Proposal to Improve the Student Activity Server Spring 1999 Submitted to: Al Williams Director, Distributed Systems Group Center for Academic Computing Jim Kerlin Deputy Director Center of Academic Computing Stan Latta Director Unions and Student Activities March 29, 1999 Table of Contents Introduction Issue 1 - Physical Access to Server Issue 2 - Hardware and Software Upgrades Issue 3 - System Security Issue 4 - Backups Issue 5 - Kerberos Issue 6 - AFS/DFS file sharing Issue 7 - Organizational Status Summary Introduction The Student Activity Server (SAS) currently provides a home on the Internet to over 350 student groups at many Penn State campuses. Since its beginning in 1996 with a donation from the Center for Academic Computing, it has grown to be the default choice for web service for Penn State student organizations, currently housing an estimated 75% of all organizations. This service is invaluable for many reasons. First, it allows more than one user to maintain a group's web page. This lets groups design better and more elaborate sites, and it also reduces the temptation for users to share passwords. It also has a larger, more flexible disk quota than the personal server. Lastly, it allows student organizations to keep their web site located at one authoritative reference for as long as the group exists as opposed to moving it between personal accounts. In the three years since the server has been running, its hardware and software have become insufficient to meet the growing demands of our users. The loss of console access to the machine for the past year due to security concerns in the computer room has made our jobs much more difficult and prevented much-needed hardware and software upgrades. This includes the installation of patches for known security vulnerabilities in the operating system and Internet server software. Our efforts have allowed us to perform basic account and system maintenance using our limited remote administration tools. These tools are very unstable, though, and frequently require a server reboot to use. Sometimes a common software failure prevents us from rebooting the server remotely, and we are forced to rely on CAC's assistance to remedy the situation. This means prolonged downtime for our users, and wasted time of CAC personnel. We are fortunate now to have close ties with CAC to provide this in the meantime because some of us work for CAC, but it is bad practice to rely on for the benefit of future SAS staff. Some software failures are as extreme as denial of service for our 1,000+ ftp users, and we have been anticipating the likelihood of complete server crashing and rebooting. The committee is unsatisfied with the current level of service we are providing to student organizations. To improve our quality of service, we need the help of the CAC. We have put together the following list of requests. We have designed this proposal to be modular, so that the possible failure or delay of any project may not directly affect the success or completion of any other project. Issue 1 - Physical Access to Server Problem The server is currently located in 134 Computer Building. For the past year, the student administrators have not been allowed to access the server console. Because the server software was not prepared for remote administration, we have had difficulty maintaining it. We have been unable to install updates to the operating system or web server software. This opens us up to security vulnerabilities that have been fixed in newer Service Pack releases. The hard disk also needs to be reconfigured to avoid perpetual problems with disk space. Most notably, the C: drive where the OS and user databases are held is within kilobytes of maximum, and virtual memory reaches full in a matter of hours after reboot. Without console access, we cannot even provide an immediate fix of expanding the C: drive into the now unused D: partition, and reconfigure the swap storage. It is also impossible to fix broken services such as ODBC and FrontPage Extensions. We would also like to offer other services such as mailing lists and newsgroups to our members. All of this will require access to the console of the machine at some point. Proposed Solution CAC's security concerns for the computer room are quite valid. Since our server currently runs an operating system that requires console access for anything more than trivial account and file maintenance, we would like to move the server to a more accessible location. An upstairs room in the Computer Building would be ideal for this. The server would still be in a physically secure location, because the rooms are not generally accessible to the public. During regular business hours, though, the student administrators would be able to access the console to perform needed maintenance. Moving the server will necessarily require some server downtime. The machine will of course have to be unplugged, and its IP address may even have to change. We would like to minimize this downtime, by coordinating an effort with network administrators and other personnel involved. We would prefer to participate in the move if possible. Issue 2 - Hardware and Software Upgrades Problem The server's hardware and software are outdated. Our biggest problem is memory: 32 MB of RAM is not nearly enough to run a Windows NT web server. Over 70 MB of swap space is in use on average. This makes the server very slow when it is under heavy load or when we try to do anything with it other than serve web pages. This includes using the telnet server and accessing files via SMB, our two main methods of remote administration. As the machine is already at capacity, we cannot offer new services to groups such as distributed filesystems, mailing lists, and newsgroups. Also, when Windows 2000 (NT 5.0) is released, it will most likely require significantly more resources than NT 4.0. The server is currently running Microsoft Internet