Web Server Solutions for VM/ESA

Total Page:16

File Type:pdf, Size:1020Kb

Web Server Solutions for VM/ESA IBML Web Server Solutions for VM/ESA Erich Amrehn, Nicholas J. Gimbrone, Bruce J. Hayden, Stephen Record International Technical Support Organization http://www.redbooks.ibm.com This book was printed at 240 dpi (dots per inch). The final production redbook with the RED cover will be printed at 1200 dpi and will provide superior graphics resolution. Please see “How to Get ITSO Redbooks” at the back of this book for ordering instructions. SG24-4874-01 IBML International Technical Support Organization SG24-4874-01 Web Server Solutions for VM/ESA December 1998 Take Note! Before using this information and the product it supports, be sure to read the general information in Appendix D, “Special Notices” on page 227. Second Edition (December 1998) This edition reflects Virtual Machine/Enterprise Systems Architecture Version 2 Release 2.0, Program Number | 5654-030, and subsequent releases, EnterpriseWeb/VM, VM:Webgateway Release 2.2, VM:Webserver OfficeVision | Interface and Webshare. Comments may be addressed to: IBM Corporation, International Technical Support Organization Dept. HYJ Mail Station P099 522 South Road Poughkeepsie, New York 12601-5400 When you send information to IBM, you grant IBM a non-exclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you. Copyright International Business Machines Corporation 1996, 1998. All rights reserved. Note to U.S. Government Users — Documentation related to restricted rights — Use, duplication or disclosure is subject to restrictions set forth in GSA ADP Schedule Contract with IBM Corp. Contents Figures . ix Tables . xi Preface . xiii The Team That Wrote This Redbook ........................ xiii Comments Welcome . xiv Chapter 1. Internet Concepts . 1 1.1 The World Wide Web ................................ 1 1.2 An Intranet . 1 1.3 The URL . 2 1.4 Home Pages . 3 1.5 HTTP . 3 1.6 HTML . 5 1.6.1 Creating an HTML Document ........................ 6 1.6.2 Major HTML Tags ............................... 7 1.6.3 Text Formatting Tags ............................. 10 1.6.4 Creating Forms . 16 1.6.5 Sample Document . 21 1.6.6 Netscape-Specific Extensions . 22 1.6.7 Microsoft Internet-Specific Extensions ................... 22 1.6.8 Special Characters . 22 1.6.9 Frames . 23 1.6.10 Images . 23 1.6.11 Meta Information . 25 1.6.12 Multimedia . 25 1.6.13 Creating Effective Online Information ................... 25 1.6.14 HTML Editing Tools ............................. 29 1.6.15 Icons and Clip Art .............................. 31 1.6.16 Best of the Web ............................... 31 1.7 Java . 31 1.8 Application Programming Interfaces ...................... 33 1.8.1 Common Gateway Interface (CGI) ..................... 33 | 1.8.2 Server-Side Include . 33 1.8.3 How to Choose a Programming Interface ................. 34 1.9 TCP/IP . 34 1.9.1 TCP/IP Operation . 35 1.9.2 Request for Comments (RFC) ........................ 36 1.9.3 TCP/IP Layers . 36 1.9.4 Application Layer . 36 1.9.5 Transport Layer . 40 1.9.6 Internet Layer . 40 1.9.7 Network Layer . 41 1.10 Security . 42 1.10.1 Secure Sockets Layer (SSL) ........................ 43 1.10.2 Secure HyperText Transport Protocol (S-HTTP) ............ 44 | 1.10.3 Secure Electronic Transactions (SET) .................. 45 1.11 Firewalls . 45 1.11.1 Proxy Servers . 46 1.11.2 SOCKS Servers . 47 Copyright IBM Corp. 1996, 1998 iii Chapter 2. VM/ESA and the Web ........................... 49 2.1 The Universal Client ................................ 49 2.2 VM/ESA As a Web Server ............................. 49 2.3 Web Servers for VM/ESA ............................. 50 Chapter 3. VM/ESA Web Server Feature Summary ................ 53 Chapter 4. Webshare . 57 4.1 Introduction . 57 4.1.1 Why Use Webshare? ............................. 57 4.1.2 Webshare Features . 58 4.1.3 About the Author ............................... 59 4.2 Obtaining Webshare . 59 4.3 Getting Started . 60 4.3.1 Obtaining Documentation . 