Guide to Operating System Security Chapter 9 Web, Remote Access, and VPN Security Objectives Understand Internet security using protocols and services Configure Web browsers for security Configure remote access services for security Configure virtual private network services for security Guide to Operating System Security 2 Internet Security Protocols and services must be kept secure To ensure privacy of information To discourage the spread of malicious software Guide to Operating System Security 3 Internet Protocols and Services Hypertext Transfer Protocol (HTTP) Secure HTTP (S-HTTP) and Hypertext Transfer Protocol Secure (HTTPS) File Transfer Protocol (FTP) Network File System (NFS) Samba and Server Message Block (SMB) Guide to Operating System Security 4 HTTP TCP/IP-compatible application protocoltransports information over the Web Most recent version: HTTP/1.1 Increases reliability of communications Enables caching Can send message responses before full control information from a request is received Permits multiple communications over a single connection Guide to Operating System Security 5 S-HTTP and HTTPS Forms of HTTP used for more secure communications S-HTTP Standards-based protocol that enables use of a variety of security measures (including CMS and MOSS) HTTPS Essentially proprietary, but more compatible with encryption for IP-level communications Uses SSL as a subprotocol Guide to Operating System Security 6 File Transfer Protocol (FTP) TCP/IP protocol that transfers files in bulk data streams Uses two TCP ports (20 and 21) Supports transmission of binary or ASCII formatted files Commonly used on the Internet Downloading files can be risky Guide to Operating System Security 7 File Transfer Protocol (FTP) Guide to Operating System Security 8 Network File System (NFS) Designed for UNIX/Linux systems for file sharing Connection-oriented protocol that runs within TCP Uses remote procedure calls via TCP port 111 Sends data in record streams For security, let only authorized computers use NFS on host computer Guide to Operating System Security 9 Samba and Server Message Block Samba Available for UNIX and Linux computers Enables exchange of files and printer sharing with Windows-based computers through SMB protocol Server Message Block Used by Windows-based systems Enables sharing files and printers Employed by Samba Guide to Operating System Security 10 Using Samba Guide to Operating System Security 11 Configuring Web Browsers for Security Applying security measures to popular Web browsers Internet Explorer Mozilla Netscape Navigator Guide to Operating System Security 12 Configuring Internet Explorer Security Used with Windows and Mac OS X Configure version of HTTP, use of HTTPS, FTP, and download access Configure security by zones Internet Local intranet Trusted sites Restricted sites Guide to Operating System Security 13 Internet Explorer Security Settings Guide to Operating System Security 14 Configuring Internet Explorer Security Internet Explorer Enhanced Security Configuration (Windows Server 2003) Applies default security to protect server Uses security zones and security parameters preconfigured for each zone Guide to Operating System Security 15 Installing IE Enhanced Security Configuration Guide to Operating System Security 16 Configuring Mozilla Security Open-source Web browser Can run on Linux (by default with GNOME desktop) UNIX Mac OS X OS/2 Windows-based systems Security configuration is combined with privacy configuration options Guide to Operating System Security 17 Mozilla Security Categories Guide to Operating System Security 18 Privacy & Security Option in Mozilla Guide to Operating System Security 19 Configuring Netscape Navigator Security Nearly identical to Mozilla; GUI offers: A buddy list Link to Netscape channels Different sidebar presentation Guide to Operating System Security 20 Netscape Navigator in Windows 2000 Server Guide to Operating System Security 21 Privacy & Security Options in Netscape Guide to Operating System Security 22 Configuring Remote Access Services for Security Remote access Ability to access a workstation or server through a remote connection (eg, dial-up telephone line and modem) Commonly used by telecommuters Guide to Operating System Security 23 Microsoft Remote Access Services Enables off-site workstations to access a server through telecommunications lines, the Internet, or intranets Guide to Operating System Security 24 Microsoft RAS Guide to Operating System Security 25 Microsoft RAS - Supported Clients MS-DOS Windows 3.1 and 3.11 Windows NT/95/98 Windows Millennium Windows 2000 Windows Server 2003 and XP Professional Guide to Operating System Security 26 Microsoft RAS Supports different types of modems and communications equipment Compatible with many network transport and remote communications protocols Guide to Operating System Security 27 Microsoft RAS – Supported Connections (Continued) Asynchronous modems Synchronous modems Null modem communications Regular dial-up telephone lines Leased telecommunication lines (eg, T-carrier) Guide to Operating System Security 28 Microsoft RAS – Supported Connections (Continued) ISDN lines (and “digital modems”) X.25 lines DSL lines Cable modem lines Frame relay lines Guide to Operating System Security 29 Microsoft RAS – Supported Protocols NetBEUI TCP/IP NWLink PPP PPTP L2TP Guide to Operating System Security 30 Understanding Remote Access Protocols Transport protocols TCP/IP IPX NetBEUI Remote access protocols Serial Line Internet Protocol (SLIP) • CSLIP Point-to-Point Protocol (PPP) • • PPTP L2TP Guide to Operating System Security 31 Configuring a RAS Policy Employ callback security options (No Callback, Set by Caller, Always Callback to) Install Internet Authentication Service (IAS) Can be employed with Remote Authentication Dial-In User Service (RADIUS) and RADIUS server Add participating RAS and VPN servers Guide to Operating System Security 32 Remote Access Policies Objects in the IAS Tree Guide to Operating System Security 33 Granting Remote Access Permission to RAS Guide to Operating System Security 34 Enabling Access for a User’s Account via Remote Access Policy Guide to Operating System Security 35 Configuring a RAS Policy Use Remote Access Policies to configure security types Authentication Encryption Dial-in constraints Guide to Operating System Security 36 RAS Authentication Types (Continued) Challenge Handshake Authentication Protocol (CHAP) Extensible Authentication Protocol (EAP) MS-CHAP v1 (aka CHAP with Microsoft extensions) MS-CHAP v2 (aka CHAP with Microsoft extensions version 2) Guide to Operating System Security 37 RAS Authentication Types (Continued) Password Authentication Protocol (PAP) Shiva Password Authentication Protocol (SPAP) Unauthenticated Guide to Operating System Security 38 RAS Encryption Options Guide to Operating System Security 39 RAS Dial-in Constraints Options Idle and session timeouts Day and time restrictions Whether access is restricted to a single number Whether access is restricted based on media used Guide to Operating System Security 40 Security on a Virtual Private Network VPN An intranet designed for restricted access by specific clients based on subnets, IP addresses, user accounts, or a combination Apply same remote access policies as to RAS servers Guide to Operating System Security 41 Summary Protocols and services that enable Internet security Configuring Web browsers for security Internet Explorer Mozilla Netscape Navigator How to configure a server’s remote access services to enforce security Applying security options to a VPN Guide to Operating System Security 42