Lecture4_Basic System Network Administration
Lecture4_Basic System Network Administration
1
Security Awareness
• When a computer is connected to a network, it is
under potential attack!
• Physical network/machine protection
• Attacks are from the network and through servers
run by the computer
– Remove the services if you don’t need them
• Internet attacks
– Worms
– Viruses
– Malware
– Denial of Service (DoS), Distributed DoS (DDoS)
2
Security Awareness (cont.)
• Computer/Internet hazards
– SPAM/UCE (Unsolicited Commercial Email)
– Phishing
– Disk crashes/data loss
– Loss of services due to outage
– TCP/IP spoofing and sniffing (privacy)
– Pornography
– Ignorant users
– Grumpy (former) employees
– Administrators of the untrained kind
– …
3
Roles in a Network Community
• To be a good system admin, you should be aware of the
roles in a network community and their strengths and
weaknesses.
• Important roles include users, hosts, network
components
g. routers and operating systems.
– Users - should be trained to be aware of the community. Human
beings are usually the weakest link.
– Host machines - should be allocated different tasks on different
server machines
– Routers/gateways – affect network security and performance
– OS - have different pros and cons
• UNIX/Linux, Windows, MAC OS, Netware
4
Network
• Administration
Administration models
– Reboot for personal computers
– Manual
– Automation (scripting)
– Immunology (self-maintenance)
• Network organisation
– Homogeneity/uniformity
– Delegation and resource sharing
• Principles of stable infrastructure
– Scalability
– Reliability
– Redundancy
– Homogeneity/uniformity
– Reproducibility
5
Network Kits
• Configuration tools
– ifconfig
– route
• How to find out info about your network?
– uname -a
– Find name server in /etc/resolv.conf
– Various configuration files such as /etc/services, /etc/inetd.conf
• Find out info about other domains
– dig or host
• If there is a problem from another domain
– Send email to postmaster@domain or webmaster@domain,
www@domain
– Use whois domain to get info about a domain
6
Network Kits (cont.)
• Diagnostic/query tools
– wireshark
– ping
– traceroute/tracepath
– netstat
– lsof
• Discover what you can do about a network
– nmap: scan a network for security holes.
• Proprietary network monitoring software
– E.g. from Cisco
7
User Management
• User account
– Includes all the files, resources, and info belonging to
one user. For commercial systems, it may include
billing info.
• Create a new account
– adduser
– Account info: username, password, user id, group id,
full name of user, home directory, login shell
– In the /etc/passwd file,
• Amber:x:1000:100:Amber Dawn:/home/amber:/bin/bash
– Check after adding
8
User Management (cont.)
• Involved files
– /etc/passwd, /etc/group, /etc/shadow
– In /etc/shadow,
– Chloe:$2a$05$wa7xVOqOH4lVOrh.qa9ivSX0G0QUCFqbk11YV6:14743:0:99999:7:::
– Username:encrypted password:last password
change:minimum:expiration:warning:disabled:diabled
date:reserved
• User login environment
– .bash_profile, .bashrc, /etc/profile
– Place global files such as profile under /etc
• Other scripts can be referred in it
– Use env/set to check/set your environment
• Paths and prompts
– Keep a copy of your shell scripts (initial setups) in order to survive
them from upgrade of OS/software
• For more detailed info, man bash
9
User Management (cont.)
• Password
– Very important for security
– Should not be names of persons, books, places, your computer, nor your
phone number, birthday, car registration plate, login name, words in
dictionaries, keyboard sequence
– Should be composed of letters (lower and upper cases), digits, and special
characters like $,@
– Refer to http://en.wikipedia.org/wiki/Password_strength
– passwd imposes similar rules to make passwords secure.
– Change frequently
• User id and group id
– Users should be divided into groups for security reasons, e.g. students,
staff, admin
– Special users/groups: nobody, mail, ftp
• addgroup
– In /etc/group,
– video:x:33:hzy,paul,kai
– Group name:password:group id;list of members
10
User Management (cont.)
• Remove a user: deluser
– The relevant lines from /etc/passwd, /etc/group, and /
etc/shadow will be removed.
– It is a good idea to first disable the account before you
start removing stuff
• Disable a user temporarily
– A better way when you are not sure if a user will come
back
– Way 1: Put an * in the password field of /etc/passwd
or /etc/shadow
– Way 2: use passwd -{l|u} username
– Way 3: Change the login shell to a script file
11
User Management (cont.)
• How to manage user accounts on different
computers?
– Share home directory using NFS
– Share passwords using NIS (Network Information
System) or LDAP (lightweight directory access
protocol)
– Allocate an Email server
– Directory services like LDAP
• How to remember different passwords for
different accounts on different computers?
12
User Management (cont.)
• Control user resources
– Disk space
• Separate disk partition for problem users
– Use df command to monitor space
– Quotas and limits
• Better not to put them on users until necessary
• Check limits.conf under /etc/security
– Killing old processes: kill
• Don’t do it unless you are absolutely sure
• Account policy
– Who shouldn’t have a user code?
– How to deal with weak passwords?
13
User Management (cont.)
• User support services
– cshelp
• User training and well-being
• How to treat the users?
– Your adversaries?
– Your friends?
– Your co-operators?
– …
14
Keeping Time
• Time zone
• Showing and setting time
– date
– date -u: showing the universal time
– Get a time stamp: date +%y%m%d%H%M%S
• Hardware and software clocks
– Use date to update software clock
– Then use hwclock -w to set hardware clock
15
Keeping Time (cont.)
• Time server
– Use some time server with accurate time
– netdate udp hostname will set the time of the current machine to
that of hostname (It seems netdate is not available now)
– Can automatically adjust time by putting the command in cron
table.
– Can also use NTP for more accuracy
• Network Time Protocol (NTP)
– Used to synchronize the time of a computer to another time server
or reference time source.
• ntpdate
– Accuracy: 1 ms to dozens of milliseconds
– Cryptography for security
– How does it work? For more details, please refer to http://
www.ntp.org/
16
Host Management
• Shutting down a host
– Turn off the power?
– Should use command shutdown
– shutdown -h time halt the system. time can be now.
– shutdown -r time reboot the system
• Log files and audits
– syslogd: a daemon for logging messages. Its configuration file is /
etc/syslog.conf
– dmesg: check kernel messages
– lastlog: check the last login time of every user
– syslog under /var/log: the log file of the system
– They should be rotated regularly
17
Host Management (cont.)
• Making a file system (formatting)
– Disk utilities for CD/DVD
– make file systems: mkfs/mke2fs
• mkfs -t fstype <device name>
– Dump file system info: dumpe2fs
• Make a device
– mknod or /dev/MAKEDEV
– Make a device name in a file format so that you may be able to use
the device as a file
18
Software Installation
• How to separate different third party software?
– One software per directory?
• GNU software structure
– lib, bin, sbin, etc, src
• GNU software installation
– ./configure
– make
– make -n install: before real installation.
– make install
• Package management
– apt-get, rpm
19
Summary
• Which files are involved in
user management?
• Different roles in a network
community
• What should a strong password
look like?
• How to support users? Like cshelp,
user training, friendly attitude.
20