Proyecto Seguridad En Redes Y Sistemas – Memoria

Total Page:16

File Type:pdf, Size:1020Kb

Proyecto Seguridad En Redes Y Sistemas – Memoria Proyecto Seguridad en Redes y Sistemas – Memoria Miguel Valencia Zurera Posgrado: Seguridad en redes y sistemas Consultor: Cristina Pérez Solà Esta obra está sujeta a una licencia de Reconocimiento 3.0 España de Creative Commons Resumen del Trabajo: Hoy en día la mayoría de servicios Web son vulnerables a ataques tanto externos como internos y el uso de sistemas de detección de intrusos se hace aconsejable, sino imprescindible, para la prevención de estos ataques. Un IDS es una herramienta de seguridad que intenta detectar o monitorizar los eventos ocurridos en un determinado sistema informático en busca de intentos de comprometer la seguridad de dicho sistema. En este trabajo se realizará una instalación de un IDS basado en Snort para proteger un servidor Web vulnerable. Como mejora se instalará una interfaz gráfica para la gestión de las alertas de Snort. Índice 1 Introducción ...................................................................................................2 1.1 Contexto y justificación del Trabajo .........................................................2 1.2 Descripción ..............................................................................................2 1.3 Objetivos..................................................................................................3 1.3.1 Análisis de la red. Ubicación del servidor NIDS.............................. 3 1.3.2 Análisis de los servicios activos en la red. Configuración de Snort.3 1.3.3 Análisis de los datos de Snort. Uso de una interfaz gráfica............ 4 1.4 Planificación.............................................................................................4 1.5 Calendario de trabajo ..............................................................................5 1.5.1 Horario de trabajo............................................................................ 6 1.5.2 Hitos importantes ............................................................................ 6 1.6 Breve sumario de resultados obtenidos ..................................................6 1.7 Riesgos....................................................................................................7 1.7.1 Identificación de los riesgos ............................................................ 7 1.7.2 Evaluación de los riesgos. Planificación de respuestas.................. 7 2 Sistemas de detección de intrusos (IDS).......................................................9 3 Qué es un NIDS...........................................................................................10 3.1 Funcionamiento .....................................................................................10 3.2 Arquitectura ...........................................................................................11 3.3 Snort ......................................................................................................11 3.3.1 Funcionamiento del motor de Snort. ............................................. 12 4 Donde colocar el IDS...................................................................................13 4.1 Organización..........................................................................................13 5 Diseño red virtual.........................................................................................15 5.1 Firewall ..................................................................................................15 5.2 NIDS ......................................................................................................15 5.3 Servidor Web .........................................................................................16 5.4 Instalaciones de máquinas virtuales......................................................16 5.4.1 Selección de reglas para Snort ..................................................... 17 5.5 Publicación del servidor Web al exterior................................................18 6 Definición de una prueba.............................................................................20 6.1 Command injection. ...............................................................................20 6.2 SQL Injection .........................................................................................21 6.3 Ataque de denegación de servicio.........................................................21 6.3.1 Inundación SYN ............................................................................ 22 6.3.2 Solución a ataques DoS................................................................ 23 6.3.3 Detectar vulnerabilidades.............................................................. 23 6.3.4 Uso de vulnerabilidades................................................................ 25 7 Introducción a GUIs para Snort ...................................................................28 8 Complementos de Snort ..............................................................................29 8.1 Entornos gráficos para Snort .................................................................29 8.1.1 BASE............................................................................................. 29 8.1.2 OSSIM........................................................................................... 29 8.1.3 PLACID ......................................................................................... 29 8.1.4 SGUIL............................................................................................ 30 8.1.5 Snorby........................................................................................... 30 8.1.6 SQueRT ........................................................................................ 