Create topology five in virtnet

Assignment Help Computer Network Security
Reference no: EM132370395

Question 1. HTTPS and Certificates

For this question you must use virtnet to study HTTPS and certificates. This assumes you have already setup and are familiar with virtnet. See Moodle and tutorial instructions for information on setting up and using virtnet, deploying the website, and testing the website.

Your task is to setup a web server that supports HTTPS. The tasks and sub-questions are grouped into multiple phases.

Phase 1: Setup Topology

1. Create topology 5 in virtnet.

2. Deploy the MyUni demo website, with node3 being the real web server.

3. Change the domain name from www.myuni.edu to www.[StudentID].edu by editing the /etc/hosts file on node1.

Phase 2: Certificate Signing Request

You will need to use the files made available to you for download from Assignment 1.

1. Using [StudentID]-keypair.pem you must create a Certificate Signing Request called [StudentID]-csr.pem. The CSR must contain these field values:

• State: state of your campus

• Locality: city of your campus

• Organisation Name: your full name

• Common Name: www.[StudentID].edu

• Email address: your @cqumail address

• Other field values must be selected appropriately.

Phase 3: Certificate from CA

Send your Certificate Signing Request file to your Certificate Authority. The method of contacting your CA will be published on Moodle. You will be issued with a certificate called [StudentID]-cert.pem from CA (or in the case of an error, a response indicating the CSR is
not valid).

Note that there may be a delay of up to 24 hours during weekdays (and 48 hours over the weekend) for the CA to respond to your CSR. Further details of the process can be found on Moodle.

Phase 3: HTTPs Configuration

1. Configure Apache web server on node3 to use HTTPS. Remember the domain name must be www.[StudentID].edu where [StudentID] is replace with your actual student ID.

2. Load the CA certificate into the client on node1. The CA certificate can be downloaded from Moodle.

Phase 4: Testing

1. Start capturing on node2 using tcpdump.

2. On node1, use lynx to visit https://www.[StudentID].edu/grades/ and login to view some grades.

3. Exit lynx.

4. Stop capturing and save the file as [StudentID]-https.pcap.

Phase 5: Analysis

(a) Add the CSR [StudentID]-csr.pem to [StudentID]-files.zip.

(b) Add the issued certificate [StudentID]-cert.pem to [StudentID]-files.zip.

(c) Add the packet capture [StudentID]-https.pcap to [StudentID]-files.zip.

Assuming an attacker only has access to the packet capture (i.e. traffic between web browser and web server - they don't know about the network structure or that there are only three nodes), for the following, discuss what the attacker learns and how, or what they cannot learn and why not. For example, if the attacker can learn the information, explain what is the value they learn, what packet(s) they learn it from and how. If the attacker cannot learn the information, then explain why they cannot learn it.

What does the attacker know about the:

(d) domain of the website that the client visited

(e) IP address of the client's computer

(f) application layer protocol being used between client and server

(g) specific web page a client requested

(h) size of a web page sent by server to client

(i) username and password the client uses to login to the grading system

(j) browsing behaviour of the web browser user, with regards to when they navigate between pages

(k) encryption algorithm(s) used, if any

(l) CA that the web server uses.

Now consider the role of certificates in this question.

(m)There were two different certificates exchanged between server and browser. For each certificate complete the following information.

Information

Whose public key is included?

What hash algorithm was used in signing?

Whose private key was used

When creating the certificate?

(n) Referring to the certificates, explain how the web browser is certain that the web server it is communicating with is in fact the web server for the request domain (i.e. www.[StudentId].edu).

(o) Explain why self-signed certificates are generally used for CA's, but not used for web servers.

Question 2. Firewalls and iptables

In this question you will use iptables and virtnet to create a firewall on node2 of the topology used in the previous questions. node1 is considered external and node3 is internal. Although there are only 3 machines in the topology, when creating your rules you must assume
there will be more than that. For example, while there is only 1 internal subnet, there may be more than 2 internal nodes on that subnet (you don't have to create additional nodes in virtnet; just design the rules assuming they are there).

