Secure Computer Applications in an Enterprise Environment

Secure Computer Applications in an Enterprise Environment

ABSTRACT TIM LOWMAN. Secure Computer Applications in an Enterprise Environment. (Under the direction of Dr. Vicki Jones.) Sophisticated computing environments support many of the complex tasks which arise in modern enterprises. An enterprise environment is a collective of the organization’s software, hardware, networking, and data systems. Typically, many user workstations com- municate with shared servers, balancing computer processing throughout the organization. In a “secure” modern enterprise issues of authentication, private communication, and pro- tected, shared data space must be addressed. In this thesis we present a general model for adding security to the currently popular enterprise architecture: the World Wide Web (WWW). The results of our investigation into adding security to the general WWW ar- chitecture are reported in this document. We focus on authenticating users (Kerberos), establishing a secure communication link for private data exchange (SSL), protected space to store shared data (AFS filesystem), and an enhanced server (Apache) to integrate these components. After presenting our secure model, we describe a prototype application, built using our approach, which addresses a common problem of secure online submission of homework assignments in a university environment. ii BIOGRAPHY Tim Lowman is the Systems Programmer II for North Carolina State University. He earned his Bachelors of Science in 1990. He also teaches at NC State, CSC255: String Processing with the Perl Language. iii ACKNOWLEDGEMENTS I would like to thank all of the people who gave me support. My mother (Carolyn Lowman) and my father (Jimmy Lowman) who always told me I would go far. Dr. Fornaro and Carol Miller, two instructors who were there from start to end of my undergraduate and graduate career. Dr. Vicki Jones for accepting the position as chair of the committee. Dr. Rob St. Amant for comments about the user interface. The entire AD&D crew (Dan Deter, Dana and Charles Brabec, Jeff Webster, Lee Gray, Dwayne Sorrell, and James Deal) for repeated kicks in the rear to get this work finished. I would like to thank Lou Harrison for being so understanding when I was down to the final wire. Lastly, I would like to thank my hero Larry Wall (creator of Perl and many other tools I use on a daily basis). iv Contents List of Figures vi 1 Introduction 1 1.1 Enterprise Environment . .................... 1 1.2 Security Issues . .............................. 1 1.3LiteratureSearch................................. 2 1.4ProblemStatement................................ 3 1.4.1 Encryption................................ 4 1.4.2 Authentication.............................. 5 1.4.3 SecureTransmissionProtocol...................... 8 1.4.4 SecureStorageAreas........................... 9 1.5ThesisOrganization............................... 9 2 Background 10 2.1 The Basic Language: HTML . .................... 11 2.2TheServer:HTTP................................ 13 2.3DynamicallyCreatedHTML:CGI....................... 15 2.4HowtoSecuretheProtocol........................... 17 2.4.1 DigitalCertificates............................ 17 2.4.2 SecureSocketLayer:SSL........................ 19 2.5AuthenticationMethods:Kerberos....................... 23 2.6 Securing the File Area: Andrew File System . ............. 25 2.7DatabaseSharedResources........................... 26 3 The Architecture of a Solution 29 3.1IdentifyingtheUser............................... 29 3.2SettingupanSSLConnection.......................... 30 3.3Uploading,Downloading,andModifyingData................. 31 3.4 Building a Secure Enterprise Application .................... 33 3.4.1 UpgradingtheWebServer........................ 34 3.4.2 PreparingtheUser’sBrowser...................... 37 3.4.3 CGIApplicationSetup......................... 37 3.4.4 CreatingIPBasedAuthentication................... 39 v 4 Submit 40 4.1 Submit Background . .............................. 40 4.2 Submit Implementation . .................... 41 5 Conclusions 48 5.1Conclusions.................................... 48 Bibliography 49 A Apache Kerberos Module 53 B access.conf 80 C Certficate Authority Creation 83 D Sybase Scripts 85 E Submit Perl Library 94 F Submit 106 vi List of Figures 1.1 Pros and Cons of Current Security Methods. ............. 3 1.2Encryption..................................... 4 1.3ASampleUNIX/etc/passwdEntry....................... 4 1.4ASimplePerlOneWayEncryption....................... 4 1.5ASampleCryptSession.............................. 5 1.6BasicAuthentication............................... 6 1.7ThirdPartyAuthentication-AwantstotalktoB............... 7 2.1GeneralPurposeCommunicationModel..................... 10 2.2ASimpleHTMLDocument............................ 12 2.3Multipart/form-data:FileUploadsinHTMLVersion4............ 