30 8.1.7 FirePOWER................................................................................... 30 8.1.8 Snez .............................................................................................. 30 8.1.9 IDS Policy Manager....................................................................... 30 8.2 Análisis sistemas GUI para Snort ..........................................................31 9 Snorby. Primeros pasos ..............................................................................34 9.1 Comprobar el sensor .............................................................................34 9.2 Cola de trabajo (Worker Job).................................................................35 9.3 Visualización de eventos en el panel.....................................................35 9.4 Búsquedas.............................................................................................39 9.5 Administración .......................................................................................39 9.6 Conclusiones .........................................................................................42 10 Ataques al servidor Web............................................................................43 10.1 Command injection ..............................................................................43 10.2 SQL Injection .......................................................................................43 10.3 Ataque DoS .........................................................................................44 10.4 Falsos positivos ...................................................................................45 11 Anexos.......................................................................................................48 11.1 Instalación de la maquina de cortafuegos (Firewall). ..........................48 11.2 Instalación y configuración de Snort....................................................51 11.3 Montaje del servidor Web ....................................................................61 11.4 Instalación de Snorby ..........................................................................65 11.4.1 Instalando Barnyard2 .................................................................. 65 11.4.2 Instalando Snorby ....................................................................... 68 11.4.3 Instalando Phusion Passenger.................................................... 71 11.4.4 Demonio de mantenimiento de la BD de Snorby ........................ 73 12 Referencias (Bibliografia) ..........................................................................75 Lista de figuras Ilustración 1. Diagrama de Gantt, que contiene la cronología del proyecto. Ilustración 2. Elementos básicos que conforman un IDS. Ilustración 3. Esquema de la red virtual del proyecto. Ilustración 4. Smoothwall. Pantalla del menú de configuración de red. Ilustración 5. Smoothwall. Pantalla donde se selecciona el tipo de red. Ilustración 6. Smoothwall. Pantalla inicial del servicio de firewall. Ilustración 7. Smoothwall. Pantalla de gestión de tráfico saliente. Ilustración 8. Configuración de las interfaces de red del NID Ilustración 9. Resultado del chequeo de Snort en línea de comando. Ilustración 10. DVWA. Pantalla de configuración de la Web DVWA. Ilustración 11. DVWA. Pantalla de bienvenida. Ilustración 12. Smoothwall. Pantalla de gestión del tráfico entrante. Ilustración 13. Resultado de un ataque del tipo: Command Injection. Ilustración 14. Resultado de un ataque del tipo: SQL Injection. Ilustración 15. Smoothwall. Pantalla de configuración avanzada de red. Ilustración 16. Resultado del acceso a ficheros restringidos en DVWA mediante vulnerabilidad OSVB-3268 Ilustración 17. Snorby. Pantalla de entrada. Ilustración 18. Phusion Passenger. Inicio del asistente de instalación. Ilustración 19. Phusion Passenger.
Recommended publications
  • Interfacing Apache HTTP Server 2.4 with External Applications
    Interfacing Apache HTTP Server 2.4 with External Applications Jeff Trawick Interfacing Apache HTTP Server 2.4 with External Applications Jeff Trawick November 6, 2012 Who am I? Interfacing Apache HTTP Server 2.4 with External Applications Met Unix (in the form of Xenix) in 1985 Jeff Trawick Joined IBM in 1990 to work on network software for mainframes Moved to a different organization in 2000 to work on Apache httpd Later spent about 4 years at Sun/Oracle Got tired of being tired of being an employee of too-huge corporation so formed my own too-small company Currently working part-time, coding on other projects, and taking classes Overview Interfacing Apache HTTP Server 2.4 with External Applications Jeff Trawick Huge problem space, so simplify Perspective: \General purpose" web servers, not minimal application containers which implement HTTP \Applications:" Code that runs dynamically on the server during request processing to process input and generate output Possible web server interactions Interfacing Apache HTTP Server 2.4 with External Applications Jeff Trawick Native code plugin modules (uhh, assuming server is native code) Non-native code + language interpreter inside server (Lua, Perl, etc.) Arbitrary processes on the other side of a standard wire protocol like HTTP (proxy), CGI, FastCGI, etc. (Java and \all of the above") or private protocol Some hybrid such as mod fcgid mod fcgid as example hybrid Interfacing Apache HTTP Server 2.4 with External Applications Jeff Trawick Supports applications which implement a standard wire protocol, no restriction on implementation mechanism Has extensive support for managing the application[+interpreter] processes so that the management of the application processes is well-integrated with the web server Contrast with mod proxy fcgi (pure FastCGI, no process management) or mod php (no processes/threads other than those of web server).
