Difference between revisions of "OPS335 - Assignment 2"
m (→Set-up a Samba Server (zorin): - clarifying share names) |
m (→Set-up a Samba Server (zorin): - fixing share name) |
||
Line 61: | Line 61: | ||
+-- domination | +-- domination | ||
</pre> | </pre> | ||
− | <ol><li value="6">Set up permissions/ownership on those directories for your Linux users on the file server so that:<ol type="a"><li>'''tarot-yoursenecaid''' and '''octopus-yoursenecaid''' have '''read/write''' access to their own <u>private</u> directories.</li><li>'''spectre-yoursenecaid''' has '''read/write''' access to <u>every</u> directory.</li><li>Everyone has '''read''' access to the '''conquest''' directory (but only the '''spectre''' has '''write''' access too).</li><li>Everyone can both '''read''' and '''write''' to the ''' | + | <ol><li value="6">Set up permissions/ownership on those directories for your Linux users on the file server so that:<ol type="a"><li>'''tarot-yoursenecaid''' and '''octopus-yoursenecaid''' have '''read/write''' access to their own <u>private</u> directories.</li><li>'''spectre-yoursenecaid''' has '''read/write''' access to <u>every</u> directory.</li><li>Everyone has '''read''' access to the '''conquest''' directory (but only the '''spectre''' has '''write''' access too).</li><li>Everyone can both '''read''' and '''write''' to the '''domination''' directory.</li></ol></li><li>Set up '''three''' Samba users to mirror your new Linux users.</li><li>Configure '''five''' shares (one for each of tarot, octopus, spectre, conquest, and domination) with permissions as close as possible to the Linux permissions.</li></ol> |
=== Set-up Windows Client to Test Samba server ('''zorin''')=== | === Set-up Windows Client to Test Samba server ('''zorin''')=== |
Revision as of 16:24, 25 March 2019
Contents
Purpose
In this assignment, you will use the 335assign virtual network and the blofeld cloning-source that you created in assignment 1 (part 1) to create two e-mail servers: a Mail Transfer Agent called carver and a Message Store (IMAP) called drax. You will also use the blofeld cloning source to create a Samba server called zorin. In addition to creating those Linux servers, you will also be required to create a virtual machine for an MS Windows operating system to test-out your Samba server. As you perform and submit this assignment, you MUST run the wint Master Name server and kidd Slave server in order to resolve domain names to IP addresses.
General Requirements
Weight: 10% of the overall grade
Due Date (Winter 2019): During Week 13 (in class)
Detailed Requirements
Set-up Mail Transfer Agent (carver)
Perform the following steps for this section:
- Create a clone virtual machine called carver from the blofeld cloning-source. Refer to the table below for address and hostname.
- The root user on your host machine must be able to ssh to the root account on each machine without being prompted for a password.
- Create a regular user for this virtual machine using your Seneca userID.
- Any machine within the bond.villains.ops domain will be able to route outgoing email through this server.
- Any mail sent directly from this machine will use the domain as the sending address (i.e. user@bond.villains.ops)
- You are NOT required to encrypt received email messages.
- This machine will relay received email messages for any user account in the bond.villains.ops domain to drax.bond.villains.ops.
Set-up Mail Delivery Agent / Message Store (drax)
Perform the following steps for this section:
- Create a clone virtual machine called drax from the blofeld cloning-source. Refer to the table below for address and hostname.
- Create a regular user for this virtual machine using your Seneca userID.
- The root user on your host machine must be able to ssh to the root account on each machine without being prompted for a password.
- This machine will accept incoming email for any user account in the bond.villains.ops domain.
- No other machine in this domain will accept incoming email.
- This machine will be an IMAP server (i.e. NOT POP3 or LTMP).
- This machine will NOT use encryption.
- This machine will use postfix's built-in LDA to store received emails in maildir format in a sub-directory of each users' home directory called mailboxes.
- Any mail sent to root will be automatically delivered into the mailbox of the regular user created above.
- Configure your Thunderbird application (installed in Lab 4b) to allow the user to send and receive email messages using the carver and drax servers.
Add MX records to the forward lookup zone on your master DNS server so that all incoming mail addressed to the domain is sent to your IMAP server (drax) first, and the MTA (carver) as a fall-back.
Set-up a Samba Server (zorin)
Perform the following steps for this section:
- Create a clone virtual machine called zorin from the blofeld cloning-source. Refer to the table below for address and hostname.
- Create a regular user for this virtual machine using your Seneca userID.
- The root user on your host machine must be able to ssh to the root account on each machine without being prompted for a password.
- It will run Samba (automatically on boot) to share files with machines in this network.
- Create three new users on the Samba file server, call them tarot-yoursenecaid, octopus-yoursenecaid, and spectre-yoursenecaid. (replace "yoursenecaid" with your actual Seneca ID)
- Create a directory /plans with the following subdirectories:
/plans +-- evil ¦ +-- tarot ¦ +-- octopus ¦ +-- spectre +-- world +-- conquest +-- domination
- Set up permissions/ownership on those directories for your Linux users on the file server so that:
- tarot-yoursenecaid and octopus-yoursenecaid have read/write access to their own private directories.
- spectre-yoursenecaid has read/write access to every directory.
- Everyone has read access to the conquest directory (but only the spectre has write access too).
