• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Ch21 system administration
 

Ch21 system administration

on

  • 1,307 views

 

Statistics

Views

Total Views
1,307
Views on SlideShare
1,307
Embed Views
0

Actions

Likes
0
Downloads
15
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Ch21 system administration Ch21 system administration Presentation Transcript

    • Web Services Chapter 21
    • Chapter Goals
      • Understand the terminology of the WWW.
      • Understand web clients (browsers).
      • Understand web servers.
      • Understand client and server security issues.
      • Understand web performance issues.
    • Web Services
      • What is the World Wide Web (WWW)?
        • The World Wide Web is a client-server based application originally developed to distribute documentation.
          • Researchers at various locations, notably the National Center for Supercomputer Applications at the University of Illinois, extended the original design to include the distribution of a wide variety of media including
            • graphics,
            • audio,
            • video,
            • small applications or applets.
    • Web Services
        • WWW clients, known as browsers, make requests from WWW servers and display the results in the form of a page.
          •   Pages and other resources are referenced using a universal resource locator (URL).
            • The format of a URL is a resource type tag, followed by the name of the system holding the resource, followed by the path to the resource that may include option flags and other data.
            • Web pages are written in HyperText Markup Language (HTML).
              • A single web page may include text, graphics and other elements from one or more servers.
              • HTML and the format of other page elements are standardized allowing a given web page to be rendered and viewed on a wide variety of web browsers.
              • Web pages can also include forms and buttons. These allow data to be entered into the page via the web browser and communicated back to the web server.
    • Web Services
      • Web Clients
        • Administrating WWW clients is primarily a matter of keeping up to date with browser and page content development.
        • At present, leading browsers are undergoing rapid development.
        • New versions of some browsers are available as frequently as every few weeks.
        • New page content in the form of new media data types are continually being developed.
        • Not all media types are directly viewable by a given browser and not all pages follow the HTML specifications closely enough to be properly rendered by all browsers.
        • Additional software may be needed to view certain content types such as video , animated pictures and menus.
        • Such additions to the browser come in two flavors:
          • (1) extensions to the browser program itself, often called plug-ins, or
          • (2) separate applications started under the browser’s control, known as helper applications.
    • Web Services
      • Plug-ins
        • Plug-ins can be categorized into two major groups based on the application-programming interface (API) they use.
        • One group is designed for Microsoft’s Internet Explorer API, and the other group is based on the Netscape API.
          • Most browsers, such as Mozilla, Opera, Konquerer, use the Netscape API and are able to make use of plug-ins designed for that API.
        • Plug-ins are further categorized by processor architecture and operating system like other application software.
        • As one would expect, the widest selection of plug-ins for various media types is for Internet Explorer on Microsoft Windows on Intel processors.
        • Fewer plug-in choices are available for Mac OS X and Linux and very few plug-ins are available for other UNIX variants.
    • Web Services
      • Helpers
        • Helper applications are standalone programs that the browser runs to display content in formats not supported by the browser itself or a plug-in.
          • A typical helper is Real’s RealPlayer audio and video player.
            • When a user clicks on a link to a RealPlayer video clip, the browser starts the player and passes along the URL or downloads the video clip and passes the filename of the clip to the player depending on how the clip is specified on the page.
        • The system administrator needs to be aware of the media types his users will need to view.
          • Macromedia’s Flash animation player plug-in and Real’s RealPlayer audio and video player are two typical additions to the base web browser that are widely used to display content found on many web sites.
            • Some sites offer less common media types such as VRML or other 3D images, Window’s media player audio or video, Quicktime video, and others.
    • Web Services
      • Client Security Issues
        • Web browsers present several security problems revolving around the issues raised by “active content”.
          • Active content is a program or script that is downloaded as part of a web page and used to provide active features such as animated menus, special page rendering effects, error checking in forms and other features.
          • Most web browsers have the JavaScript scripting language built in.
          • Additionally, most browsers include a Java interpreter either built-in or as a plug-in.
            • Some plug-ins such as the Macromedia Flash player interpret active content and can be considered similar to a scripting language in terms of their programmability.
