11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

784 <strong>Improving</strong> <strong>Web</strong> <strong>Application</strong> <strong>Security</strong>: <strong>Threats</strong> <strong>and</strong> CountermeasuresRestricting Server-to-Server CommunicationYou can also use IPSec to provide server authentication. This is useful whenrestricting the range of computers that can connect to middle-tier application serversor database servers. IPSec provides three authentication options:●●●KerberosTo use Kerberos, the computers must:● Be part of the same domain <strong>and</strong> forest● Be within a specific source address range● Be within the same subnet● Use static IP addressesPre-shared secret keyTo use pre-shared secret-key-based authentication, the two computers must sharean encryption key.Certificate-based authenticationTo use certificate authentication, the two computers must trust a commoncertificate authority (CA), <strong>and</strong> the server that performs the authentication mustrequest <strong>and</strong> install a certificate from the CA.In this section, you set up IPSec authentication between two servers by using a presharedsecret key. To perform server-to-server authentication1. Start the Local <strong>Security</strong> Policy MMC snap-in.2. Right-click IPSec <strong>Security</strong> policies on the local machine, <strong>and</strong> then click Create IP<strong>Security</strong> Policy.3. Type “MyAuthPolicy” [SSJ2]for the name, <strong>and</strong> then click Next.4. Clear the Activate the default response rule check box.5. Click Next <strong>and</strong> then Finish.The MyAuthPolicy Properties dialog box is displayed so that you can edit thepolicy properties.6. Click Add, <strong>and</strong> then click Next three times.7. In the Authentication Method dialog box, select Use this string to protect the keyexchange (preshared key).8. Enter a long, r<strong>and</strong>om set of characters in the text box, <strong>and</strong> then click Next.You should copy the key to a floppy disk or CD. You need it to configure thecommunicating server.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!