Information Server 3.0 without any encryption services installed. All ftp and web administration passwords are sent in the clear. While it may not be practical to encrypt all ftp transactions without wide spread client support, we feel that all administrative transactions should be protected, perhaps via an SSL module or digital certificates (see Item #3). Proposed Solution We would like to have a new machine that we can install, configure, and bring online before the current server becomes overwhelmed. The necessary configuration of the new machine could take place while the existing server remains online, thus minimizing downtime. Once the new server is ready to "go live" we could simply transfer the user database and web sites from the old server and change the DNS servers to point to the new machine. This new machine would ideally be of Pentium II class or similar generation Intel based hardware, with at least 128 MB of RAM and a larger hard disk. We would also wish to preserve the current machine for our own uses. We would also like to keep it for use as a test server, to evaluate new software and updates before installing them on the main server. The old machine would also be of use as a backup server and as a backup web server. We are also interested in using extra DNS entries for our two hosts. One example we had in mind was labeling the original server as interface1.cac.psu.edu, and the new server as interface2.cac.psu.edu using "A" (IP address) resource records. The server we wish to be running at any point could be assigned the "official" DNS of interface.cac.psu.edu, changing only that one "A" record to match the IP address of the running server. The two nicknames, www.clubs.psu.edu and ftp.clubs.psu.edu, would follow the "official" canonical name without any additional configuration. In considering the means of a budget to sponsor our requests, I have found favorable response in CAC helping us once again. If we need more funds beyond what CAC is ready to supply now, we may also query with the University Park Allocation Committee (UPAC) for assistance. Issue 3 - Security Problem The current configuration for the server is inadequate for effective administration or security. We have resorted to partial solutions such as the NT Wed Admin tool and the NT telnet server to perform administrative tasks. These use no encryption and are unstable. Newer versions of the software address these problems, but installation is difficult without console access (see above). Without console access, we are unable to perform complete administration. Many services we have provided in the past such as ODBC, FrontPage, and new ones such as SSL, and Kerberos can not be functional without console development. We also cannot upgrade the web server software, adjust the disk space usage or any other hardware upgrade, or apply security patches. Account management and passwords also pose their own problems. Users are provided a password to use for the server over email. This not only travels in clear-text, but may also sit for extended periods of time in insecure places such as mail spools and shared media. It is unclear to many users that this password is for individual use only. This confusion leads to password sharing, which is common among our uses. The extended duration of time it takes to request a new account due to our hardcopy application s also compounds the problem by making password sharing even more appealing. Even those users who understand that their password is for personal use only do not feel compromised if their password is discovered, since it is only for the club space, and not for additional services such as personal email. Further confusion occurs because this password is different from their Access Account password, since users have the same userid on the clubs server as their Access ID. The hardcopy forms we use for account requests are too slow for all parties involved. It takes much too long for us to process the forms, interpret handwriting, and email for more information when discrepancies are found. It is also discouraging for applying account holders since they do not get immediate results when they submit form (as is provided, for example, by the account management services on www.work.psu.edu). Forms take an average of two to three weeks to process, while the personal service request requires merely two to three business days to be set up. Proposed Solution We would like to attend to these needs as stated with a move of the console (Issue #1), hardware upgrade (Issue #2), change of authentication system (Issue #5), and increased automation of the application process. Many of these needs such as the installation of SSL, new scripts and hard disk setup can be done after console access is re-acquired. We also would like an authoritative digital certificate for SSL use, if possible. Using a certificate which bears CAC's name and digital identity may be ideal. If not, we may use our own certificate. Issue 4 - Backups Problem The server currently has no backups of the operating system or users' data. If the server's disks were to fail, the server would be down for days or weeks until it could be completely reinstalled. While users should be keeping copies of their pages, some groups undoubtedly do not. Proposed Solution Since the CAC already provides network-based backup services, this service would be the most natural choice for backup. The most important data is currently the operating system and server configuration. This would make restoring the server after a disk c rash much easier. If possible, we would like to have the web documents backed up as well to further minimize the disruption caused by a disk failure. If network backup from the CAC is not possible, we would like to purchase a tape drive for the machine. This will be less convenient, though, because someone will have to change the tape in the drive on a regular basis. Use of