            • Internet Explorer on Windows systems adds the capability of both Windows scripting and executable applets known as ActiveX .
    • Web Services
      • Client Security Issues
        • The range of mischief an executable applet or script could potentially cause is large.
          • Web browsers, Java, JavaScript interpreters and other content viewers are designed with this in mind and combat the problem in varying ways. However, bugs in these tools have appeared over time and continue to appear making the display of active content a risky activity.
        • Fortunately, most browsers allow the user to optionally turn off the execution of Java applets, JavaScript programs and other active content.
          • Turning these off will disable certain interactive features of some web pages.
          • The desirability of turning these features off to gain additional security must be weighed against the requirements of the applications the user has and the web pages they need to view.
    • Web Services
      • Client Security Issues
        • Bugs in the browser itself constitute another common problem.
          • Browsers are complex, often including their own Java virtual machine as well as internal versions of ftp and other network tools.
          • System managers at sites concerned about security should continually monitor the browser vendor Web pages for updates that address security problems.
      • WARNING: There are numerous security vulnerabilities associated with downloaded applets and scripts on Microsoft Windows platforms that can affect the security of other systems on a network. These include the unintended installation of malicious software that may examine or disrupt network traffic or adversely effect the operation of servers and other networked systems. Security conscious sites need to consider not only the security of their servers, but also the risks involved in their choice of client platforms and software.
    • Web Services
      • Client Security Issues
        • Another client security issue is referring page information.
          • Many web browsers pass along the URL of the page they came from to the web server of the next page they load.
            • This is done to help web sites track how people get to their site. However any information encoded in the URL is passed along as well.
            • Such additional data may include information believed to be secure if the browser moves from a secure page to an unsecured page.
            • Many Web sites avoid this problem by “wiping the browser’s feet” via directing the browser to a blank or unrevealing page after requesting secure information.
            • By default, many browsers will alert users to this problem by posting an alert message when the user moves from a secure page to an unsecured page.
    • Web Services
      • Client Security Issues
        • Modern browsers are capable of storing small pieces of information from Web sites such as a password or usage history.
          • These bits of information are known as “cookies.”
          • The security preferences dialog box allows those concerned about cookies to disable them or have the browser announce the delivery of a cookie from the Web site.
          • Turning off cookies will disable password memory and history features of some Web sites.
          • The decision to turn off cookies depends on the user’s concerns about her privacy and the Web pages she views most often.
    • Web Services
      • Web Servers
        • Installing and configuring a Web server is a much more involved process than configuring a web browser.
          • A Web server is a very complex daemon with numerous features that are controlled by several configuration files.
          • Web servers not only access files containing web pages, graphics and other media types for distribution to clients, they can also assemble pages from more than one file, run CGI applications, and negotiate secure communications.
          • Security and performance issues are near the top of the list when choosing, installing and configuring any web server.
    • Web Services
      • Choosing a Web Server
        • Choosing a web server involves an evaluation of several related factors.
          • Security – Web servers that serve web pages on the Internet face an extremely hostile environment.
            • They are the point of attack for persons interested in entering a system, stealing data or simply defacing web pages.
            • Web servers must properly handle a wide range of input data without fail.
            • Programs run via the web server such via the Common Gateway Interface (CGI) must likewise deal with possibly malicious input data and explicit attempts to exploit them.
    • Web Services
      • Choosing a Web Server
          • Performance – Serving web pages is often a highly I/O intensive task.
            • Many web page are constructed “on the fly” from the output of programs or as the result of a database query.
            • The performance of a web site is dependant on the performance of all the components that feed into the web pages being served.
            • Included in this is the performance of the system the web server resides on, the network it is connected to and the data storage facility being used.
    • Web Services
      • Choosing a Web Server
          • Availability – Some web servers are available for only one operating system platform.
            • Some CGI programs, database interconnections and other data sources are available for only selected platforms.
            • A careful inventory of the desired CGI programs and data sources is helpful in reducing the range of choices to those where the needed software is available.
            • Viewed another way, if a specific platform has already been selected, a review of the web servers, CGI programs, etc. that are available for the selected platform can help guide the development of the web site.