61 4.3.2 Installation Requirements . 62 4.3.3 Installation . 63 4.4 Configuration . 64 4.4.1 Customization . 67 4.4.2 Administration . 68 4.5 Security . 69 4.5.1 INDEX HTML . 69 4.5.2 User Web Spaces ............................... 69 4.5.3 Logging . 70 4.6 Examples . 72 4.6.1 Sample CPQ CGI ............................... 72 4.6.2 Sample CMSHTTPD HTML Script ...................... 74 4.6.3 Imagemap Support . 76 Chapter 5. EnterpriseWeb/VM . 79 5.1 Introduction . 80 5.2 About Beyond Software Inc. ........................... 80 5.3 Obtaining EnterpriseWeb/VM . 81 5.4 Documentation . 81 5.4.1 The Manual . 81 5.4.2 Reference Material . 82 5.4.3 HTML Sourcebook ............................... 83 5.4.4 Sample Code . 83 5.5 Pre-Installation Requirements . 84 5.5.1 Software Requirements . 84 5.5.2 Programmer Skills . 84 5.5.3 Other Requirements . 85 5.6 Installation and Operation ............................. 85 5.6.1 User ID Preparation .............................. 86 5.6.2 Installation Overview . 87 5.6.3 Testing the Installed Product ........................ 88 5.6.4 Number of Server Machines ......................... 88 5.6.5 Server Operation . 88 5.7 Functional Overview . 89 5.7.1 HTML File Walkthrough ........................... 90 5.7.2 Common Gateway Interface ......................... 94 5.8 Configuration . 94 5.8.1 The CONFIG FILE ............................... 95 5.8.2 FILELISTs . 95 5.9 Security . 96 iv Web Server Solutions for VM/ESA 5.9.1 Overview of Security and Its Structure .................. 96 5.9.2 Examples of the Security Access Paths .................. 97 5.9.3 VM′s Security . 99 5.9.4 External Security Managers ......................... 99 5.9.5 Special Security Implications for CGIs ................... 99 5.10 Accessing Other User ID′s Data (″userwebs″) ................ 99 5.11 Logging . 103 5.11.1 Setup . 103 5.11.2 Controlling the Logserver ........................ 104 5.11.3 Controlling the Log Files ......................... 104 5.12 Problem Determination ............................. 104 5.13 New Features . 105 5.13.1 OfficeVision Connection .......................... 105 5.13.2 Remote Configuration . 107 5.14 Summary of Features .............................. 107 Chapter 6. VM:Webgateway . 109 6.1 Introduction . 109 | 6.2 About Sterling Software, Inc. .......................... 110 | 6.3 Obtaining VM:Webgateway . 112 | 6.4 What Comes in the Box for VM:Webgateway ................ 113 | 6.4.1 VM:Webgateway Documentation . 113 | 6.4.2 VM:Webgateway Sample Code ...................... 115 | 6.5 VM:Webgateway Installation . 118 | 6.5.1 VM:Webgateway Software Requirements ................ 119 | 6.5.2 VM:Webgateway Hardware Requirements ............... 119 | 6.5.3 Programmer Skills for VM:Webgateway ................. 120 | 6.5.4 VM:Webgateway Alternate Installation Instructions .......... 120 | 6.6 VM:Webgateway Configuration . 122 | 6.6.1 VM:Webgateway Server Configuration Commands .......... 124 | 6.7 VM:Webgateway Administration . 127 | 6.7.1 VM:Webgateway System Administrator ................. 127 | 6.7.2 VM:Webgateway System Operator .................... 129 | 6.7.3 VM:Webgateway General User ...................... 129 | 6.8 VM:Webgateway Features and Experiences ................. 130 | 6.8.1 General Features of VM:Webgateway .................. 130 | 6.8.2 Multiple VM:Webgateway Servers .................... 131 | 6.8.3 VM:Webgateway′s DIRMAP Files ..................... 133 | 6.8.4 Security in VM:Webgateway ........................ 134 | 6.8.5 VM:Webgateway Logging . 135 | 6.8.6 VM:Webgateway Imagemaps . 137 | 6.8.7 VM:Webgateway CGI Scripts ....................... 137 | 6.8.8 VM:Webgateway Dynamic Worker Machines .............. 140 | 6.8.9 Converting from Webshare to VM:Webgateway ............ 140 | 6.8.10 Client Pull and Server Push with VM:Webgateway .......... 141 6.9 VM:Webserver OfficeVision Interface ..................... 142 | 6.9.1 General Features of VM:Webserver OfficeVision Interface ...... 142 | 6.9.2 VM/OV Calendar Support in VM:Webserver.