12 2.4HypertextTransferProtocol........................... 13 2.5ASampleJavaScript............................... 16 2.6t.pl-ASimpleCGIProgram........................... 17 2.7OutputofCGIprogram.............................. 18 2.8DigitalCertificatesExplained........................... 19 2.9ASampleX.509DigitalCertificate........................ 20 2.10SSLHighLevelSetup............................... 20 2.11ASampleApacheMIMETypesFile....................... 21 2.12CGIProgramtoDownloadCertificates..................... 21 2.13NetscapeInsecureandSecureKeyIcon..................... 22 2.14Tcpdumpoutput.................................. 23 2.15AFSTicketsandTokens............................. 26 2.16PTSCommand................................... 26 2.17PerlScriptWhichConnectstoanSQLServer................. 27 3.1NewModeloftheApplicationwithSecurityEnhancements.......... 30 3.2InitialCommunication............................... 30 3.3ObtainingthePublicCertificate......................... 31 3.4SiteCertificate................................... 32 3.5SSLHandshake.................................. 32 3.6Authentication................................... 33 3.7CGIExecutionontheHTTPServer....................... 33 vii 3.8ApacheSecureServer............................... 35 3.9 Kerberos Authentication in access.conf. .................... 35 3.10AURLforLoadingaDigitalCertificate..................... 37 3.11mdtest.pl,APerlExampleofMD5....................... 38 3.12OutputofthePerlMD5Program........................ 38 4.1Sparcstation5MachineConfiguration...................... 42 4.2ApacheSecureServer............................... 42 4.3 Algorithm for Submit. .............................. 45 4.4SybaseTables................................... 47 4.5AFlat-fileDatabase................................ 47 1 Chapter 1 Introduction 1.1 Enterprise Environment What is an enterprise environment? An enterprise environment is the collective of an organization’s software, hardware, networking, and data systems. The environment can effectively place all enterprise computing power on each user’s desktop. It also cre- ates an organization-wide network, perhaps linking many smaller networks. Typically, an enterprise environment comprises workstations, servers, shared database resources, and a communications network. In an enterprise environment processing is distributed among workstations and servers where servers specialize in their function. Large databases exist which contain shared information that is available to users in the enterprise environment. Individual computers are linked together via a network backbone which allows devices to communicate with one another. However in the enterprise environment, the network is not necessarily guaranteed to be secure. In this work, we study the problems associated with securing computer applications in an enterprise environment, provide a general solution architecture for securing computer applications, and discuss a prototype implementation of the general solution architecture. 1.2 Security Issues Before enterprise environments, users were protected from each other by the op- erating system running on a central processing unit (CPU). In the enterprise environment, users no longer work on a single system, but instead work in the computing collective. 2 Applications, which were once bound to a single system, may now use the full resources of an enterprise environment: remote databases, high capacity networks, and a multiple CPU configuration. Collaborative ventures require users to cooperate or share data with each other. Data transactions within the environment need to occur in a secure manner. Why? If transactions are not secure, one risks revealing private data to individuals who are not part of the collaborative venture. “Secure manner” has many meanings based on the functions the application per- forms. At one end of the spectrum, there is a need for protection, but in which the conse- quences of a security breach are minimal. At the opposite end, the requirement is to protect the classified data at all costs. In a minimal consequence environment, a simple security protocol might require the user to enter a birth date, phone number, or other trivial data item which would be used to establish the user’s identity. While this “soft-security” ap- proach works with applications that have minimal consequences of a security breach, other applications involving classified data require a maximum security approach. This maximum security approach may require complex challenge/response schemes, complex passwords, or additional security hardware for example a key to the computer console or a keyed magnetic card. 1.3 Literature Search Security literature offers competing technologies to provide

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    117 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us