    [Show full text]
  • Integrating Openshift Enterprise with Identity Management (Idm) in Red Hat Enterprise Linux
    Integrating OpenShift Enterprise with Identity Management (IdM) in Red Hat Enterprise Linux OpenShift Enterprise 2.2 IdM in Red Hat Enterprise Linux 7 Windows Server 2012 - Active Directory Integration Mark Heslin Principal Systems Engineer Version 1.1 January 2015 1801 Varsity Drive™ Raleigh NC 27606-2072 USA Phone: +1 919 754 3700 Phone: 888 733 4281 Fax: +1 919 754 3701 PO Box 13588 Research Triangle Park NC 27709 USA Linux is a registered trademark of Linus Torvalds. Red Hat, Red Hat Enterprise Linux and the Red Hat "Shadowman" logo are registered trademarks of Red Hat, Inc. in the United States and other countries. Microsoft and Windows are U.S. registered trademarks of Microsoft Corporation. UNIX is a registered trademark of The Open Group. Intel, the Intel logo and Xeon are registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. All other trademarks referenced herein are the property of their respective owners. © 2014 by Red Hat, Inc. This material may be distributed only subject to the terms and conditions set forth in the Open Publication License, V1.0 or later (the latest version is presently available at http://www.opencontent.org/openpub/). The information contained herein is subject to change without notice. Red Hat, Inc. shall not be liable for technical or editorial errors or omissions contained herein. Distribution of modified versions of this document is prohibited without the explicit permission of Red Hat Inc. Distribution of this work or derivative of this work in any standard (paper) book form for commercial purposes is prohibited unless prior permission is obtained from Red Hat Inc.
    [Show full text]
  • Insight: Semantic Provenance and Analysis Platform for Multi-Center Neurology Healthcare Research
    INSIGHT: SEMANTIC PROVENANCE AND ANALYSIS PLATFORM FOR MULTI-CENTER NEUROLOGY HEALTHCARE RESEARCH by PRIYA RAMESH Submitted in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE Department of Electrical Engineering and Computer Science CASE WESTERN RESERVE UNIVERSITY January, 2016 ii CASE WESTERN RESERVE UNIVERSITY SCHOOL OF GRADUATE STUDIES We hereby approve the thesis of PRIYA RAMESH candidate for the Master of Science degree*. (signed) Dr. Satya S. Sahoo, Ph.D. (Chair of the committee) Dr. Kenneth A. Loparo, Ph.D. Dr. Martha Sajatovic, MD. (date) November 5th, 2015 *We also certify that written approval has been obtained for any proprietary material contained therein. iii Copyright © Priya Ramesh January, 2016 All rights reserved. iv TABLE OF CONTENTS TABLE OF CONTENTS iv LIST OF FIGURES vi LIST OF TABLES vii ACKNOWLEDGEMENT viii CHAPTER 1. INTRODUCTION 10 CHAPTER 2. BACKGROUND 13 2.1 Managing Epilepsy Well Network 13 2.1.1 Introduction 13 2.1.2 MEW database workgroup 16 2.1.3 MEW Network survey results 17 2.1.4 A common terminology for epilepsy self-management 19 2.1.5 Standardization of data elements 20 2.1.6 Data curation workflow for MEW Network datasets 21 2.1.7 MEW Network database design and functionality 26 2.2 Research Studies 27 CHAPTER 3. METHODS 30 3.1. Semantic Integration Module using MEW Common Data Elements (CDEs) 33 3.2. Data Exploration and Query Module 34 3.3. Ontology-based Inference Module 36 CHAPTER 4. INSIGHT SOFTWARE DEVELOPMENT 38 4.1 Objective 38 4.2 Agile Methodology 39 4.3 User Interface Development 41 CHAPTER 5.
    [Show full text]
  • Vasili Korol
    Vasili Korol Senior Software Developer Odense, Denmark Age: 35 mob.: +45 20 68 50 23 Married, have son (born 2010) e-mail: [email protected] ​ Personal Statement ⚬ Strong IT skills (16+ years of versatile experience) ⚬ Background in physics research ⚬ Work effectively both as team member and leader ⚬ Enthusiastic and committed ⚬ Spoken languages: Russian (native), English (fluent), Danish (Prøve i Dansk 3 / level B2) ​ ​ ​ ​ Education 2006–2008: Master’s degree (with distinction) in applied physics. ​ 2002–2006: Bachelor’s degree (with distinction) in applied physics. Under- to postgraduate student at St. Petersburg State Polytechnical University, Faculty of Physics and Technology, Dept. of Cosmic Physics. The thesis “Search for possible space-time variations of the fine-structure constant and isotopic shifts” (a supervisor Prof. ​ M.G. Kozlov). ​ 1992-2002: School education in St. Petersburg, Russia and Belfast, UK (in 1993). Professional Career 2015 – Feb 2021: Software developer in the QuantBio research group at the University of ​ ​ ​ ​ Southern Denmark (SDU), Institute of Physics, Chemistry and Pharmacy (HPC section). I am the principal developer of VIKING, a service providing a web interface for configuring ​ ​ ​ and running scientific computational tasks on supercomputers. I designed the software architecture, developed the system core and coordinated the work of several developers. 2014 – 2015: Lead programmer (Perl) at Internet Projects LLC, russian informational portals subscribe.ru and sendsay.ru (St. Petersburg, Russia). ​ ​ ​ Worked with a team of developers on projects targeted at developing an API for news aggregation and content processing services. This involved integration with various online platforms (Facebook, Twitter, Vkontakte, LiveJournal, Google Analytics), web scraping and designing instruments for user publications at the portals and beyond.