Recommended publications
  • BOROUGH of MANHATTAN COMMUNITY COLLEGE City University of New York Department of Computer Information Systems Office S150/Phone: 212-220-1476
    BOROUGH OF MANHATTAN COMMUNITY COLLEGE City University of New York Department of Computer Information Systems Office S150/Phone: 212-220-1476 Web Programming II Class hours: 2 CIS 485 Lab hours: 2 Spring 2012 Credits: 3 Course Description: This course will introduce students to server-side web programming. Emphasis is placed on database connectivity in order to solve intermediate level application problems. Students will be tasked with web projects that facilitate understanding of tier design and programming concepts. The overall goal of this course is to create a shopping cart application with a login and database component. Prerequisites/Co-requisite: Basic Skills: ENG 088, ESL 062, ACR 094, MAT 012/051; CIS 385 Web Programming I Learning Outcomes and Assessment After completing this course, students will be able to: Outcome: Demonstrate the use of a database with server-side scripting Assessment: Lab exercises and exam questions Outcome: Demonstrate the use a Cookie and Session manager with server-side scripting Assessment: Final project, lab exercises and exam questions Outcome: Develop a database-driven website Assessment: Lab exercises Outcome: Design and develop a shopping-cart application with a login and database component Assessment: Final Project General Education Outcomes and Assessment Quantitative Skills – Students will use quantitative skills and concepts and methods of mathematics to solve problems Assessment: Use formulas and concepts of mathematics to solve problems in programming assignments Information and Technology
    [Show full text]
  • Chapter 11 Web-Based Information Systems
    Prof. Dr.-Ing. Stefan Deßloch AG Heterogene Informationssysteme Geb. 36, Raum 329 Tel. 0631/205 3275 [email protected] Chapter 11 Web-based Information Systems TP Application Architecture client n Front-end program n interacts with (possibly wide range of) display devices front-end n gathers and validates input, displays output n constructs and forward request (e.g., as a RPC Front-end or asynchronous message) Program è provides device-independence for server n Request controller server n guides the request execution Request Controller n determines required steps, then executes them by invoking transaction servers Transaction Transaction Transaction n usually runs as part of an ACID transaction ... Server Server Server n Transaction server n process that runs application programs doing the actual work of the request DBMS n almost always runs within the scope of an Database Database ACID transaction System System n typically interacts with a DBMS n simple applications can be composed into more complex ones (using local proc. call, TRPC, asynch. messaging, …) DB DB n makes difference to req. controller fuzzy Middleware for Heterogeneous and 2 © Prof.Dr.-Ing. Stefan Deßloch Distributed Information Systems Front-end Program Functions n Gather input and display output (user interaction) n form and menu concepts n user selects a menu item to identify the type of transaction to be executed n front-end program display a (series of) form(s) for gathering input data n input data is validated by the front-end program n goal: avoid calling
    [Show full text]
  • Gpsbabel Documentation Gpsbabel Documentation Table of Contents
    GPSBabel Documentation GPSBabel Documentation Table of Contents Introduction to GPSBabel ................................................................................................... xx The Problem: Too many incompatible GPS file formats ................................................... xx The Solution ............................................................................................................ xx 1. Getting or Building GPSBabel .......................................................................................... 1 Downloading - the easy way. ....................................................................................... 1 Building from source. .................................................................................................. 1 2. Usage ........................................................................................................................... 3 Invocation ................................................................................................................. 3 Suboptions ................................................................................................................ 4 Advanced Usage ........................................................................................................ 4 Route and Track Modes .............................................................................................. 5 Working with predefined options .................................................................................. 6 Realtime tracking ......................................................................................................
    [Show full text]
  • DLCGI Advanced Uses
    DLCGI Advanced Uses Using DLCGI to achieve single sign-on with The Diver Solution In situations where authentication to DiveLine needs to be integrated with an existing authentication scheme, we provide "DLCGI", the DiveLine-Common Gateway Interface interfacing module. The "Common Gateway Interface" is a standard for interfacing external scripts and programs with a web server. How DLCGI works When dlcgi.exe is executed by the webserver, in the context of a user that the web server has already authenticated, it obtains a limited-lifetime one-time password from DiveLine. This password can be passed, via web page redirects, custom web page scripting, etc., to DivePort, NetDiver, or even ProDiver to allow the user to login. The typical strategy for using DLCGI is: 1. Configure DiveLine to accept DLCGI requests from your webserver. 2. Install dlcgi.exe in a scripts directory (e.g. /cgi-bin/) on your CGI-compliant webserver (e.g. IIS, Apache). You configure the name of your DiveLine server and other parameters using dlcgi.cfg in the same directory as the executable. 3. Restrict access to this script so that the webserver will only execute it when the user has already authenticated (e.g. Domain account). Typical uses • DivePort: Users go to the DivePort site, and are redirected to another URL for authentication. That URL, which runs dlcgi.exe, redirects the user back to the DivePort URL with a one-use authentication token. • ProDiver: When ProDiver connects to DiveLine, if configured with a DLCGI URL, it will access the URL in "raw" mode (see below) to obtain a parse-able result file containing a one-use DiveLine authentication token.