Phase 1: Change SSH Server Port

SSH servers by default use port 22. However, the port can be changed by editing the SSH server configuration file: /etc/ssh/sshd_config. For the change take effect, the SSH server needs to be restarted with:

sudo systemctl restart sshd

Once the SSH server port has changed, then SSH clients can specify the port using the -p option, e.g.

ssh -p <PORT> <IP>

Change the SSH server port on node3 to 22XY where XY is the last two digits of your student ID. For example, with the student ID 12345678, the port would be 2278.

Phase 2: Setup the Firewall

You need to setup an iptables based firewall on node2. The firewall must use SPI and have a default policy of DROP. Configure the firewall to implement the following security policy.

• All external nodes can access the HTTPS web server on node3.

• No external nodes can use HTTP to access the web server on node3.

• Only computers on the same subnet as node1 (including node1) can access the SSH server on node3.

• node1 is the only external node that can access a special server using port 50326 on node3.

• All internal nodes can access HTTP and HTTPS servers on any external node.

• node3 is the only internal node that can access external SSH servers.

• node3 is allowed to ping external nodes, but no other internal node can ping out, and no external node can ping in.

Remember that while node1 is the only external node, and node3 is the only internal node, you must write your firewall rules assuming there are other internal/external nodes, on potentially different subnets.

Phase 3: Test the Firewall and Servers

You should extensively test your firewall and servers to ensure the security policies (of the firewall and file access control) are implemented correctly. To test the firewall you can use wget for HTTP/HTTPS, ssh for SSH and netcat for other services. For example, you can use
netcat in server mode to start a server on a chosen port, and then use netcat in client mode to attempt to connect to that server (see Assignment 1 instructions for netcat examples).

To demonstrate that your firewall and servers are working correctly, take screenshots of the following scenarios. Each screenshot (except number 4) must clearly show only node1 and must be taken with the in-built VirtualBox screenshot tool (View menu -- Take Screenshot).

Screenshot 1, saved as [StudentID]-screenshot1.png. Run the following commands and then take the screenshot:

• clear

• wget -T 3 -t 2 https://www.[StudentID].edu/grades/

The -T option specifies a timeout of 3 seconds and -t option specifies 2 retries.

Screenshot 2, saved as [StudentID]-screenshot2.png. Run the following commands and then take the screenshot:

• clear

• ssh -p 22XY www.[StudentID].edu

• Enter the correct password for the user if prompted.

This command specifies the user using the -l option and the port using the -p option. The port is that used in phase 1.

Screenshot 3, saved as [StudentID]-screenshot3.png. Run the following commands and then take the screenshot:

• clear

• ssh -p 22 www.[StudentID].edu

• Enter the correct password for the user if prompted.

Note the above uses port 22, not port 22XY.

Screenshot 4, saved as [StudentID]-screenshot4.png. Use netcat to demonstrate that node1 can access the special server on port 50326 on node3. For this screenshot you must use another screenshot tool (e.g. Windows Snipping Tool) to take a screenshot of both node1 and node3 at the same time (e.g. two windows), so that the one screenshot shows both the netcat client on node1 and the netcat server on node3.

Phase 4: Save the Rules

Once you have determined the firewall is correct, save the rules to a file using: sudo iptables-save -c > [StudentID]-iptables.txt

This should create the file [StudentID]-iptables.txt which contains a summary of your rules. Note that the rules saved must have been tested when possible. Don't flush/delete and then re-add the rules before saving; save the rules that are tested.

Phase 5: Analysis

You must include the screenshots in your report - do not submit the screenshot files separately.

(a) Include [StudentID]-screenshot1.png in your report.

(b) Include [StudentID]-screenshot2.png in your report.

(c) Include [StudentID]-screenshot3.png in your report.

(d) Include [StudentID]-screenshot4.png in your report.

(e) Add [StudentID]-iptables.txt to [StudentID]-files.zip.

