-CHAP (v1 and v2). 8. Make sure that Allow clients to connect without negotiating an authentication method is not checked. 9. Click the Encryption tab. 10. Make sure that all forms of encryption are selected, except No encryption. 11. Click OK and click OK again. 12. Close the Routing and Remote Access window. 8 © 2004 Course Technology and Michael Palmer. All rights reserved. Guide to Operating Systems 0-619-16040-3 Case Project 9-4: Additional RAS Security Questions After the server administrator configures RAS, she realizes there are a few more issues on which she needs training: How to prevent users from accessing the RAS server every Monday between 2 a.m. and 6 a.m., which is the system time that she uses for maintaining this and other servers on the network How to set up RAS so that only users of dial-up lines can access it How to force off users who have been idle for over four minutes Prepare a training document that addresses these questions. Answer: All of the security measures are configured as part of a profile in the remote access policy. To configure these: 1. Open the Routing and Remote Access tool from the Administrative Tools menu. 2. Select Remote Access Policies in the tree under the RAS server. 3. Double-click Connections to Microsoft Routing and Remote Access server. 4. Click the Add button. 5. Double-click Day-And-Time Restrictions. 6. Use the pointer and drag it to block Monday from 2 a.m. to 6 a.m. Click the Denied option button. Click OK. 7. Click the Edit Profile button. 8. Display the Dial-in Constraints tab. 9. Click Minutes server can be idle before it is disconnected [Idle-Timeout] and enter 4. 10. Click Allow access only through these media (NAS-Port-Type). 11. Click Async Modem. 12. Click OK. 13. Click OK again. 14. Close the Routing and Remote Access tool. 9 © 2004 Course Technology and Michael Palmer. All rights reserved. Guide to Operating Systems 0-619-16040-3 Case Project 9-5: Configuring Web Browser Security While you are working with the server administrator, the IT manager contacts you with a question about configuring Mozilla and Netscape Navigator. The company has not yet urged users to configure security on their Web browsers, but today one user has inadvertently downloaded a Trojan horse from a Web site. The IT manager asks for your recommendations about how to configure Mozilla and Netscape Navigator to implement security on these Web browsers. Answer: In their responses, students should discuss the Privacy & Security options that can be configured in Mozilla and Netscape Navigator. They might present this in terms of having the company form a Web security committee. As a consultant, the student could present the Privacy & Security options to the committee and recommend such things as configuring to use the highest levels of HTTP and SSL. They might recommend restricting certain forms of downloaded information, such as cookies and images, and they might suggest certificate management. Table 9-2 from the text is replicated below to show the general options that can be configured. Table 9-2 Mozilla security categories Security/Privacy Category Cookies Images Forms Passwords Master Passwords SSL Certificates Validation Options Enables or disables writing cookies, provides a warning message before writing a cookie, sets an expiration time for cookies (cookies are informational files that Web servers store on client computers) Controls whether images can be written to disk and controls the use of animation in images Enables the retention of information about the user so that it does not have to entered repeatedly on forms Allows the browser to remember passwords that have been used previously to access Web sites and to encrypt the password information where it is stored on the local disk Controls the use of a master password when you configure specific Mozilla functions and protects web passwords and certificates Enables the SSL version level to be configured, configures Transport Layer Security (TLS; used to prevent a third-party from eavesdropping), and enables the use of security warning messages Used to manage client certificate selection, the use of specific certificates, and security mechanisms like smart cards Manages the revocation of certificates and enables or disables the use of Online Certificate Status Protocol (OCSP) 10 © 2004 Course Technology and Michael Palmer. All rights reserved.