    [Show full text]
  • Leukemia Medical Application with Security Features
    Journal of Software Leukemia Medical Application with Security Features Radhi Rafiee Afandi1, Waidah Ismail1*, Azlan Husin2, Rosline Hassan3 1 Faculty Science and Technology, Universiti Sains Islam Malaysia, Negeri Sembilan, Malaysia. 2 Department of Internal Medicine, School of Medicine, Universiti Sains Malaysia, Kota Bahru, Malaysia. 3 Department of Hematology, School of Medicine, Universiti Sains Malaysia, Kota Bahru, Malaysia. * Corresponding author. Tel.: +6 06 7988056; email: [email protected]. Manuscript submitted January 27, 2015; accepted April 28, 2015 doi: 10.17706/jsw.10.5.577-598 Abstract: Information on the Leukemia patients is very crucial by keep track medical history and to know the current status of the patient’s. This paper explains on development of Hematology Information System (HIS) in Hospital Universiti Sains Malaysia (HUSM). HIS is the web application, which is the enhancement of the standalone application system that used previously. The previous system lack of the implementation of security framework and triple ‘A’ elements which are authentication, authorization and accounting. Therefore, the objective of this project is to ensure the security features are implemented and the information safely kept in the server. We are using agile methodology to develop the HIS which the involvement from the user at the beginning until end of the project. The user involvement at the beginning user requirement until implemented. As stated above, HIS is web application that used JSP technology. It can only be access within the HUSM only by using the local Internet Protocol (IP). HIS ease medical doctor and nurse to manage the Leukemia patients. For the security purpose HIS provided password to login, three different user access levels and activity log that recorded from each user that entered the system Key words: Hematology information system, security feature, agile methodology.
    [Show full text]
  • Abstract Introduction Methodology
    Kajetan Hinner (2000): Statistics of major IRC networks: methods and summary of user count. M/C: A Journal of Media and Culture 3(4). <originally: http://www.api-network.com/mc/0008/count.html> now: http://www.media-culture.org.au/0008/count.html - Actual figures and updates: www.hinner.com/ircstat/ Abstract The article explains a successful approach to monitor the major worldwide Internet Relay Chat (IRC) networks. It introduces a new research tool capable of producing detailed and accurate statistics of IRC network’s user count. Several obsolete methods are discussed before the still ongoing Socip.perl program is explained. Finally some IRC statistics are described, like development of user figures, their maximum count, IRC channel figures, etc. Introduction Internet Relay Chat (IRC) is a text-based service, where people can meet online and chat. All chat is organized in channels which a specific topic, like #usa or #linux. A user can be taking part in several channels when connected to an IRC network. For a long time the only IRC network has been EFnet (Eris-Free Network, named after its server eris.berkeley.edu), founded in 1990. The other three major IRC networks are Undernet (1993), DALnet (1994) and IRCnet, which split off EFnet in June 1996. All persons connecting to an IRC network at one time create that IRC network’s user space. People are constantly signing on and off, the total number of users ever been to a specific IRC network could be called social space of that IRC network. It is obvious, that the IRC network’s social space by far outnumbers its user space.
    [Show full text]
  • CONNX Installation Guide Version 11.5
    CONNX Installation Guide Version 11.5 Table Of Contents Preface .......................................................................................................................................................... 1 About the Installation Guide .......................................................................................................................... 1 Database Terminology .................................................................................................................................. 2 Installation Overview ..................................................................................................................................... 3 CONNX Installation Checklist ....................................................................................................................... 4 Upgrade Installation Checklist ...................................................................................................................... 5 Displaying Your CONNX Version .................................................................................................................. 6 To display the CONNX version and build numbers ............................................................................... 6 How CONNX Works ...................................................................................................................................... 7 Related Topics ......................................................................................................................................
    [Show full text]
  • HTML, XHTML, and CSS: Comprehensive
    HTML 5 Creating an Image Map Objectives You will have mastered the material in this chapter when you can: • Defi ne terms relating to image • Create a home page mapping • Create a table, insert an image • List the differences between into a table, and use the usemap server-side and client-side image maps attribute to defi ne an image map • Name the two components of an • Insert special characters into image map and describe the steps to a Web page implement an image map • Use the <map> </map> tags to start • Distinguish between appropriate and and end a map inappropriate images for mapping • Use the <area> tag to indicate the • Sketch hotspots on an image shape, coordinates, and URL for a mapped area • Describe how the x- and y-coordinates relate to vertical and • Create an external style sheet for horizontal alignment styles used across the Web site • Open an image in Paint and use Paint to locate the image map coordinates Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. HTML 5 Creating an Image Map Introduction Many of the Web pages in Chapters 2 through 4 used the <img> tag to add images. In Chapter 3, an image also was used as a link back to the home page, by using the <a> </a> tags to defi ne the image as the clickable element for the link.
    [Show full text]
  • Features Enabled on Your Windows Host During Installation Snapcenter Software Soumik Das, Archana August 08, 2021
    Features enabled on your Windows host during installation SnapCenter Software Soumik Das, Archana August 08, 2021 This PDF was generated from https://docs.netapp.com/us- en/snapcenter/install/reference_features_enabled_on_your_windows_host_during_installation.html on September 16, 2021. Always check docs.netapp.com for the latest. Table of Contents Features enabled on your Windows host during installation . 1 Features enabled on your Windows host during installation The SnapCenter Server installer enables the Windows features and roles on your Windows host during installation. These might be of interest for troubleshooting and host system maintenance purposes. 1 Category Feature Web Server • Internet Information Services • World Wide Web Services • Common HTTP Features ◦ Default Document ◦ Directory Browsing ◦ HTTP Errors ◦ HTTP Redirection ◦ Static Content ◦ WebDAV Publishing • Health and Diagnostics ◦ Custom Logging ◦ HTTP Logging ◦ Logging Tools ◦ Request Monitor ◦ Tracing • Performance Features ◦ Static Content Compression • Security ◦ IP Security ◦ Basic Authentication ◦ Centralized SSL Certificate Support ◦ Client Certificate Mapping Authentication ◦ IIS Client Certificate Mapping Authentication ◦ IP and Domain Restrictions ◦ Request Filtering ◦ URL Authorization ◦ Windows Authentication • Application Development Features ◦ .NET Extensibility 4.5 ◦ Application Initialization ◦ ASP.NET 4.5 ◦ Server-Side Includes ◦ WebSocket Protocol • Management Tools ◦ IIS Management Console 2 Category Feature IIS Management Scripts and Tools • IIS Management Service • Web Management Tools .NET Framework 4.5.2 Features • .NET Framework 4.5.2 • ASP.NET 4.5.2 • Windows Communication Foundation (WCF) HTTP Activation45 ◦ TCP Activation ◦ HTTP Activation ◦ Message Queuing (MSMQ) activation Message Queuing • Message Queuing Services Ensure that no other applications uses the MSMQ service that SnapCenter creates and manages. • MSMQ Server Windows Process Activation Service • Process Model Configuration APIs All 3 Copyright Information Copyright © 2021 NetApp, Inc.
    [Show full text]
  • Lecture 28 Scripting Language Used to Create Dynamic Web Pages (Like Perl Open Source)
    PHP A server-side, cross-platform, HTML-embedded Lecture 28 scripting language used to create dynamic Web pages (like Perl open source). We can write PHP code directly into HTML and don’t PHP need to worry about CGI (like Java Server Pages). April 6, 2005 Looks like Perl and knowledge of one can help you understand the other. Web server needs to be configured to parse files with certain extensions (e.g. php or phtml) appropriately. PHP Serve-side Scripting Server-side scripting SSI: Server-side includes: Most CGI tools: very old scripting language write page headers, define layout, etc. mostly provides #include few really dynamic parts, most static PHP: have to write many static print statements complete language Let’s design pages by writing static HTML documents free with pieces of code inside: integrates nicely into Apache, IIS, other servers code is executed at request time pages can take parameters ASP: Active Server Pages Scripting languages come with libraries providing Microsoft version of PHP functions specially designed for Web programming: language is essentially Basic e.g.: URL/parameters manipulations, database gateways, ... JSP: Java Server Pages Java version PHP PHP Most popular third-party module for Apache: <html> code and extensive documentation available from <head><title>PHP Test</title></head> http://www.php.net/ <body><? print(“Hello World!”); ?></body> </html> Pieces of code are enclosed into <?...?> tags Example: <html> <html> <head><title>PHP Test</title></head> <head><title>PHP Test</title></head> <body>Hello World!</body> <body><? print(“Hello World!”); ?></body> </html> </html> 1 Parameter Decoding Parameter Decoding Each PHP script can be invoked as a CGI.