(f) Some websites are accessible via both HTTP and HTTPS, while some only HTTP, and others only HTTPS. From the perspective of a web server operator or admin, explain why it may be beneficial to support only HTTPS (as opposed to both HTTP and HTTPS). Consider what an attacker could try to do if a web server supported both HTTP and HTTPS.

(g) The firewall was setup so that only a certain computer (node1) could access the special server on port 50326. Explain how an external attacker (that could not gain access to or compromise node1) could attempt to gain access to the special server.

Question 3. Network Security

You are tasked with designing a network upgrade for a local business. The business currently has a wired network (Ethernet LAN) across two floors of their office building, connecting approximately 25 desktop computers, several servers and 10's of other devices (e.g. printers, payment terminals, machinery). There are currently 50 full-time and part-time employees, some working in the office while others are outside or in an external workshop. The network and servers are currently setup with a centralised authentication server, e.g. a user can login with their username/password from any computer on the network. The network upgrade has two main components:

• A wireless LAN to allow all employees access to the internal network from within the office, outside and in the workshop. Customers of the business may also be granted guest access to the wireless LAN. The wireless LAN will most likely need more than 10 APs and have 50 to 100 clients.

• A VPN to allow selected employees to access the internal network from home or when visiting customers at other locations.

The business has one IT employee who is capable with computer networking (e.g. they previously setup the wired LAN), but has little knowledge of security. Answer the following questions assuming that you are explaining to the IT employee (as they need to build the
network).

(a) Draw a network diagram that illustrates the wired network, wireless network, and VPN. You should not draw all users and devices; only draw a sample of the users and devices. For example, several switches, several APs, several wired computers, several WiFi users, 1 or 2 VPN external users. (Several may be 2 to 5). Also, clearly indicate which portions of the network have data encrypted due to either WiFi encryption or the VPN (for example, mark those paths that have encryption in red or some other clear label). Now consider the wireless LAN security mechanisms that may be considered.

(b) Explain how MAC address filtering works as a security mechanism. Your explanation should make it clear to the IT employee what they would need to do if it was chosen to be implemented.

(c) Discuss the advantages and disadvantages of using MAC filtering, and give a recommendation to the IT employee whether to use it or not. The recommendation should be clearly justified (e.g. referring to the advantages and disadvantages).

(d) A simple setup to provide authentication and encryption would be to use WPA2 Personal. Explain to the IT employee what they would need to do to setup WPA2 Personal on APs and employee computers (including mobile phones).

(e) WPA2 typically uses AES128 or AES256. Assuming AES128, explain to the IT employee the difference between the following key/password selection schemes with respect to security and convenience:

• Random 128 bit binary value

• Random 16 digit hex value

• Random 12 character string, where the character set is: uppercase English, lowercase English, digits 0 to 9, and the 10 characters , . / ? [ ] { } ( )

(f) Rather than having a single key/password for all WiFi device, the IT employee wants individual company employees to use their existing user name and password (from the centralised authentication server) to get access to WiFi. Explain what the IT employee would need to setup.

(g) One aim is to keep the guest customer's WiFi traffic separate from the employee's WiFi traffic. Explain what the IT employee would need to do to set this up. Include in your explanation the brand/model/version of a specific AP that supports such setup, as well as a screenshot(s) that shows the settings page of that AP where you set the SSID to your [StudentID].

You may use emulators for the AP settings (you don't need to set a real AP, although you may do so if you have access). The screenshot should clearly show your StudentID in the SSID field.

Now consider the VPN component of the network.

(h) Explain to the IT employee what is a typical setup to support the VPN. This may include what software or hardware components are necessary and where, what configuration users may have to perform and/or what configuration the IT employee may have the perform.

(i) Select two VPN tunnelling protocols that may be used, and explain to the IT employee the advantages and disadvantages of each.

(j) Take a screenshot (or photo) of the VPN settings on a mobile phone, where the name or profile of the VPN is set to your [StudentID] and one of the tunnelling protocols from above is selected. You don't need to complete the setup of the VPN on your phone; just take of a screenshot of the settings.

