Unit 4
Unit 4
SECURITY
Structure Page Nos.
4.0 Introduction 70
4.1 Objectives 71
4.2 Networks and Security 71
4.3 User Security Management 72
4.4 Disk Security Management 74
4.5 Security Configuration and Analysis 76
4.6 Account Policies 77
4.7 Permissions and Restrictions 81
4.8 Configuring Network Settings 84
4.9 Advance Troubleshooting 85
4.10 Summary 88
4.11 Answers to Check Your Progress 88
4.12 Further Readings 89
4.0 INTRODUCTION
Network management includes the activities, methods, procedures, and tools that
pertain to the operation, administration, maintenance, and provisioning of networked
systems. Network Operation deals with keeping the network up and running
smoothly. It includes monitoring the network to diagnose and identify problems as
soon as possible, ideally before users are get affected. Network administration deals
with keeping track of resources or components in the network and how these
resources are assigned and do necessary steps to keep the network under control.
Network maintenance is concerned with performing repairs and upgrades. For
example, when the equipment must be replaced, when a router needs a patch for an
operating system image and when a new switch is added to a network and so on.
Maintenance also involves corrective and preventive measures to make the managed
network run "better", such as adjusting device configuration parameters. Network
provisioning is concerned with configuring resources or components in the network
to support a given service. For example, this might include setting up the network so
that a new customer can receive voice service.
70
ion Data for network management is collected through several mechanisms, including Network Management
agents installed on network infrastructure, synthetic monitoring that simulates and Security
transactions, logs of activity, sniffers and real user monitoring. In the past, network
management mainly consists of monitoring whether devices in the network were up
or down, but today performance management has become a crucial part of the IT
team's role.
4.1 OBJECTIVES
After going through this unit, you will be able to:
• understand the network management and security;
• know how user management can be done in a security perspective;
• understand disk management in a security perspective;
• find account policies and specially password policy;
• find various user permissions and restrictions; and
• understand troubleshooting of network and available tools.
Network devices that originate, route and terminate the data are called network nodes.
Nodes can include hosts such as servers and personal computers, as well as
networking hardware. Computer networks support applications such as access to the
World Wide Web, shared use of application and storage servers, printers, and fax
machines, and use of email and instant messaging applications.
Security services
The following are various security services or parameters to enhance the security of a
systems, applications, data and are intended to counter security attacks.
• Authentication
• Authorization & Access Control
• Availability
• Confidentiality
• Integrity
• Nonrepudiation
The User Management logout capability also provides more secure control over the
state of users. For example, when using IP authentication mode, users are identified
by the specified IP address until the IP surrogate time expires. If another person were
to use that computer before the IP surrogate time expired, they would be treated as the
original user. The common solution for preventing this scenario is to decrease the IP
surrogate expiry time, causing the user to be challenged more often. Another key
benefit of User Management is visibility into active user sessions. Using the
Management Console and CLI, administrators can view all active users and filter
display data by user, IP address, or realm for easier viewing. This can be useful for
identifying the general login status of users or for making real-time decisions such as
immediately logging off a user.
The following are some of the policies implemented as part of user management in a
security perspective:
• Create genuine user-names on a system or network or a service.
• Frequently monitor unauthorized users, if any created, logged in or connected.
• Introduce timestamps on logins and logouts of users and monitor in case of odd
timings, if any activities performed.
• Keep tracking on users , who login in long time.
• Clearly add expiry date of a user at the time of user creation itself.
• Enforce policy to deactivate automatically after expiry.
• Introduce multi-level authentication such as authentication with username and
password; username, password and IP address; username, password, MAC-
address, etc.
• Limit the number of IP addresses associated with a single username.
• Limit the number of logins associated with a single IP address.
• Force a re-authentication to gain access to a particular network resource.
• Limit the login session time allowed in a particular timeframe.
73
Network Administration
With Linux 4.4 DISK SECURITY MANAGEMENT Ne
Disk Management is an activity to manage the drives installed in a computer like hard
disk drives (internal and external), optical disk drives, and flash drives. Disk
Management activities are like partition drives, format drives, assign drive letters, and
other such related. For disk management can be done either with help of a tool or
with a command to manage system disks, both local and remote.
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
75
Network Administration 2. List the Disk Management functions. Ne
With Linux
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
Security Configuration and Analysis can be done either manually with a check list or
with help of a tool that can be used to analyze and configure computer security.
Generally, users can use the tool to import one or more saved configurations to a
private security database. Importing configurations builds a machine-specific security
database that stores a composite configuration. One can apply this composite
configuration to the computer and analyze the current system configurations against
the stored composite configuration stored in the database.