    [Show full text]
  • Getting Started Guide with Wiz550web Getting Started Guide with Wiz550web
    2015/02/09 17:48 1/21 Getting Started Guide with WIZ550web Getting Started Guide with WIZ550web WIZ550web is an embedded Web server module based on WIZnet’s W5500 hardwired TCP/IP chip, Users can control & monitor the 16-configurable digital I/O and 4-ADC inputs on module via web pages. WIZ550web provides the firmware & web page examples for user’s customization. This page describes the following topics: ● Product Preview ● Hello world ❍ Product contents ❍ SD card initialization ❍ Data flash initialization ❍ Serial debug message ● WIZ550web Basic operations and CGI ● Basic Demo Webpage ● Examples for WIZ550web customization Users can download the following source codes from the 'WIZ550web GitHub Repository' ● Firmware source code (The projects for Eclipse IDE) ❍ Application / Boot ● Demo webpage WIZ550web GitHub Repository https://github.com/Wiznet/WIZ550web WIZ550web GitHub Page http://wiznet.github.io/WIZ550web Develop Environment - http://wizwiki.net/wiki/ Last update: 2015/02/09 products:wiz550web:wiz550webgsg_en http://wizwiki.net/wiki/doku.php?id=products:wiz550web:wiz550webgsg_en 13:05 ● Eclipse IDE for C/C++ Developers, Kepler Service Release 2 ● ARM GCC 4.8.3 (2014q1) Product Preview Hello World Product Contents Ordering Part No: WIZ550web ● WIZ550web module x 1 Ordering Part No: WIZ550web-EVB ● WIZ550web module x 1 ● WIZ550web baseboard x 1 http://wizwiki.net/wiki/ Printed on 2015/02/09 17:48 2015/02/09 17:48 3/21 Getting Started Guide with WIZ550web ● LAN cable x 1 ● Serial cable x 1 ● 12V Power adapter x 1 SD card is option for both WIZ550web and WIZ550web-EVB Refer to recommended lists of SD card. Vendor Capacity(Bytes) Type Class 2G SD n/a Sandisk 4G SDHC 4 8G SDHC 4 Samsung 4G SDHC 6 Transcend 4G SDHC 4,10 SD card Initialization WIZ550web uses Micro SD card as a storage for web content and SD card is not included as default.
    [Show full text]
  • Honeydv6 a Low-Interaction Ipv6 Honeypot
    HoneydV6 A low-interaction IPv6 honeypot Sven Schindler Potsdam University Institute for Computer Science Operating Systems and Distributed Systems Reykjavík, July 29, 2013 Outline 1 Introduction 2 An IPv6 darknet experiment 3 HoneydV6 - Development and Performance Measurements 4 Conclusion and Future work Sven Schindler (Potsdam University) HoneydV6 Frame 2 of 26 Introduction Outline 1 Introduction 2 An IPv6 darknet experiment 3 HoneydV6 - Development and Performance Measurements 4 Conclusion and Future work Sven Schindler (Potsdam University) HoneydV6 Frame 3 of 26 Introduction Why do we need IPv6 dark- and honeynets? huge IPv6 address space makes brute-force network scanning impossible new scanning approaches in the wild? attacks aiming at IPv6 design weaknesses how to analyse IPv6 related attacks? Sven Schindler (Potsdam University) HoneydV6 Frame 4 of 26 Introduction THC and si6 - IPv6 Attack Toolkits IPv6 attack tools like THC toolkit [3] and si6 [8] available fragment6 (THC) - duplicate fragments fake_router6 (THC) - become the default router rsmurf6 (THC) - remote smurf attack tool dos-new-ip6 (THC) - block new hosts from joining a network scan6 (si6) - intelligent scan approaches Sven Schindler (Potsdam University) HoneydV6 Frame 5 of 26 An IPv6 darknet experiment Outline 1 Introduction 2 An IPv6 darknet experiment 3 HoneydV6 - Development and Performance Measurements 4 Conclusion and Future work Sven Schindler (Potsdam University) HoneydV6 Frame 6 of 26 An IPv6 darknet experiment Prior darknet experiments Why another IPv6 Darknet
    [Show full text]