    • Web Services
      • Choosing a Web Server
      • WARNING: Based on a long string of security problems, culminating in the infamous Code Red and Nimda worms, many organizations have moved away from Microsoft’s Internet Information Server (IIS) web server. Moving away from IIS is also the recommendation of the Gartner Group.
    • Web Services
      • Apache
        • The most widely used web server on the Internet, Apache, is available for all UNIX variants and Windows NT and later.
          • Many UNIX variants such as Red Hat Linux, Mac OS X and Solaris ship Apache as part of the operating system distribution.
          • For those that do not, Apache is freely available in source code form from http://www.apache.org/
          • Aside from its wide acceptance, Apache offers a comprehensive suite of configuration options and features found on many other web servers.
    • Web Services
      • Server Add-ons
        • If a web server were all that was needed to set up a web site, life would be pretty easy for the system administrator and web master. However, the typical web server is extendable via several methods.
          • Common Gateway Interface (CGI) – The most common route to extending the functionality of the web server is via CGI.
            • Web pages can refer to CGI programs and data from forms can be passed to them.
            • Web pages can be created on the fly by CGI programs that send data via the web server directly to the client web browser.
            • CGI programs might be Perl scripts, Python scripts, or even compiled binaries.
    • Web Services
      • Server Add-ons
        • Application Servers – Tools such as Zope and php provide templates for building web pages.
          • These templates form an entry point into a scripting language and access to databases easing the development of dynamically created web pages.
        • Modules – Analogous to web browser plug-ins, modules extend the web server by directly adding functions.
          • Like web browser plug-ins, modules are specific to a particular web server and match that web server’s API.
          • Status reporting, performance enhancements such as a built-in Perl interpreter, encryption utilities, and even URL spelling correction are some of the modules that are available for the Apache web server.
    • Web Services
      • Web Server Installation
        • Apache is available in both binary form from some vendors and in source code form for all systems.
          • While a binary distribution saves time, it does not offer the level of control that building from sources offers.
          • To prepare for an installation from source code, make an inventory of the Apache modules that the web site will require.
          • Also, check that the needed build tools are available.
    • Web Services
      • Web Server Installation
        • Apache is built using the “configure and make” procedure common for many open source packages.
          • Like other packages that use the configure utility, typing “configure --help” will produce a list of all of the available option flags.
          • Additional modules not found in the base Apache distribution may require additional work.
            • For example, adding mod_ssl, to provide secure web connections requires that the OpenSSL package be installed first and that an environment variable, SSL_BASE, containing the path to OpenSSL be set when Apache is configured.
    • Web Services
      • Web Server Configuration
        • Current versions of the Apache web server are configured via a series of directives kept in a plain text file, httpd.conf.
          • The Apache server distribution includes a set of samples files that the system administrator can modify.
          • Over 100 configuration options can be applied to control the behavior of the Apache Web server.
          • Directives in the configuration files are case insensitive, but arguments to directives are often case sensitive.
          • Long directives can be extended by placing a backslash at the end of the line as a continuation character.
          • Lines beginning with a pound sign (#) are considered comments.
          • A few of the most basic options to be examined upon setting up a new Web server are examined in the next section.
    • Web Services
      • Basic Apache Directives
        • At a minimum, the system administrator will want to modify the User, Group, ServerAdmin, ServerRoot, ServerName and DocumentRoot lines to reflect the local site.
          • The User and Group lines specify the user id and group id that the Web server will operate under once started.
          • The ServerAdmin is an e-mail address to which the server can send problem reports.
          • The ServerRoot specifies the installation directory for the server.
          • The ServerName is the name of the server returns to clients.
          • The DocumentRoot directive sets the base for the default web page for the web server.
    • Web Services
      • Basic Apache Directives
        • The Alias lines may also require updating to reflect the location of icons and other local files.
          • The Alias lines allow Web page designers to use shortened names for resources such as icons instead of specifying full paths.
            • UserDir WWW
            • Alias /icons/ /usr/local/http/icons/
            • ScriptAlias /cgi-bin/ /usr/local/http/cgi-bin/
          • Besides making Web page construction easier by providing short names for icons and CGI programs, these directives allow access to users’ Web pages.