    [Show full text]
  • Configuration Management at the Los Alamos National Laboratory
    Mac Configuration Management at the Los Alamos National Laboratory By Allan Marcus April, 2010 Overview.....................................................................................................................................1 The Challenge ...........................................................................................................................2 Product Selection.....................................................................................................................3 Getting Started..........................................................................................................................7 Basic Implementation............................................................................................................8 Configuration Management .............................................................................................. 14 Advanced Implementation................................................................................................ 16 How LANL uses Puppet ....................................................................................................... 20 Lessons Learned ................................................................................................................... 24 About the Author .................................................................................................................. 29 Appendix 1: puppet.sh........................................................................................................ 30 Appendix
    [Show full text]
  • Version Control Graphical Interface for Open Ondemand
    VERSION CONTROL GRAPHICAL INTERFACE FOR OPEN ONDEMAND by HUAN CHEN Submitted in partial fulfillment of the requirements for the degree of Master of Science Department of Electrical Engineering and Computer Science CASE WESTERN RESERVE UNIVERSITY AUGUST 2018 CASE WESTERN RESERVE UNIVERSITY SCHOOL OF GRADUATE STUDIES We hereby approve the thesis/dissertation of Huan Chen candidate for the degree of Master of Science Committee Chair Chris Fietkiewicz Committee Member Christian Zorman Committee Member Roger Bielefeld Date of Defense June 27, 2018 TABLE OF CONTENTS Abstract CHAPTER 1: INTRODUCTION ............................................................................ 1 CHAPTER 2: METHODS ...................................................................................... 4 2.1 Installation for Environments and Open OnDemand .............................................. 4 2.1.1 Install SLURM ................................................................................................. 4 2.1.1.1 Create User .................................................................................... 4 2.1.1.2 Install and Configure Munge ........................................................... 5 2.1.1.3 Install and Configure SLURM ......................................................... 6 2.1.1.4 Enable Accounting ......................................................................... 7 2.1.2 Install Open OnDemand .................................................................................. 9 2.2 Git Version Control for Open OnDemand
    [Show full text]
  • Websocket Notifier
    Università degli Studi di Padova Dipartimento di Matematica Corso di Laurea in Informatica WebSocket Notifier: una RubyGem basata su WebSocket Tesi di laurea triennale Relatore Prof. Tullio Vardanega Laureando Federico Gobbo Anno Accademico 2015–2016 Federico Gobbo: WebSocket Notifier: una RubyGem basata su WebSocket, Tesi di laurea triennale, c Oct 2016. Sommario Il presente documento rappresenta la relazione finale dell’esperienza di stage condotta nell’azienda Si14 Spa. Esso è organizzato in quattro capitoli: 1. Descrizione dell’azienda: le origini, la natura, il mercato, i processi aziendali; 2. Le motivazioni alla base dell’esperienza di stage: i punti di vista dei portatori di interesse, ovvero l’azienda, l’università e il sottoscritto; 3. Presentazione del progetto di stage: processi e prodotti; 4. Valutazione retrospettiva sull’esperienza di stage. Convenzioni tipografiche Nel testo vengono utilizzate delle convenzioni tipografiche col seguente significato: • Corsivo: termine in lingua inglese; • Grassetto: termine rilevante; • Verbatim: nomi di file, codice; • Glossariojgj: termine presente nel glossario; • Riferimento1: termine associato a un riferimento bibliografico. iii “Make the best of the situation” — Eric Clapton Ringraziamenti Vorrei ringraziare il Prof. Tullio Vardanega, relatore della mia tesi, per l’aiuto, i buoni consigli e la disponibilità che ha dimostrato nei miei confronti. Ringrazio la mia famiglia, la mia ragazza e i miei amici per avermi permesso, col loro sostegno, di raggiungere questo traguardo. Padova, Oct 2016 Federico Gobbo v Indice 1 L’azienda: Si141 1.1 Storia . .1 1.2 Contesto aziendale . .1 1.2.1 I vantaggi dell’ecosistema M31 . .2 1.2.2 Tecnologia e innovazione . .2 1.2.3 Spin-off aziendali .
