cs526 logo
rainbow animatio

Homework #3. Setup Virtual Machine using vCenter and Configure Apache for Certificate-based Mutual Authentication

Goal:

Assignment Date: 2/22/2012
Due Day: 2/29/2012 (revised)
Related documents:

Description:

Logistics:

Part 1. Create a folder and clone/configure a FC16 virtual machine.

Part 2. Setup FC16 virtual machine for Secure Web Access

Part 3. Create Password Protected Web Directory and Explore Apache .htaccess access control

Exercise A:

Exercise B:

Questions.

  1. Using virtual machines in the context of hw3 has the following advantages/disadvantages:
    1. Students has root privileges to configure the server certificate.
    2. The web server can be configured to run on ports 80 and 443, which you cannot do on walrus with a normal user account.
    3. Require a large collection dedicated IP addresses for vms and creating related DNS entries.
    4. A student can install additional modules or services without interfering other students.
    5. The virtual machines can be allocated to run on one of the seven vSphere host based on the load status and certain policy set by the system admin.
    6. The virtual machines still share the computation and storage resources with others using the same hosts/networks.
    7. It allows user to configure/install OS remotely which cannot be easy done on a real machine in the lab.

      Add two advantages and disadvantages to the above list.
  2. Public Key Infrastructure (PKI) and secure web access.
    1. What are its advantages compared with login/password based authentication? Name two and discuss briefly.
    2. For PKI to work, what specific data or software modules we need to trust. List three of them from most critical to less critical and indicate who provides the data or software.
    3. Why the private key of the web serve need to be decrypted? How it can be protected if the system has other "potential malicious" local users.
    4. What are contained in a .p12 file for hw3 exercise?
    5. Why the mutual authentication directives which govern the access of /var/www/html/secure cannot be inside /etc/httpd/conf.d/ssl.conf and have to be in /etc/httpd/conf/httpd.conf?
    6. Not all personal certificates signed by CAcsnet can access your secure web site. For example the one in cs526.p12 cannot. How do you control that?
    7. Briefly describe how to find out a certificate is revoked. For large organizations such as DoD, how can they detect the certificates presented are still legimate? Name one protocol and describe concisely its technique.
  3. Htaccess.
    1. Based on part 3 exercise B, describe your observation and analysis on how apache implements the .htaccess mechanism. Is it following Unix file access model?
    2. What is the purpose of using DBM for authenticating user password?

Create a homework web page hw3.html in your cs526 personal web page directory. Email the url and anawers of the above questions to cchow@uccs.edu and aalmuray@uccs.edu with subject field "CS526 hw3".