76
ion Secure data on computers Network Management
and Security
Ensure that the system files and the registry are protected using strong access
control lists.
Use some available security configuration and analysis tools (for example:
secedit.exe is a Windows security configuration editor command tool) to configure,
verify and analyze the network settings. This kind of tools can be used for the
following:
• To configure security areas not affected by Group Policy settings. It includes the
areas such as security on local files and folders, registry keys, and system
services. Otherwise, Group Policy settings will override the local settings.
• Do not use such tools, when you are configuring security for a domain or an
organizational unit.
A user account policy is a document which outlines the requirements for requesting
and maintaining an account on computer systems or networks, typically within an
organization. It is very important for large sites where users typically have accounts
on many systems. Some sites have users read and sign an account policy as part of the
account request process.
Types of Accounts
Generally, accounts fall into two types such as System accounts(system users) and
Normal accounts (normal users). When an user account is created in Linux, the
details are stored in the following files:
/etc/passwd
/etc/shadow
/etc/group
where
u1:x:500:550:prog:/home/u1:/bin/bash
Where
u1 is User ID
X is mask password
500 is UID (user ID)
550 is GID (group ID)
prog is user ID comment field (generally it could be name of user)
/home/u1 is home directory of user ID and
/bin/bash is a shell
The /etc/shadow file contains the encrypted user passwords assigned by the password
binary file. Password’s are encrypted through DES (Data Encryption Standard) or
MD5 (Message Digest Ver.5) Algorithm.
Managing Users
A system administration can manage a user’s account. The various tasks that a system
administrator can perform include adding, modifying and deleting user account.
78
ion User account Creation Network Management
and Security
To create a user, use the useradd command. The syntax is
root# useradd <option> <userID>
-u is UID
-g is primary/group name/GID
-o is : Override
-G is Secondary group
-c is Comment
-d is Home directory
-s: is Shell
Example:
root# useradd murli , it creates user ID murli and assign some default values against
UID, GID, and other
user ID can also create by using all options along with the command useradd as
specified above.
User ID Modification
To modify a user, use the usermod command. The syntax is:
Example
User Deletion
To delete a user, use the userdel command. The syntax is
Example
root# userdel murli
Managing Groups
System administrator can manage a group’s account. The various tasks that a system
administrator can perform include adding, modifying and deleting group account.
Password Policy: These policy settings are used for domain or local user accounts.
They determine settings for passwords, such as enforcement and lifetimes.
Account Lockout Policy: These policy settings are used for domain or local user
accounts. They determine the circumstances and length of time that an account will
be locked out of the system.
Account UID policy: Normal user accounts should not have UID (UserID) value
0(zero). Any account has UID value 0 will get root privileges automatically. System
administrators should pay attention on UIID values at the time of account creation.
Account GID policy: Normal user accounts should not have GID (User groupID)
value 0(zero). Any user account has GID value 0 will get root privileges
automatically. System administrators should pay attention on GIID values at the time
of user account creation.
Kerberos Policy: These policy settings are used for domain user accounts. They
determine Kerberos-related settings, such as ticket lifetimes and enforcement.
Kerberos policy settings do not exist in local computer policy.
Password Policy
Password policy implementation is very essential to secure accounts and at same time
secure the systems, the network and the services. The following are some of the
parameters to be enforced as part of setting a password policy:
• Enforce password history
• Maximum password age
• Minimum password age
• Minimum password length
• Password strength ( must meet complexity requirements)
The Passwords must meet complexity requirements policy setting determines whether
passwords must meet a series of guidelines that are considered important for a strong
password. Enabling this policy setting requires passwords to meet the following
requirements:
• The password is at least six characters long
• Store password using reversible encryption for all users in the domain
• The password contains characters from three of the following four categories
• English uppercase characters (from A through Z)
• English lowercase characters (from a through z)
• Base 10 digits (from 0 through 9)
80 • Non-alphanumeric characters (for example: !, $, #, or %)
ion Account Lockout Policy Network Management
and Security
Someone who attempts to use more than a few unsuccessful passwords while trying
to log on to a system might be a malicious user attempting to determine an account
password by trial and error. Account Lockout Policy settings control the threshold for
this response and the actions to be taken after the threshold is reached. Generally, the
number of login attempts to access any critical systems such as banking or any
ecommerce applications systems are not more than three attempts. If any user fails to
access such systems 3 times, system will automatically lock such account for a
particular period. The lockout period depends on system sensitivity or organization.