    • Web Services
      • Basic Apache Directives
        • The UserDir line specifies the subdirectory each user can create in his home directory to hold Web pages.
          • This directory, WWW in the example, is mapped to the user’s username as follows.
            • A user whose username is bob has his WWW directory mapped to http://www.astro-corp.com/ ~bob.
            • By default, the Apache Web server will display the index.html file in that directory, or a directory listing if the index.html file is not found.
            • This indexing behavior can be controlled by a set of directives, IndexIgnore, IndexOptions, and IndexOrderDefault.
            • IndexOptions in particular has numerous options.
    • Web Services
      • Basic Apache Directives
        • A new installation of Apache may also require changing the <Directory> directives to indicate where the server should look for documents to serve and for CGI programs.
          • For example, if the server is installed in /usr/local/apache with the documents and CGI programs in directories under that directory, the following <Directory > line may be necessary.
            • <Directory /usr/local/apache/htdocs>
    • Web Services
      • NOTE: The “user” and “group” directives in the httpd.conf file have significant security implications.
      • The “nobody” user is used to severely limit the access privileges the web server has in order to limit what an attacker might be able to access via the web server.
      • These directives also specify the default user under which any CGI program is run.
      • Limiting the privileges that a CGI program has access to is an important step in making the CGI program secure.
    • Web Services
      • Server Modules
        • One of the more useful features found in the Apache web server is the use of modules to extend the base server functionality.
          • These modules provide such services as web server status monitoring, encrypted connections, URL rewriting and adding native versions of CGI tools such as Perl.
          • For modules that are built as part of the standard Apache build, activating them is a matter of calling the directive associated with the module.
          • For example, here are the lines required to activate the mod_status module that allows the administrator to query the web server for status information.
            • <Location /server-status>
            • SetHandler server-status
            • Order deny,allow
            • Deny from all
            • Allow from .astro.com
            • </Location>
    • Web Services
      • Server Modules
        • The Location directive describes the “page” that is used to view that status information, while SetHandler specifies the server-status entry to the mod_status module.
        • The triple of Order, Deny and Allow directives controls access to this “page” limiting it to only hosts within the specified domain.
        • If the server’s name were www.astro.com the URL used to access this page would be, http://www.astro.com/server-status/
    • Web Services
      • Mod_ssl
        • A more complex module to configure is mod_ssl.
          • This module provides the encryption used for secure web pages.
          • Before using ssl, a certificate to be used in the authentication of the server will need to be purchased from a certification authority such as Thawte or generated and signed locally.
          • The locally generated certificates, also called self signed certificates, will be flagged by web browsers and require the user to acknowledge them before viewing the web site.
          • The web browser can authenticate certificates purchased from a certificate authority without any user interaction. 
    • Web Services
      • Mod_ssl
        • Next, several directives will need to added to the Apache configuration file to enable ssl and specify the content to be accessed using an encrypted connection.
          • Here is an example that enables ssl using high quality encryption and specifies content to use the encrypted connection.
            • SSLProtocol all
            • SSLCipherSuite HIGH:MEDIUM
            • SSLVerifyClient none
            • SSLCACertificateFile conf/ssl.crt/ca.crt
            • <Location /secure/area>
            • SSLVerifyClient require
            • SSLVerifyDepth 1
            • </Location>
    • Web Services
      • Mod_ssl
        • The ssl module has 22 directives and provides fine control over the security of the connection.
        • The effort required to obtain a certificate and configure secure web connections is well worth it.
        • Secure web connections form the basis of many other applications.
          • Two examples are web-based e-mail and web based remote system management.
        • The end-to-end encryption supplied by SSL is especially important when remote users are utilizing potentially insecure networks such as wireless networks, or network connections offered at conferences or hotels.
    • Web Services
      • Mime types
        • Web servers can serve an almost limitless range of file formats.
          • The mime.types file includes the mapping from a mime type to a file extension.
          • The most common types are provided in the sample file provided with the Apache distribution.
    • Web Services
      • Server Security Considerations
        • Web servers present a difficult security challenge.
          • They must be widely accessible to be useful, but tightly controlled to prevent security breaches.