    [Show full text]
  • Le Web Social Table Des Matières
    Le Web Social Table des matières 1 Web social 1 1.1 Historique ............................................... 1 1.2 L'évolution du web social ....................................... 1 1.2.1 Blogs et wiki ......................................... 1 1.2.2 L'art social .......................................... 2 1.2.3 Le crowdsourcing ...................................... 2 1.2.4 Le développement d'applications mobiles .......................... 2 1.2.5 Des projets de logiciels communautaires ........................... 2 1.3 Du web social à la vie réelle ..................................... 2 1.4 Bibliographie ............................................. 3 1.5 Notes et références .......................................... 3 1.6 Voir aussi ............................................... 3 2 Réseautage social 4 2.1 Histoire ................................................ 4 2.2 Applications .............................................. 4 2.3 Modèle économique ......................................... 5 2.3.1 Commerce des données ................................... 5 2.3.2 Vente d'espaces publicitaires ................................. 5 2.3.3 Cession des actifs ....................................... 5 2.4 Domaines d'application ........................................ 5 2.4.1 Réseaux internes versus réseaux externes ........................... 6 2.4.2 Services en ligne de réseautage professionnels ........................ 6 2.4.3 Réseaux sociaux d'amis de la vie réelle ............................ 6 2.4.4 Services en ligne d'ancien
    [Show full text]
  • Rails Connector for CMS Fiona Infopark CMS Fiona Rails Connector for CMS Fiona
    Infopark CMS Fiona Rails Connector for CMS Fiona Infopark CMS Fiona Rails Connector for CMS Fiona While every precaution has been taken in the preparation of all our technical documents, we make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of the use of the information or programs contained herein. All trademarks and copyrights referred to in this document are the property of their respective owners. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form, or by any means, electronic, mechanical, photocopying, recording, or otherwise, without our prior consent. Contents 1 Concepts . 7 1.1 Moving to Rails? . 7 1.1.1 Editorial and Live System . 7 1.1.2 Editorial Content and Layout are Handled Equally . 7 1.1.3 The Classical Live System is heterogeneous . 8 1.1.4 Ruby on Rails is an Integrated Framework . 8 1.1.5 Moving to Ruby on Rails . 8 1.1.6 Frequently Asked Questions About Moving to Rails . 9 1.2 What Is Ruby on Rails? . 10 1.3 Functions of Infopark Rails Connector . 11 1.4 Usage Scenarios for the Rails Connector . 11 1.5 The Playland Demo Application . 12 1.6 The Layout of a Rails Application . 18 1.7 Deployment . 18 1.8 CMS Layouts as Extensible Page Types . 19 1.9 Dedicated Controllers for Specific CMS File Formats . 20 1.10 Using the Rails Application as a Preview Server .
    [Show full text]
  • Read My Resume
    Eli Thorkelson [email protected] github.com/decasia TL;DR I’m a full-stack web software engineer with a doctorate in cultural anthropology. I’m currently doing back-end development for the Nebo Agency in Atlanta, where I’ve had a special focus on improving testing and web stack performance in our client projects. I previously designed and built more than a dozen Ruby on Rails applications for the University of Chicago’s Humanities Division. I’ve maintained Linux servers, web software stacks, and relational and NoSQL databases; I’m especially interested in software design patterns and user interfaces. I recently returned to software after a few years in academic teaching and research. TECHNICAL SKILLS Languages: Ruby, PHP, Python, SQL; HTML, CSS, Javascript; college coursework in Java and C++. Web development frameworks: Ruby on Rails (~7 years), Drupal 6/7/8, Node.js, WordPress. Databases: PostgreSQL, MySQL, SQLite, Mongo, Redis. Web front end: Ember.js, jQuery, d3.js, Freeboard, Mobiledoc, jPlayer, PanoJS, Bootstrap; SASS, CoffeeScript/ES6. Web server software: Apache, Nginx, Phusion Passenger, Apache Solr, Nagios, Ansible, Shibboleth SP. Development software: Cucumber, RSpec, qUnit; Git (GitHub/GitLab/BitBucket); Asana. Web services: AWS, DigitalOcean, EngineYard, Algolia, New Relic, Mailchimp, Mailgun. EMPLOYMENT Feb 2020– Back End Web and Applications Engineer, Nebo Agency, Atlanta Built websites and web applications (mainly Ruby and PHP), maintained web servers and database systems. Interfaced with clients and internal project teams, provided estimates for engineering tasks. Improved server response times by 10x on a high-profile client project (down to <200ms from over 2000ms). Built an OSX native application for internal task management (in Swift).
