18.12.2012 Views

O'Reilly - Practical UNIX & Internet Sec... 7015KB

O'Reilly - Practical UNIX & Internet Sec... 7015KB

O'Reilly - Practical UNIX & Internet Sec... 7015KB

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

[Chapter 18] 18.3 Controlling Access to Files on Your Server<br />

Chapter 18<br />

WWW <strong>Sec</strong>urity<br />

18.3 Controlling Access to Files on Your Server<br />

Many sites are interested in limiting the scope of the information that they distribute with their Web servers.<br />

This may be because a Web server is used by an organization to distribute both internal data, such as<br />

employee handbooks or phone books, and external data, such as how to reach the organization's<br />

headquarters by mass transit. To provide for this requirement, many Web servers have a system for<br />

restricting access to Web documents.<br />

The WN Server<br />

Most of this chapter discusses the NCSA and CERN servers, which are two of the most popular servers in<br />

use on the <strong>Internet</strong> at this time. A server that appears to offer considerably more security than these servers<br />

is the WN server, developed by John Franks.<br />

The WN server is a Web server designed from the ground up to provide security and flexibility. The server<br />

can perform many functions, such as banners, footers, and searching, and the selective retrieval of portions<br />

of documents, which can only be performed on other servers using CGI scripts. The server is also smaller<br />

than the NCSA and CERN servers, making it easier to validate.<br />

Another feature of the WN server is that it will not transfer any file in any directory unless that file is listed<br />

in a special index file, normally called index.cache. The index file also contains the MIME file type of each<br />

file in the directory; thus, WN eliminates the need to give your Web files extensions, such as filename.html<br />

or picture.jpeg. Automated tools are provided for creating these files, if you chose to use them.<br />

We do not have significant experience with the WN server, but its design looks promising. For more<br />

information, check http://hopf.math.nwu.edu/docs/manual.html.<br />

Most servers support two primary techniques for controlling access to files and directories:<br />

1.<br />

2.<br />

Restricting access to particular IP addresses, subnets, or DNS domains.<br />

Restricting access to particular users. Users are authenticated through the use of a password that is<br />

stored on the server.<br />

Servers that are equipped with the necessary software for public key cryptography (usually, servers that are<br />

purchased for commercial purposes) have a third technique for restricting access:<br />

1.<br />

Restricting access to users who present public keys that are signed by an appropriate certification<br />

authority.<br />

file:///C|/Oreilly Unix etc/<strong>O'Reilly</strong> Reference Library/networking/puis/ch18_03.htm (1 of 6) [2002-04-12 10:44:26]

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!