          • They must be tolerant of any requests submitted to them, including requests specifically constructed to
            • gain unauthorized access to files or
            • to exploit bugs in
              • modules,
              • application servers,
              • CGI programs or
              • the web server itself.
    • Web Services
      • Ports 80 and 443
        • By default a web server listens on port 80 for plaintext requests and port 443 for SSL connections.
          • These are well-known ports and will be examined by attackers.
          • The port a web server listens on can be changed via the server configuration file, however this will cause web browsers to be unable to connect to the server unless the port number is included in the URL specification.
          • For example, if the web server on www.astro.com were set to listen on port 8000, the URL for the server’s default page would be : http://www.astro.com:8000
        •   WARNING: Changing the port a web server listens for requests on does not improve the security of the server . An attacker can locate the web server by scanning all of the ports open on the system.
    • Web Services
      • File Access Control
        • The control files which determine the Web server’s function as well as the log files it produces should not be accessible to the user ID the Web server runs under.
          • Individuals attempting to gain unauthorized access are thwarted to the extent that they cannot obtain information about the Web server’s configuration and function.
          • One way to tightly control access is to set the default Apache access rule to deny, and open up only those directories that contain content to be distributed.
          • For example, the httpd.conf directives shown below set the default access to deny and open up access to user web directories and a system default web page area.
    • Web Services
      • File Access Control
          • # Set default access to deny
          • <Directory />
          • Order Deny,Allow
          • Deny from all
          • </Directory>
          • # Allow access to user’s web directories
          • <Directory /usr/users/*/WWW>
          • Order Deny,Allow
          • Allow from all
          • </Directory>
          • # Allow access to the system web directory
          • <Directory /usr/local/httpd/WWW>
          • Order Deny,Allow
          • Allow from all
          • </Directory>
    • Web Services
      • File Access Control
        • In addition to the access controls found in the web server configuration files, many web servers provide access control for individual user directories by means of control files found in those directories.
          • Apache uses a file called “.htaccess” which contains directives specifying access.
          • For example, one could restrict access to a particular directory to a specific domain by placing this in the .htaccess file in the directory to be protected.
            • deny from all
            • allow from .bio.purdue.edu
          • In a .htaccess file, the options are assumed to apply to the directory the .htaccess resides in and explicit <Directory> directives like those used in the httpd.conf file are not needed.
          • The access directives can include IP address ranges and references to password databases if desired.
    • Web Services
      • Server Side Includes
        • Web server options under which Web pages include other files and execute programs should be carefully scrutinized for potential access to files not intended for distribution.
          • In particular, server side includes (SSI) should be used cautiously.
          • By default, enabling SSI allows users to execute arbitrary programs as part of an include directive.
          • The possible damage this can cause can be limited by using the suexec facility to run the referenced program in a controlled manner with privileges limited to that of the owner of the HTML file.
          • A still more restrictive and secure approach is to allow files to be included, but disallow execution.
          • This is accomplished by using the IncludesNOEXEC directive instead of the Includes directive when specifying the options allowed for a specific directory in httpd.conf.
    • Web Services
      • Server Side Includes
        • Below is an example showing how to apply this directive to a specific directory.
          • <Directory /web/docs/ssi>
          • Options IncludesNOEXEC
          • </Directory>
    • Web Services
      • CGI
        • CGI programs are among the biggest potential dangers to Web server security.
          • These programs are run based on a URL passed to the Web server by a client.
            • In normal operations this URL comes from a form or page. However, the URL provided to a CGI program can be given to the Web server by other means and can be carefully constructed to exercise bugs in the CGI program itself.
              • For example, one of the most common attacks against a web server is via the phf CGI program.
              • The phf program is not included with recent versions of Apache, but was present in earlier versions.
              • Due to poor design, phf could be easily subverted.
              • To disable this CGI program, remove it from the cgi-bin directory specified in the web server configuration file.
    • Web Services
      • CGI
        • As a general rule, any unused CGI program should be removed from the cgi-bin directory.
        • CGI programs must be carefully constructed to avert potential problems resulting from the input passed to them.
          • One successful method is to use the “tainted” variable facility found in the Perl scripting language.
          • If other languages are used, care must be taken to ensure that all possible input characters are properly handled, including shell metacharacters, quotes, asterisks, and braces.
          • Administrators must also be alert to the well-known problem of very large input strings designed to overwrite small input buffers.
          • Security conscious sites should carefully audit CGI programs before putting them into operation.
    • Web Services
      • CGI
        • WARNING: The mod_perl module for the Apache web server does not provide any security advantages over a standalone CGI program written in Perl. While it does offer a substantial performance improvement, CGI programs making use of mod_perl need to be as carefully audited as standalone CGI programs.
        • Similarly, the sysadmin should disallow user executable CGI programs.
          • Like the executable server side includes mentioned earlier, user executable CGI opens a Pandora’s box of possible vulnerabilities.
          • Limit CGI programs to a controlled directory and carefully audit any CGI programs for security vulnerabilities.
          • If it is necessary to run a CGI under the UID of a user other than the web server, a wrapper such as suexec or CGIWrap can be used.
          • The wrapper limits the damage an attacker can cause by exploiting a poorly written CGI program.
          • Wrappers are often needed when a CGI program makes use of data that is accessible only to a particular UID.
    • Web Services
      • CGI
        • Some alternative approaches to standalone CGI programs are application servers such as PHP, and ZOPE.
          • These tools provide a standardized CGI interface designed specifically to avoid problems found in input from web pages.
          • These tools also provide for rapid development of dynamic pages used in a growing number of web applications.
          • PHP is also available as an Apache module giving better performance than that of a standalone CGI program.
        • WARNING: While providing a more standardized way of using CGI, tools like ph and zope are not without problems. Application servers can contain bugs that make vulnerable to attack like any other CGI program or module.
          • For example, all versions of PHP prior to version 4.1.2 were found to have a buffer overflow that can be exploited to gain elevated privileges.
          • A privilege elevation problem was also found in ZOPE versions prior to version 2.2.1 beta 1
    • Web Services
      • Unintended Web Servers
        • The pervasiveness of web browsers has made them a common interface tool for a variety of devices and services beyond the web page.
          • This unfortunately means that there may be unsecured web servers hiding in obscure parts of a network waiting to be exploited.
          • Some of these unintended web servers include the following.
            • Solaris’s AnswerBook2 – AnswerBook2 is web based and it installs and uses a web server (dwhttpd) running on port 8888.
              • Because AnswerBook2 is a web server, it does not need to be installed on every system, a central server can be used.
              • However, it represents another possible avenue of access to a system and should not be enabled unless needed.
    • Web Services
      • Unintended Web Servers
              • The administrator can stop and start the AnswerBook2 web server with the following commands.
              • /usr/lib/ab2/lib/ab2admin –o stop
              • /usr/lib/ab2/lib/ab2admin –o start
              • To disable the AnswerBook2 web server from starting at boot time, the ab2mgr init script needs to be removed from the /etc/rc2.d directory.
      • rm /etc/rc2.d/S96ab2mgr 
            • Linuxconf – The popular linux system administration GUI, linuxconf, is available via the web on port 98. It is a well-known port and will be scanned for by attackers.
              • On Red Hat Linux, web access to linuxconf can be disabled using ntsysv, or “chkconfig linuxconf off”.
    • Web Services
      • Unintended Web Servers
          • Printers – Popular printers from Hewlett-Packard, Epson and others come with a built-in web server that can be used to configure the printer when it is installed.
            • While these web servers often have a password protection scheme in place for their settings, the default passwords are widely known.
            • At a minimum, network accessible printers should have their configuration password changed and any their firmware patched with the current set of patches available from the vendor.
            • Security conscious sites may want to go further and disable remote configuration of network accessible printers as per the printer vendors’ documentation.
    • Web Services
      • Unintended Web Servers
          • Routers, switches and other network devices – Network infrastructure devices often also contain embedded web servers.
            • As with printers, these devices need at a minimum to have their default passwords changed.
            • Security conscious sites should consider disabling remote configuration of these devices as well.
    • Web Services
      • Unintended Web Servers
          • Personal File Sharing – Web servers running on user’s PC’s can pop up on a network like weeds.
            • On Windows 2000 and later editions, the personal file sharing option includes a web server.
            • Unfortunately, this web server is the infamous IIS in disguise and in the default installation, without any of the numerous patches needed to secure it from attack.
            • Controlling this problem is difficult. A combination of actively scanning one’s own network and a firm policy regarding servers run on personal computers is needed to combat the problem.
            • Where possible, these web servers should be shutdown and users directed to use a common web server where security can more readily be maintained.
    • Web Services
      • Web Servers and Firewalls
        • A common error in deploying web servers is to place the web server behind the firewall and allow requests to the web server to pass through the firewall.
          • While this seems like a good way to protect the web server it in fact more often leads to the web server becoming a conduit for attackers to pass through the firewall and gain access to the secured network behind it.
        • A better approach is to place the web server outside the firewall.
          • In this configuration, the web server is dedicated to web serving only, all other services except for a secure communications facility such as ssh are removed from the system.
          • Placing the web server outside the firewall acts to prevent a compromise on the web server from proceeding on to the systems protected by the firewall.
    • Web Services
        • A still better approach for larger networks is to establish a so-called “DeMilitarized Zone” or DMZ area between the firewall protected internal network and the Internet using a second firewall.
          • The advantage of this approach is that the firewall between the Internet and the DMZ offers some protection to the web server while still allowing web requests to pass into and out of the DMZ.
          • The firewall between the DMZ and the internal network then acts to prevent an attack on the web server from proceeding on to systems on the internal network.
        • Either of these approaches protects the web server. However, many web sites build their web pages on the fly from a database.
          • One method of handling this is to periodically push a copy of the database out from a protected system out onto the web server.
          • This isolates the transaction between the web server and the database.
    • Web Services
      • Log Files
        • Web servers maintain several log files that can aid in monitoring the security of the Web server.  
          • access_log - Listing of each individual request fielded by the Web server.
          • agent_log - Listing of every program run by the Web server. This log is optional in the default Apache installation and can be enabled by editting the httpd.conf file.
          • error_log - Listing of the errors the server encountered. Errors from CGI programs as well as the server itself are logged to this file.
          • refer_log - Listing of the previous URL accessed by a given browser. This log is optional in the default Apache installation and can be enabled by editing the httpd.conf file.
    • Web Services
      • Log Files
        • Of principal interest from a security standpoint are error_log, agent_log, and access_log.
          • These logs should be reviewed periodically for purposes of identifying CGI program problems and attempts to access files not intended for distribution.
        • Another aspect of web server log files is the wealth of information they hold regarding the usage of the web site.
          • Log analysis tools such as http-analyze can provide the web site administrator with a variety of useful statistics on the usage of the web site
      • WARNING: A web server’s log files can provide a wealth of information for an attacker. Be certain that the location of the log files is not accessible by the web server. See the discussion in the section on file access control for a description of how to limit the parts of the file tree the web server is allowed to serve.
    • Web Services
      • Web Performance Issues
        • The performance of a web server is a mixture of several factors including the style of data served (dynamic versus static), system resources (CPU, I/O) and the available network bandwidth.
          • Web requests can be viewed as requests for various objects.
          • A typical web page might include some text and one or more graphical images.
          • A web browser will make separate requests, often in parallel, for each element of the page.
          • The web server fills each request as a separate item.
          • Web server load is measured in the size of individual requests and the number of requests it can fill per unit of time. Requests are refered as “hits”.
    • Web Services
      • Web Performance Issues
        • The Apache web server deals with requests by using a pool of slave processes.
          • The number of processes in the pool is managed dynamically by the parent web process within the bounds set in the httpd.conf file.
          • The parameters that control the pool are shown below.
            • MinSpareServers 5
            • MaxSpareServers 10
            • StartServers 5 
          • The MinSpareServers parameter specifies the minimum number of server processes in the pool.
          • The MaxSpareServers specifies the maximum number of server processes in the pool.
    • Web Services
      • Web Performance Issues
        • StartServers specifies how many servers to start when Apache is started.
          • The values listed for each of these parameters is the default and in general should not be changed.
          • Sites that see very large numbers of hits may consider increasing the number of servers but will need to pay careful attention to system resources, especially memory.