Now consider the centralised authentication server used in the business, which uses Linuxbased authentication. The IT employee has  informed you that a past employee (who has since left the business) most likely stole a copy of the /etc/passwd and /etc/shadow file from the authentication server. They told you the system used MD5 without a salt.

(k) Explain to the IT employee how the past employee could find the password of the Manager of the business from the stolen files. Refer to the specific files and information in those files, and give the steps of what the past employee would do.

(l) Recommend to the IT employee a more secure method for password storage in Linux, referring to specific algorithms and/or data to be stored. Explain why it is more secure.

(m)Given the passwords of all users should be reset, write a set of recommendations that the IT employee can give staff regarding choosing their new password. For each recommendation you give, justify it with respect to the security and/or convenience.

Attachment:- Assignment Template.rar

Reference no: EM132370395

Questions Cloud

How this relates to cryptography today : In this essay, discuss what you have learned on steganography and how this relates to cryptography today.
What barriers exist that prevent social workers : With the requirement of social and political action among social workers, there is little political activity among clinical social workers. Why?
The demand for analysis and modeling skills : Discusses the practitioners in policy informatics and the demand for analysis and modeling skills.
Irrational for allison to invest in the bond fund : Is it rational or irrational for Allison to invest in the bond fund rather than in stocks? CHOOSE ANSWER BELOW
Create topology five in virtnet : COIT20262 - Advanced Network Security-Central Queensland University-Australia-Deploy the MyUni demo website, with node3 being the real web server.
Which family theory did you find to be most helpful : Which family theory did you find to be most helpful in your analysis? Finally, indicate whether Satir's or Minuchin's model is the more strength-based model.
What is the present value of the payments : Suppose you are going to receive $6,000 per year for 9 years. The appropriate interest rate is 9 percent.
Core functions of the global financial service : describes eight core functions of the global financial service sector which blockchain technology will likely change.
Calculate the estimated raroc of loan : If the fee income on this loan is 0.4% and the spread over the cost of funds to the bank is 1%, calculate the estimated RAROC of this loan.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Describe the importance of standards organizations

A number of organizations exist to define information security standards. Explain the importance of standards organizations with regard to both information systems and information systems security

  How does security play a major role in todays network design

How does security play a major role in today's network design? What is the biggest concern thread to data security? What is the best way to secure your network from data breaches?

  Analyze personal privacy issues related to various business

Analyze personal privacy issues related to various personal and business-related cybersecurity scenarios. Describe the mission of each (from their website), and examine and compare details of each stated privacy policy.

  Design a new public key encryption scheme

Design a new public key encryption scheme - de ne and then show the correctness of the new scheme II.

  Research in detail at least one cyber criminal case

Take some time and research a several articles on the Cyber Criminals Most Wanted site at ccmostwanted.

  How would you divide up your network to satisfy requirements

You are an ISP that has been assigned a class B network with the address 145.34.0.0. You know you will service 200 to 250 small companies.

  Evaluate the given video in terms of ethics

Evaluate this video in terms of ethics. Was Snowden's whistleblowing justified? Are NSA actions ethical? Is Snowden a hero or a traitor?

  Standard for public-key certificate formats

Standard for public-key certificate formats. X.509 specifies an authentication protocol. The original version of X.509 contains a security flaw.

  Beat the hacker

A honeypot can be a useful for discovering some of the hacking trends occurring within an organization. Of course, there have to be certain measures placed upon its operation, maintenance

  Discuss the major types of security mechanisms

Discuss the major types of security mechanisms that must be in place to ensure hospital compliance with HIPPA requirements.

  Compare the performance of various wireless networks

BN303 Wireless Networks & Security Assignment - Use of a WLAN Tools in an enterprise setting. Test and compare the performance of various wireless networks

  Discuss the major challenges in continuous monitoring

Let's evaluate some technologies that can help with continuous monitoring. One example is Cyberscope which is an automated reporting tool for security.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd