Difference between revisions of "OPS335 - Assignment 2"

From CDOT Wiki
Jump to: navigation, search
m (Set-up a Samba Server (zorin): - fixing a typo)
m (Set-up a Samba Server (zorin): - clarifying share names)
Line 61: Line 61:
 
     +-- domination
 
     +-- domination
 
</pre>
 
</pre>
<ol><li value="6">Set up permissions/ownership on those directories for your Linux users on the file server so that:<ol type="a"><li>'''tarot-yoursenecaid''' and '''octopus-yoursenecaid''' have '''read/write''' access to their own <u>private</u> directories.</li><li>'''spectre-yoursenecaid''' has '''read/write''' access to <u>every</u> directory.</li><li>Everyone has '''read''' access to the '''conquest''' directory (but only the '''spectre''' has '''write''' access too).</li><li>Everyone can both '''read''' and '''write''' to the '''readwrite''' directory.</li></ol></li><li>Set up '''three''' Samba users to mirror your new Linux users.</li><li>Configure '''five''' shares (one for each directory above) with permissions as close as possible to the Linux permissions.</li></ol>
+
<ol><li value="6">Set up permissions/ownership on those directories for your Linux users on the file server so that:<ol type="a"><li>'''tarot-yoursenecaid''' and '''octopus-yoursenecaid''' have '''read/write''' access to their own <u>private</u> directories.</li><li>'''spectre-yoursenecaid''' has '''read/write''' access to <u>every</u> directory.</li><li>Everyone has '''read''' access to the '''conquest''' directory (but only the '''spectre''' has '''write''' access too).</li><li>Everyone can both '''read''' and '''write''' to the '''readwrite''' directory.</li></ol></li><li>Set up '''three''' Samba users to mirror your new Linux users.</li><li>Configure '''five''' shares (one for each of tarot, octopus, spectre, conquest, and domination) with permissions as close as possible to the Linux permissions.</li></ol>
  
 
=== Set-up Windows Client to Test Samba server ('''zorin''')===
 
=== Set-up Windows Client to Test Samba server ('''zorin''')===

Revision as of 22:19, 5 March 2019

Purpose

In this assignment, you will use the 335assign virtual network and the blofeld cloning-source that you created in assignment 1 (part 1) to create two e-mail servers: a Mail Transfer Agent called carver and a Message Store (IMAP) called drax. You will also use the blofeld cloning source to create a Samba server called zorin. In addition to creating those Linux servers, you will also be required to create a virtual machine for an MS Windows operating system to test-out your Samba server. As you perform and submit this assignment, you MUST run the wint Master Name server and kidd Slave server in order to resolve domain names to IP addresses.

General Requirements

Weight: 10% of the overall grade

Due Date (Winter 2019): During Week 13 (in class)

Detailed Requirements

Important.png
It is YOUR responsibility to Backup all of your VMs for this Assignment!
You are required to frequently backup your VMs prior to exiting a work session during this assignment. Your instructor will NOT accept the fact that your hard disk crashed and lost all of your work. If you properly backed up your VM images and xml configuration files to a USB, then you can purchase a new hard-disk or wipe and recreate your hard disk and restore your VMs. Students who fail to submit their assignment #2 by the last day of scheduled classes will receive an INC grade (assuming they passed all of the other requirements for this course) and will be required to show their instructor their working assignment #2 no later than 4PM on the first Tuesday of the next semester; otherwise, they will fail the course. Students with accommodations should discuss arrangements regarding due dates / submission of assignment #2. Students that are missing both of assignment #1 and assignment #2 will fail this course.


Set-up Mail Transfer Agent (carver)

Perform the following steps for this section:

  1. Create a clone virtual machine called carver from the blofeld cloning-source. Refer to the table below for address and hostname.
  2. The root user on your host machine must be able to ssh to the root account on each machine without being prompted for a password.
  3. Create a regular user for this virtual machine using your Seneca userID.
  4. Any machine within the bond.villains.ops domain will be able to route outgoing email through this server.
  5. Any mail sent directly from this machine will use the domain as the sending address (i.e. user@bond.villains.ops)
  6. You are NOT required to encrypt received email messages.
  7. This machine will relay received email messages for any user account in the bond.villains.ops domain to drax.bond.villains.ops.

Set-up Mail Delivery Agent / Message Store (drax)

Perform the following steps for this section:

  1. Create a clone virtual machine called drax from the blofeld cloning-source. Refer to the table below for address and hostname.
  2. Create a regular user for this virtual machine using your Seneca userID.
  3. The root user on your host machine must be able to ssh to the root account on each machine without being prompted for a password.
  4. This machine will accept incoming email for any user account in the bond.villains.ops domain.
  5. No other machine in this domain will accept incoming email.
  6. This machine will be an IMAP server (i.e. NOT POP3 or LTMP).
  7. This machine will NOT use encryption.
  8. This machine will use postfix's built-in LDA to store received emails in maildir format in a sub-directory of each users' home directory called mailboxes.
  9. Any mail sent to root will be automatically delivered into the mailbox of the regular user created above.
  10. Configure your Thunderbird application (installed in Lab 4b) to allow the user to send and receive email messages using the carver and drax servers.

Add MX records to the forward lookup zone on your master DNS server so that all incoming mail addressed to the domain is sent to your IMAP server (drax) first, and the MTA (carver) as a fall-back.

Set-up a Samba Server (zorin)

Perform the following steps for this section:

  1. Create a clone virtual machine called zorin from the blofeld cloning-source. Refer to the table below for address and hostname.
  2. Create a regular user for this virtual machine using your Seneca userID.
  3. The root user on your host machine must be able to ssh to the root account on each machine without being prompted for a password.
  4. It will run Samba (automatically on boot) to share files with machines in this network.
  5. Create three new users on the Samba file server, call them tarot-yoursenecaid, octopus-yoursenecaid, and spectre-yoursenecaid. (replace "yoursenecaid" with your actual Seneca ID)
  6. Create a directory /plans with the following subdirectories:
/plans
+-- evil
¦   +-- tarot
¦   +-- octopus
¦   +-- spectre
+-- world
    +-- conquest
    +-- domination
  1. Set up permissions/ownership on those directories for your Linux users on the file server so that:
    1. tarot-yoursenecaid and octopus-yoursenecaid have read/write access to their own private directories.
    2. spectre-yoursenecaid has read/write access to every directory.
    3. Everyone has read access to the conquest directory (but only the spectre has write access too).
    4. Everyone can both read and write to the readwrite directory.
  2. Set up three Samba users to mirror your new Linux users.
  3. Configure five shares (one for each of tarot, octopus, spectre, conquest, and domination) with permissions as close as possible to the Linux permissions.

Set-up Windows Client to Test Samba server (zorin)

Perform the following steps for this section:

  1. Create a MS Windows OS as a virtual machine. You should know by now how to obtain the MS Windows image from Seneca's MSDN section (trial version good for 30 days). Refer to the table below for address and hostname.
  2. Create a regular user for this virtual machine using your Seneca userID.
  3. The root user on your host machine must be able to ssh to the root account on each machine without being prompted for a password.
  4. This machine will use the master and slave DNS servers in your domain as the primary and secondary DNS servers. It will not have access to any other DNS servers.

Network Configuration

As you will now have functioning primary and secondary DNS servers, modify your network configuration file for the carver, drax, and zorin servers specify the correct IPADDR.

Table of Virtual Machines / DNS Records

Below is network configuration for ALL virtual machines used in this assignment and previous assignments for this course:

Hostname / Domain Address Purpose
no.bond.villains.ops (your existing host) External Facing Address: DHCP assigned
Internal Virtual Bridge (virbr1): 172.19.1.1
Your host machine
blofeld.bond.villains.ops 172.19.1.100 Cloning-source used to create other servers for other assignments.
wint.bond.villains.ops 172.19.1.2 Master Name Server
kidd.bond.villains.ops 172.19.1.3 Slave Name Server
carver.bond.villains.ops 172.19.1.5 SMTP mail Server
drax.bond.villains.ops 172.19.1.6 IMAP mail Server
zorin.bond.villains.ops 172.19.1.8 Samba Server

Set-up Firewall Policies

In addition to the basic firewall established in assignment 1, ensure the following restrictions are met:

  1. Any machine may send smtp traffic to carver and drax.
  2. Only machines in the local network may send IMAP traffic to drax.
  3. Only machines in the local network may access the samba shares on zorin.

Assignment Submission

The student is required to prove to their professor that their set-up works correctly during the regularly-scheduled lab period.

Assignment Evaluation Details

  • Demonstrate working assignment to your instructor in class:
    1. You need to run their full backup shell script to backup all of your VMs (like you did in Assignment 1 - Part 2.
    2. Students need to demonstrate their assignment functionality to their professor during a lab period
      (like you would for any lab for "sign-off").
    3. Students are required to prepare everything ahead of time so that you can quickly demonstrate to your instructor that all required parts of your assignment are working.
    4. Do not proceed to the next step until you have demonstrated your assignment to your instructor to check for errors that may cause problems when running the checking script.

  • Download and run a shell script to check your work:
  1. Login as root on your host machine.
  2. Change to the /root/bin directory.
  3. Make certain that your assignment VMs are running.
  4. Make certain that the mailx command has been installed. If not, issue the following command to install e-mail on your host machine:
    yum install mailx
  5. Issue the command to download a checking script for your assignment to your host machine:wget https://matrix.senecacollege.ca/~peter.callaghan/files/OPS335/check-assn2.bash

    Set execute permissions and run the shell script.
    (Your shell script contents will be mailed to your OPS335 instructor's Seneca email, and a confirmation message will be emailed to you.

    If you do NOT receive an e-mail message in your Seneca email account, then there is a problem, and you MUST rerun or contact your OPS335 instructor immediately.
    • Additional Assignment Information:
      1. This assignment is to be completed individually. Group submissions are not allowed.
      2. Test your machine to make sure it works. If a machine is not accessible (e.g. will not boot, can not be accessed through ssh from your host, etc.), or is otherwise non-functional, you may be told to resubmit.
      3. Late submissions are a subject to a penalty of 10% per day.

      Evaluation Rubric

      Here is an evaluation rubric (in table form) showing you how you will be evaluated for this assignment. Part of the rubric is marked from professor observation from student demonstration of assignment in class, and the other part is based on output from the results of an assignment checking script that the student will download and run.

      Student Demonstration (in class)
      Evaluation Item Mark
      SMTP and IMAP Servers:
      Proof of SMTP Server Running on carver server
      /1
      E-mails sent from carver and zorin servers to drax server (user@IP_ADDR)
      /1
      E-mails sent from carver and zorin servers to drax server (user@DOMAIN_NAME)
      /1
      Samba Server Access via client:
      tarot-yoursenecaid and octopus-yoursenecaid have read/write access
      /1
      spectre-yoursenecaid has read/write access to every directory
      /1
      All accounts have read' access to the conquest directory
      (but only
      spectre-yoursenecaid
      has write access)
      /1
      All accounts can both read and write to the domination directory.
      /1
      Configuration (Checking Script Output)
      Evaluation Item Mark
      Mail Transfer Agent (carver) - General Configuration
      Postfix MTA settings
      /5
      Mail Delivery Agent (MTA) / Message Store (MS) - General Configuration
      Postfix MTA settings
      /3
      LDA settings
      /1
      Email sent to root is delivered to non-privileged user
      /1
      AA (Access Agent – IMAP) settings
      /4
      DNS configuration
      Correct MX records exist
      /2
      MX records prioritize access to mail servers correctly
      /2
      Samba Server - General Configuration
      Directories shared with correct permissions
      /5
      Samba accounts created (1 mark each)
      /3
      Writing allowed to directories
      /1
      Firewall policies
      MTAs allow SMTP traffic
      /2
      AA allows IMAP traffic
      /1
      IMAP traffic limited to local network
      /1
      Samba server allows samba traffic
      /1
      Samba traffic limited to local network
      /1
      Less Deductions (One mark per issue for EACH VM):
      • Not using zone filenames: mydb-for-bond.villains.ops and mydb-for-172.19.1
      • DOMAIN Name NOT Resolved
      • VM hostname NOT set
      • firewallenabled / running
      • iptables disabled / not running
      • No Yum update
      • Services NOT active
      • Local hostname resolution appears in /etc/hosts (1 mark per entry, per vm)
      • Neglecting major safeguards (e.g. no firewall present, firewall allowing all traffic, no active SELinux) (4 marks per issue, per VM)
      • Failing to backup VMs (1 mark deduction for each VM not backed up)
      TOTAL /40