        • Server processing of data before a request is filled by page processing tools such as PHP or by CGI programs adds additional load on the server.
          • Servers with dynamic page content may require additional memory or faster processors to provide reasonable speed in responding to requests.
          • Likewise, the speed of the network connection between the web server and web clients will limit the maximum number of hits per unit time that can be processed.
    • Web Services
      • Spiders and robots.txt
        • A performance concern for some sites is the load placed on the web site by web crawling “spiders” or “robots” used by various web monitoring and indexing services.
          • These spiders request page elements in much the same way a web browser would but do so systematically and often at a faster rate.
          • There is an agreed upon standard for web servers to specify what parts of a site, if any, a robot should traverse called the robot exclusion protocol.
          • The protocol makes use of a file called robots.txt and an HTML META tag to control access.  
    • Web Services
      • Web Caches
        • Another method for improving web performance is the use of an external cache system.
          • Most web browsers have a cache of recently viewed pages, graphics and other other page elements for a period of time defined by the content provider or optionally by the web browser configuration.
          • This allows the browser to rapidly view the page again by loading elements from the local cache instead re-requesting them from a web server.
          • A similar technique can be applied to both the serving of web pages and the local network. Squid, a commonly used web cache program is listed in the reference section of this chapter.
    • Web Services
      • Web Caches
        • For a local network with a slow connection to the Internet, a proxy web cache can be used to improve performance and conserve bandwidth on the slow speed link.
          • A proxy web cache acts as a local reference for all web requests.
          • The proxy cache holds copies of web page elements for a time period defined by the content provider or by the proxy cache configuration.
          • Web browsers on the local network are configured to use the proxy cache and the proxy cache in turn makes requests for web pages not in its cache or simply replies with the page elements already in the cache.
    • Web Services
      • Web Caches
        • A Proxy web cache can be either explicitly or implicitly configured for a web client.
          • Most web browsers have an option dialog box that allows a specific proxy to be configured.
          • A web browser so configured will direct all web requests to the proxy.
          • An implicit configuration uses a firewall or router to intercept any web requests leaving a site and redirect them to a proxy.
          • This technique does not require any additional configuration on the client end.
    • Web Services
      • Web Caches
        • Some web sites use a web cache as the “front end” to their web server.
          • This improves the performance for page serving by allowing the web cache to reply to frequently requested pages from its cache, off loading that work from the web server itself.
          • One situation where this is helpful is a web site with a mixture of static and dynamic web pages.
          • The web cache can take on the load of serving the static pages while requests for dynamic pages are passed on the web server itself.
    • Web Services
      • Beyond Caching
        • An extension of the idea of using a web cache as a “front end” to a web server is to use a set of distributed web servers or web caches to provide more web service. There are several approaches to this.
          • Round Robin DNS - This is a special DNS configuration that treats a series of web servers as a single DNS entry.
            • When a request is made for this special entry, the DNS server replies with one of the IP addresses in the series.
            • It replies with the next address in the series for the next request and so on.
            • This spreads the web service load over the machines in the series.
    • Web Services
      • Beyond Caching
          • 3DNS Appliances - These systems provide an enhanced version of DNS that is tied to database.
            • They can not only spread load between a group of servers as the round robin DNS method does, but also assign requests to servers that are physically close of to the system making the request via data on the topology of the Internet stored in their database.
          • Load Balancing Routers - These systems perform a similar round robin load sharing function but work at the packet level, routing incoming packets destined for a web server to a series of web servers each in turn.
          • Commercial Service Providers - Companies such as Akamai provide globally distributed web caching services aimed at large high volume web sites.
    • Summary
      • Web servers are becoming a common service that nearly every site will offer in some fashion.
      • Web browsers are relatively non-configurable.
        • Some configuration options allow the user to configure the look and feel of the browser.
        • Other configuration options allow the user to implement rudimentary security, at a loss of convenience.
      • Some web servers are very configurable.
        • Some of the configuration options allow the admin to configure the basic operation of the server.
        • Other configuration options allow the admin to configure basic security of the web server.
      • Web server performance is an elusive goal.
        • Web caches and proxies might be used to improve web server performance.