a tape backup will also require our physical access to the server as discussed above. Issue 5 - User authentication Problem The server currently maintains its own accounts and passwords for users. This means that users must remember a separate password for our service than for the rest of their Penn State accounts. Also, we have no easy way of determining when an account should be deleted. Users who are no longer associated with the University currently do not get their accounts removed. Proposed Solution We would like to use the University's Kerberos capabilities for user authentication and a local database for authorization to resources on the clubs server. This would provide us with the maximum flexibility in user management, in that it would address the password problems discussed above (Item 3) but not open the clubs server up to anyone with a valid Access ID. We would still add users to our system, so it would not be open to just anyone with an Access Account. This would let users have only one pass word, and would automatically deny access to users who no longer had an Access Account. We realize that Kerberos may not work well with Windows NT 4.0. If we are able to acquire a new server in the near future, we could install a Unix-based operating system (such as Solaris x86) on the old machine and use it as an authentication server if Unix based Kerberos is easier. We will need a good deal of help from CAC personnel to make this work. While some members of the committee are familiar with Kerberos, we are certainly not experts. Issue 6 - Distributed Filesystems Problem The CAC currently has a site license for AFS and DFS from Transarc Corporation. These distributed filesystems can provide us and our users with more flexibility in maintaining their files. It will also be more secure than transmitting passwords in the clear via FTP. Proposed Solution We would like to explore the possibility of making the server's files available via AFS or DFS. This will provide our users and administrators with an alternative to ftp and SMB sharing for file access. Again, this will require help from CAC personnel. Issue 7 - Organizational Status Problem Originally, the server was run by Interface, which was an official student organization under the auspices of USG. During the summer of 1998, Interface's official status was revoked due to a lack of members. At that time our mailbox in the HUB Desk was also removed. After the demise of Interface, no one was processing applications for the server. The current members of the committee have become involved out of personal motivation and a commitment to keep the clubs server online. We were approached by USG last spring about the closing of Interface, and the idea of building the Student Activity Server Committee under their ownership. The USG Supreme Court had ratified us as becoming the Committee, however new leadership and word of the new HUB networks had prevented the plan from finishing by Fall of 1998. The Student Activity Server Committee currently has no official parent organization. We currently have no mailbox for accepting applications and no budget. Most importantly, we have no official authorization to exist. If our current contacts in the CAC were lost, someone could pull the plug on the server and we would have no one to turn to for support. Proposed Solution We would like to become a part of an official organization on campus. The two logical choices for this are the CAC and USG. The CAC provided the initial hardware for the service, provides the network connectivity, and provided technical assistance through out the past three years. USG is the umbrella organization for the student groups we serve. The Office of Student Activities may also be a choice for us. They may have better control over student organizations than USG and especially CAC. We would also wish to request help in finding a new mailbox before the need for hardcopy applications is eliminated in favor of electronic submittal methods. One alternative is the accounts office, or an "honorary" mailbox with the HUB. We would prefer a more secure location than the HUB for we have lost several applications there. It is also imperative that we find a new mailbox by the semester's end since applications are currently handled through the SAS coordinator's personal mailbox. Summary We realize that many challenges confront us in the near future. The policy to have students work on the server versus not, who will take ownership of the committee and/or server administration, and the details of future projects all need to be discussed. Yet we of the Committee are committed to pursuing the best service possible to the University and wish to improve the service in the very necessary ways we can to the best of our ability in the near future. We wish that the agents we call upon may help us first proceed with the time critical objectives, such as hardware access and upgrades, and a mailbox before the semester ends. We also wish to continue our efforts to streamline the service to the benefit of the student organizations, and the ease of the administrators with the conscious effort of improved security in the following year. We ask each of you to speak what you and your organization can provide for us and what your plans are to help. The key to our success is coordination. Thank you for your time and consideration. The Student Activity Server Committee - ActivityServer@psu.edu Proposal authors: Jeff D'Angelo <dangelo@cse.psu.edu> - Coordinator James Juran <jrj120@psu.edu> Derek Morr <dvm105@psu.edu> Contributors and SAS staff: Rob Bender <rgb@worldofcheese.org> Jason Nichols <jwn114@psu.edu> Paul Rentschler <prentschler@talon.net> Benjamin R. Hauger <redevil@psu.edu> Rich Underwood <rxu105@psu.edu> Buck Thompson <buck-thompson@psu.edu> Bob Meier <bmeier@psu.edu> Jeff Schlanger <jds222@hotmail.com> Eric Prescott <prescott@cse.psu.edu> Randy Ward <jrw186@psu.edu>