The following are the parameters to be enforced as part of account lockout policy:
On Unix-like systems, the superuser (commonly known as 'root') owns all the
privileges. Ordinary users are granted only enough permissions to accomplish their
most common tasks.
81
Network Administration The following are the benefits of the principle of least privilege: Ne
With Linux
Better system stability
For example, applications running with restricted rights will not have access to
perform operations that could crash a machine, or adversely affect other applications
running on the same system.
Ease of deployment
In general, the deployment of any application with fewer privileges is easy.
Superuser
The superuser is a special user account, which has all privileges and is used for
system administration. Depending on the operating system, the actual name of this
account might be the root, administrator or supervisor. In some cases the actual name
is not significant, rather an authorization flag in the user's profile determines if
administrative functions can be performed.
In Unix-like computer operating systems, root is the conventional name of the user
who has all rights or permissions (to all files and programs) in all modes (single- or
multi-user). Regardless of the name, the superuser always has user ID (UID) 0 (zero).
The root user can do many things an ordinary user cannot, such as changing the
ownership of files or directories and many such others. The superuser account always
point at root’s home directory.
Filesystem permissions
Most current file systems have methods of assigning permissions or access rights to
specific users and groups of users. These systems control the ability of the users to
view or make changes to the contents of the filesystem.
Traditional permissions
Permissions on Unix-like systems are managed in three distinct classes such as s user,
group, and others. When a file or directory is created, its permissions are restricted by
the umask of the process that created it. Files and directories are owned by a user. The
owner determines the file's owner class. Distinct permissions apply to the owner.
Files and directories are assigned a group, which define the file's group class. Distinct
permissions apply to members of the file's group members. The owner may be a
member of the file's group. Users who are not the owner or not a member of the
group, such users treated under file’s others class. Distinct permissions will apply to
others.
The effective permissions are determined based on the user's class. For example, the
user who is the owner of the file will have the permissions given to the owner class
regardless of the permissions assigned to the group class or others class.
Permissions
The following are the three specific permissions (read, write and execute) on Unix-
like systems (flavors of UNIX like all Linux versions and others) that apply to each
class:
• The read permission grants the ability to read a file. When set for a directory, this
82 permission grants the ability to read the names of files in the directory
ion • The write permission grants the ability to modify a file. When set for a directory, Network Management
this permission grants the ability to modify entries in the directory. This includes and Security
creating files, deleting files, and renaming files.
• The execute permission grants the ability to execute a file. This permission must
be set for executable binaries (for example a compiled C++ program) or shell
scripts (for example a Perl program) in order to allow the operating system to run
files. When set for a directory, this permission grants the ability to access file
contents.
When permission is not set, the rights it would grant are denied. Files created within a
directory will not necessarily have the same permissions as that directory.
• The set user ID or setuid, or SUID mode. When a file with setuid is executed or
is on, the resulting process will assume the effective user ID given to the owner
class. It enables users to be treated temporarily as root.
• The set group ID or setgid or SGID mode. When a file with setgid is executed or
on, the resulting process will assume the group ID given to the group class. When
setgid is applied to a directory, new files and directories created under that
directory will inherit the group from that directory
• The sticky bit mode. The typical behavior of the sticky bit on executable files
encourages the kernel to retain the resulting process image in memory beyond
termination. On a directory, the sticky permission prevents users from renaming,
moving or deleting contained files owned by users other than themselves, even if
they have write permission to the directory. Only the directory owner and
superuser are exempt from this.
These modes are also referred to as setuid bit, setgid bit, and sticky bit, due to the fact
that they each occupy only one bit.
For example, the following is the output after executing a command ls –l:
[murli@imssit etc]$ ls -l |more
-rw-r--r-- 1 root root 15276 Oct 10 2006 a2ps.cfg
-rw-r--r-- 1 root root 2562 Oct 10 2006 a2ps-site.cfg
drwxr-xr-x 4 root root 4096 Apr 24 2009 acpi
-rw-r----- 1 root root 450 Jan 26 2009 auditd.conf
The first character indicates the type(is file or directory, etc) and is not related to
permissions. The remaining nine characters are in three sets, each representing a class
of permissions as three characters. The first set represents the user class. The second
set represents the group class. The third set represents the others class.
83
Network Administration Each of the three characters represent the read, write, and execute permissions: Ne
With Linux
‘r’ if reading is permitted, ‘-‘ if it is not.
‘w’ if writing is permitted, ‘-‘ if it is not.
‘x’ if execution is permitted, ‘-‘ if it is not
-rwxr-xr-x a regular file whose user class has full permissions and whose group and
others classes have only the read and execute permissions.
crw-rw-r-- a character special file whose user and group classes have the read and
write permissions and whose others class has only the read permission.
dr-x------ a directory whose user class has read and execute permissions and whose
group and others classes have no permissions.
