Linode Forum
Linode Community Forums
 FAQFAQ    SearchSearch    MembersMembers      Register Register 
 LoginLogin [ Anonymous ] 
Post new topic  Reply to topic
Author Message
PostPosted: Thu Jul 20, 2006 3:09 pm 
Offline
Senior Newbie

Joined: Thu Jul 20, 2006 3:01 pm
Posts: 5
Website: http://www.benrawk.com
I have a situation that I would like to know people's opinions on. I want to set up a section of my website (at this point running on apache 1.3, which is running on Slackware 10.0) so that it can only be viewed and used by a few specific people, and all packets between those users and the web server should be as unreadable to outside observers as possible. I have been researching the best way to do this, but have had trouble piecing together a complete solution. IPsec? SSL? What do you think the best way to do this is, and do you have any links that could help with implementation? Thank you.


Top
   
PostPosted: Thu Jul 20, 2006 3:19 pm 
Offline
Senior Member

Joined: Thu Aug 28, 2003 12:57 am
Posts: 273
bjn2104 wrote:
I have a situation that I would like to know people's opinions on. I want to set up a section of my website (at this point running on apache 1.3, which is running on Slackware 10.0) so that it can only be viewed and used by a few specific people, and all packets between those users and the web server should be as unreadable to outside observers as possible. I have been researching the best way to do this, but have had trouble piecing together a complete solution. IPsec? SSL? What do you think the best way to do this is, and do you have any links that could help with implementation? Thank you.


Configure your web server to support SSL, and then put that section of the site behind the secure server. Use passsword authentication for those pages.

With SSL and password authentication:

* All traffic is encrypted using strong encryption and will completely unreadable by anyone sniffing the packets
* Only authenticated users will be able to read any of the web pages

I think this meets all your requirements.

It's been a while since I've done any web server configuration so I can't help you with the specific details of your server. But to answer your broader question, SSL and password authentication will satisfy your requirements.


Top
   
 Post subject:
PostPosted: Thu Jul 20, 2006 3:46 pm 
Offline
Senior Newbie

Joined: Thu Jul 20, 2006 3:01 pm
Posts: 5
Website: http://www.benrawk.com
bji,

Thank you for your reply, but from what I understand (and please correct me if I am wrong) if only using SSL it is impossible to authenticate packets, even if they are encrypted. This means that though they are unreadable to outsiders, they could have originated from anywhere, meaning that I cannot be sure that only the users I have authorized are viewing my encypted information. One of the upsides of IPsec, from what I have read, is that packets are both encrypted and signed by some sort of authenticating key/checksum. Please let me know what you think.


Top
   
 Post subject:
PostPosted: Thu Jul 20, 2006 7:18 pm 
Offline
Senior Member

Joined: Sat Jun 05, 2004 12:49 am
Posts: 333
IPSec is overkill.

1) Apache+SSL
2) Make users login with un/pw to that section
3)

Quote:
Deny from All
Allow from ip.goes.right.here
Allow from another.ip.goes.here
...


in an .htaccess file.


Top
   
 Post subject:
PostPosted: Thu Jul 20, 2006 7:45 pm 
Offline
Senior Member
User avatar

Joined: Fri Oct 24, 2003 3:51 pm
Posts: 965
Location: Netherlands
Correctly implemented SSL prevents anyone other than your authenticated users from reading your data. The packets could not have originated from anywhere - they have to be encrypted with the keys agreed when the SSL session was established. The vulnerability you were thinking of is probably a man-in the-middle (MITM) attack, where the attacker tricks your users into logging in to his spoof of your site and grabs the encryption keys, enabling him to read and alter communications in both directions.

IPSec makes MITM more difficult but is indeed overkill unless you're working for the feds or Colombian drug barons.

_________________
/ Peter


Top
   
 Post subject:
PostPosted: Thu Jul 20, 2006 10:51 pm 
Offline
Senior Newbie

Joined: Thu Jul 20, 2006 3:01 pm
Posts: 5
Website: http://www.benrawk.com
Thank you everyone, I will look into SSL


Top
   
 Post subject:
PostPosted: Fri Jul 21, 2006 9:47 am 
Offline
Senior Member

Joined: Sun Mar 14, 2004 9:18 pm
Posts: 116
Website: http://michael.susens-schurter.com/
WLM: mschurter@yahoo.com
Yahoo Messenger: mschurter
Location: Peoria, IL
For a highly secure web server I have used client & server side certificates in the past. That would allow clients to use a certificate (private key/public key pair) instead of a username & password to authenticate, or it could be used alongside traditional username & password logins for extra security.


Top
   
 Post subject:
PostPosted: Fri Jul 21, 2006 11:59 am 
Offline
Senior Newbie

Joined: Thu Jul 20, 2006 3:01 pm
Posts: 5
Website: http://www.benrawk.com
Untitled9,

That sounds like a great idea, using public/private keys and username/passwords involves something the user has and something the user knows, upping the probability that it is actually the expected user. And from what I understand, that is how the ssh protocal works. But what I am having a hard time understanding is how you would implement private/public key security for users logging into a website?


Top
   
Display posts from previous:  Sort by  
Post new topic  Reply to topic


Who is online

Users browsing this forum: No registered users and 0 guests


You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum

Search for:
Jump to:  
RSS

Powered by phpBB® Forum Software © phpBB Group