    [Show full text]
  • TPR01: Higher Ed on Rails Sven Aas, Web Team Lead, Mount Holyoke College, [email protected]
    TPR01: Higher Ed on Rails Sven Aas, Web Team Lead, Mount Holyoke College, [email protected] Links to presentation materials and additional information will be available at my website: http://www.mtholyoke.edu/~saas/ This is an incomplete and highly subjective set of lists, but I hope it will be a useful resource: Resources for Ruby and Rails Training Materials Official sites Online Training Materials Ruby (use 1.8.x for production, for now): Why's (Poignant) Guide to Ruby: http://www.ruby-lang.org/ http://poignantguide.net/ruby/ Rails: PeepCode Screencasts: http://www.rubyonrails.org/ http://peepcode.com/ Official News Books on Ruby Ruby News: Programming Ruby, 3rd Edition http://www.ruby-lang.org/en/news/ 2008, by D. Thomas, C. Fowler, and A. Hunt Riding Rails: http://weblog.rubyonrails.org/ The Ruby Way, 2nd Edition 2006, by H. Fulton Other Good Blogs Ruby Inside: The Ruby Programming Language http://www.rubyinside.com/ 2008, by D. Flanagan and Y. Matsumoto Giant Robots …: http://giantrobots.thoughtbot.com/ Books on Rails Rail Spikes: Agile Web Development with Rails, 3rd Edition http://railspikes.com/ 2008, by S. Ruby, D. Thomas, D. Hansson Rails Envy: http://www.railsenvy.com/ The Rails Way Railscasts: 2007, by O. Fernandez http://railscasts.com/ Rails Recipes 2006, by C. Fowler Advanced Rails Recipes 2008, by M. Clark Copyright 2008, Sven Aas Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License TPR01: Higher Ed on Rails Sven Aas, Web Team Lead, Mount Holyoke College, [email protected] Rails Tool Chain
    [Show full text]
  • Deploying and Monitoring Ruby on Rails a Practical Guide
    Mit hotfixes von Carsten Bormann 2011-03-05 + 2013-02-28 Deploying and Monitoring Ruby on Rails A practical guide Mathias Meyer and Jonathan Weiss, 25.05.2009 Danke! Peritor GmbH Mashed up with... 2011-03-05 Deployment/Scaling/ Caching/Debugging jan krutisch mindmatters gmbh&co. kg [email protected] http://mindmatters.de Deployment Real artists ship! Komponenten client (Browser) rails database client Heute: (Browser) ➔ railsthin mongrel (∨database unicorn) mongrel ist schnell apache ist schneller client webserver rails Dateisystem public/ database rails ist nicht threadsafe client rails webserver rails database Dateisystem rails public/ webserver rails webserver rails oldschool: CGI / SCGI / FastCGI newschool: http mongrel versus... mod_proxy_balancer (in Apache/nginx/lighttpd) oder ein richtiger proxy oder ein richtiger balancer Varnish HAProxy, Squid, etc. true school: passenger Apache-Modul client rails webserver rails database rails Dateisystem public/ mod_passenger automagisch. it just works. http://modrails.com Infrastructure Infrastructure 5 Simple Rails Setup One Rails instance handles all requests Rails is single-threaded: There is only one concurrent request 6 Rails Setup 7 Rails Setup 8 Typical Rails Setup •! A load-balancer distributes the incoming requests •! Some load-balancers will deliver static requests themselves •! Several Rails instances handle all requests •! Number of concurrent requests equals number of Rails instances 9 Rails Setup Options 10 Deployment Questions Apache? Pound? mod_proxy_balancer? FastCGI? Mongrel? Proxy? Load-balancer? Nginx? mod_rails? Ebb? HA-Proxy? Reverse Proxy? Swiftiply? Phusion Passenger? Thin? Pen? Rails Application Server? Lighttpd? 11 What we are going to cover today Rails Application Server Proxy/Web Server •! FastCGI •! Apache2 •! Mongrel •! Nginx •! mod_rails / Phussion Passenger •! Lighttpd •! JRuby + Glassfish & Co.
    [Show full text]