Numeric notation
Another method for representing Unix like permissions is an octal (base-8) notation.
This notation consists of at least three digits. Each of the three rightmost digits
represents a different component of the permissions: owner, group, and others.
Problems occur at the network level where systems are connected- due to improper
configuration settings done at network components and services; at system level- the
physical hardware, the installed operating systems and the system resources.
Network troubleshooting tools are a necessity for every network administrator. When
getting started in the networking field, it is important to have number of tools that can
be used to troubleshoot a variety of different network problems and conditions.
Ping
The most commonly used network tool is the ping utility. This utility is used to
provide a basic connectivity test between the requesting host and a destination host.
This is done by using the Internet Control Message Protocol (ICMP) which has the
ability to send an echo packet to a destination host and a mechanism to listen for a
response from this host. Simply stated, if the requesting host receives a response from
the destination host, this host is reachable. This utility is commonly used to provide a
basic picture of where a specific networking problem may exist. For example, if an
internet connection is down at an office, the ping utility can be used to figure out
whether the problem exists within the office or within the network of the internet
provider.
Tracert/traceroute
Once the ping utility has been used to determine basic connectivity, the
tracert/traceroute utility can used to determine more specific information about the
path to the destination host including the route the packet takes and the response time
of these intermediate hosts The tracert utility and traceroute utilities perform the same
function but operate on different operating systems, Tracert for Windows machines
and traceroute for Linux based machines.
Ipconfig/ifconfig
One of the most important things that must be completed when troubleshooting a
networking issue is to find out the specific IP configuration of the variously affected
hosts. Sometimes this information is already known when addressing is configured
statically, but when a dynamic addressing method is used, the IP address of each host
can potentially change often. The utilities are ipconfig on Windows machines and the
ifconfig utility on Linux.
85
Network Administration Nslookup Ne
With Linux
Some of the most common networking issues revolve around issues with Dynamic
Name System (DNS) address resolution issues. DNS is used by everyone using the
internet to resolve commonly known domain names (i.e. google.com) to commonly
unknown IP addresses (i.e. 74.125.115.147). When this system does not work, most
of the functionality that people are used to goes away, as there is no way to resolve
this information. The nslookup utility can be used to lookup the specific IP
address(es) associated with a domain name. If this utility is unable to resolve this
information, there is a DNS issue. Along with simple lookup, the nslookup utility is
able to query specific DNS servers to determine an issue with the default DNS servers
configured on a host.
Netstat
Netstat utility is used to display the currently active ports on a Linux machine. This is
very important information to find for a variety of reasons. For example, when
verifying the status of a listening port on a host or to check and see what remote hosts
are connected to a local host on a specific port. It is also possible to use the netstat
utility to determine which services on a host that is associated with specific active
ports.
Putty
Putty utility is used to connect different systems remotely. Putty is being used to
connect to a host via SSH.
Nmap
The nmap utility is one of the most versatile of network tools that is available.
Regardless of how much experience a network engineer has, the nmap utility should
always be available. Nmap utility can be used for the following:
Wireshark/tcpdump
Wireshark/tcpdump utilities are the packet scanners that have the ability to capture
and analyze individual packets that are sent across a network.
Wireshark includes many different functions that provide the ability to perform a
number of different analysis including filtering by conversation (i.e. IPv4, TCP,
UDP..) and protocol analysis (HTTP, VoIP protocols (RTP, SIP, H.225..).
Tcpdump is another packet scanner that is available that provides the ability to
analyze network traffic and is very easy to configure. Tcpdump is used on a Linux
machine (various flavors) and is available for Windows as Windump.
inSSIDer
The inSSIDer utility can be used to not only scan for different networks within the 2.4
and 5 GHz ranges but also list the current signal strengths of different wireless
networks within range.
86
ion Syslog server Network Management
and Security
A simple syslog server can be installed in the field to receive network events from
key network elements. This information can then be recorded over time and help in
determining the cause of a networking problem.
87
Network Administration Check Your Progress 2 Ne
With Linux
1. Write the standard minimum requirement to create a strong password.
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
4.10 SUMMARY
The unit emphasized on network management and security issues in a network. The
user management and disk management in a security perspective are clearly and
comprehensively explained. Various user account policies along with the parameters
to be set for a password file are explained. The file permissions are explained with
different examples. Finally, the need of problem diagnosis and troubleshooting along
with available tools was also discussed.
2. Nmap utility is one of the most versatile of network tools and can be used for
the following:
89