COIT20262 - Advanced Network Security, Term 2, 2017: Assignment 2
COIT20262 - Advanced Network Security, Term 2, 2017: Assignment 2
COIT20262 - Advanced Network Security, Term 2, 2017: Assignment 2
2
Weighting: 50%
Length: N/A
Instructions
Attempt all questions.
Submit the following on Moodle:
Answers: A Microsoft Word document containing answers to the questions.
Question 3: passwd.txt, shadow.txt, group.txt, and files.txt.
Question 4: certificate.pem and https.pcap.
This is an individual assignment, and it is expected students answer the questions themselves.
Discussion of approaches to solving questions is allowed (and encouraged), however each
student should develop and write-up their own answers. See CQUniversity resources on
Referencing and Plagiarism. Guidelines for this assignment include:
Do not exchange files (reports, captures, diagrams) with other students.
Complete tasks with virtnet yourself – do not use results from another student.
Draw your own diagrams. Do not use diagrams from other sources (Internet,
textbooks) or from other students.
Write your own explanations. In some cases, students may arrive at the same numerical
answer, however their explanation of the answer should always be their own.
Do not copy text from websites or textbooks. During research you should read and
understand what others have written, and then write in your own words.
A DMZ, which is attached to interface ifdmz of the gateway router and uses address
range 142.66.13.0/24.
A small network, referred to as shared, with interface ifin of the gateway router
connected to two other routers, referred to as staffR, and studentR. This network has
no hosts attached (only three routers) and uses network address 10.4.0.0/16.
A staff subnet, which is for use by staff members only, that is attached to the staffR
router and uses network address 10.4.10.0/24.
A student subnet, which is for use by students only, that is attached to the studentR
router and uses network address 10.4.20.0/24.
In summary, there are three routers in the network: the gateway router, and routers for the staff
and student subnets. There are four subnets: DMZ, shared, staff, and student.
There are three servers in the DMZ that all can accept requests from the Internet:
1. A web server supporting HTTP and HTTPS (IP address is 142.66.13.10)
2. A secure shell server using SSH (IP address is 142.66.13.20), and
3. A SMTP email server (IP address is 142.66.13.30).
Members of the staff and student subnets can access the web server; members of the staff
subnet only can access the email server but using IMAP; and internal members (both staff
and students) cannot access the SSH server.
The gateway router also runs a stateful packet filtering firewall and performs port address
translation. In addition to the DMZ setup as described above, security requirements for the
educational institute are:
External Internet users cannot access any internal computers (except in DMZ and as
stated in other requirements).
Staff and students can access websites in the Internet.
The SSH server in the DMZ can only be accessed by external Internet users from
subnets: 31.13.75.0/24 and 23.63.9.0/24.
(b) Specify the firewall rules using the format as in the table below. You may add/remove
rows as needed. After the table, add an explanation of the rules (why you design the
firewall rules the way you did). [4 marks]
Rule Transport Source Source Dest. Dest. Action
No. IP Port IP Port
1
2
3
4
…
(c) When using iptables as firewall software, you can change the default policy using the
–P option. Explain the two common default policies, and explain the tradeoffs
between the policies. [2 marks]
Marking Scheme
(a) 3 marks if correct network is drawn and labelled. 2 marks if some mistakes in location
of nodes or links, or allocation of addresses. 0 or 1 mark if multiple mistakes.
(b) If all necessary rules are included, and no unnecessary rules are included, you will
receive 4 marks. 0.5 mark will be deducted for an incorrect rule or incorrect
explanation of the rule. 0.5 mark will be deducted for a missing rule. 0.5 mark will be
deducted for a rule that is included but not needed. The explanation will only be
considered if the rules appear wrong or inappropriate.
(c) 2 marks if explanation of both policies is clear and advantages/disadvantages are
given. 1 mark if unclear or one advantage/disadvantage wrong/missing.
Marking Scheme
For each part 2 marks:
1 mark if demonstrate a good understanding of the approach with clear and correct
descriptions;
0.5 mark for each correct/clear advantage and disadvantage
o Use only the basic Linux permissions (see example commands below). Do
NOT use advanced permissions such as with setfacl or getfacl.
7. Test that the access control works by logging in as each user and checking they
can(not) access the specified files/directories.
Answer the following questions after completing the task.
(a) Submit the following files on Moodle [8 marks]:
a. /etc/passwd named as passwd.txt when you submit
b. /etc/shadow as shadow.txt
c. /etc/group as group.txt
d. The output of the following command as files.txt:
sudo sh -c ‘ls -lR /home > /home/network/files.txt’
(b) Explain where and how password information is stored in Linux. You should mention
the files, formats of storing passwords (e.g. what is stored, how is the information
created) and any specific algorithms used. [2 marks]
(c) Explain why it is difficult for an administrator to know if two users use the same
password. [1 mark]
(d) If a malicious user obtains the file(s) where password information is stored, and users
selected long random passwords, then explain why it is difficult for them to find
users’ actual passwords. [1 mark]
Marking Scheme
(a) The files submitted must contain relevant information: 1 mark each for passwd,
shadow and group. 5 marks for file.txt, where marks are allocated based on the
required permission settings.
(b) 2 marks for listing all correct files, formats and algorithms. 0.5 mark will be deducted
for each item missing or wrong.
(c) 1 mark for a clear and correct explantion.
(d) 1 mark for a clear and correct explantion.
You may use the above diagram (or similar a diagram) to illustrate each of the techniques.
Marking Scheme
(a) For each technique: 1 mark for the explanation and diagram; 1 mark for the
recommendation; and 1 mark for how to compromise.