- Everyone can both read and write to the domination directory.
- Set up three Samba users to mirror your new Linux users.
- Configure five shares (one for each of tarot, octopus, spectre, conquest, and domination) with permissions as close as possible to the Linux permissions.
Set-up Windows Client to Test Samba server (zorin)
Perform the following steps for this section:
- Create a MS Windows OS as a virtual machine. You should know by now how to obtain the MS Windows image from Seneca's MSDN section (trial version good for 30 days). Refer to the table below for address and hostname.
- Create a regular user for this virtual machine using your Seneca userID.
- The root user on your host machine must be able to ssh to the root account on each machine without being prompted for a password.
- This machine will use the master and slave DNS servers in your domain as the primary and secondary DNS servers. It will not have access to any other DNS servers.
Network Configuration
As you will now have functioning primary and secondary DNS servers, modify your network configuration file for the carver, drax, and zorin servers specify the correct IPADDR.
Table of Virtual Machines / DNS Records
Below is network configuration for ALL virtual machines used in this assignment and previous assignments for this course:
Hostname / Domain | Address | Purpose |
no.bond.villains.ops (your existing host) | External Facing Address: DHCP assigned Internal Virtual Bridge (virbr1): 172.19.1.1 |
Your host machine |
blofeld.bond.villains.ops | 172.19.1.100 | Cloning-source used to create other servers for other assignments. |
wint.bond.villains.ops | 172.19.1.2 | Master Name Server |
kidd.bond.villains.ops | 172.19.1.3 | Slave Name Server |
carver.bond.villains.ops | 172.19.1.5 | SMTP mail Server |
drax.bond.villains.ops | 172.19.1.6 | IMAP mail Server |
zorin.bond.villains.ops | 172.19.1.8 | Samba Server |
Set-up Firewall Policies
In addition to the basic firewall established in assignment 1, ensure the following restrictions are met:
- Any machine may send smtp traffic to carver and drax.
- Only machines in the local network may send IMAP traffic to drax.
- Only machines in the local network may access the samba shares on zorin.
Assignment Submission
The student is required to prove to their professor that their set-up works correctly during the regularly-scheduled lab period.
Assignment Evaluation Details
- Demonstrate working assignment to your instructor in class:
- You need to run their full backup shell script to backup all of your VMs (like you did in Assignment 1 - Part 2.
- Students need to demonstrate their assignment functionality to their professor during a lab period
(like you would for any lab for "sign-off"). - Students are required to prepare everything ahead of time so that you can quickly demonstrate to your instructor that all required parts of your assignment are working.
- Do not proceed to the next step until you have demonstrated your assignment to your instructor to check for errors that may cause problems when running the checking script.
- Download and run a shell script to check your work:
- Login as root on your host machine.
- Change to the /root/bin directory.
- Make certain that your assignment VMs are running.
- Make certain that the mailx command has been installed. If not, issue the following command to install e-mail on your host machine:
yum install mailx
- Issue the command to download a checking script for your assignment to your host machine:wget https://matrix.senecacollege.ca/~peter.callaghan/files/OPS335/check-assn2.bash
Set execute permissions and run the shell script.
(Your shell script contents will be mailed to your OPS335 instructor's Seneca email, and a confirmation message will be emailed to you.
If you do NOT receive an e-mail message in your Seneca email account, then there is a problem, and you MUST rerun or contact your OPS335 instructor immediately.- Additional Assignment Information:
- This assignment is to be completed individually. Group submissions are not allowed.
- Test your machine to make sure it works. If a machine is not accessible (e.g. will not boot, can not be accessed through ssh from your host, etc.), or is otherwise non-functional, you may be told to resubmit.
- Late submissions are a subject to a penalty of 10% per day.
Evaluation Rubric
Here is an evaluation rubric (in table form) showing you how you will be evaluated for this assignment. Part of the rubric is marked from professor observation from student demonstration of assignment in class, and the other part is based on output from the results of an assignment checking script that the student will download and run.
Student Demonstration (in class) Evaluation Item Mark - SMTP and IMAP Servers:
- Proof of SMTP Server Running on carver server
/1 - E-mails sent from carver and zorin servers to drax server (user@IP_ADDR)
/1 - E-mails sent from carver and zorin servers to drax server (user@DOMAIN_NAME)
/1 - Samba Server Access via client:
- tarot-yoursenecaid and octopus-yoursenecaid have read/write access
/1 - spectre-yoursenecaid has read/write access to every directory
/1 - All accounts have read' access to the conquest directory
(but only spectre-yoursenecaid has write access)
- All accounts have read' access to the conquest directory
/1 - All accounts can both read and write to the domination directory.
/1 Configuration (Checking Script Output) Evaluation Item Mark Mail Transfer Agent (carver) - General Configuration - Postfix MTA settings
/5 Mail Delivery Agent (MTA) / Message Store (MS) - General Configuration - Postfix MTA settings
/3 - LDA settings
/1 - Email sent to root is delivered to non-privileged user
/1 - AA (Access Agent – IMAP) settings
/4 DNS configuration - Correct MX records exist
/2 - MX records prioritize access to mail servers correctly
/2 Samba Server - General Configuration - Directories shared with correct permissions
/5 - Samba accounts created (1 mark each)
/3 - Writing allowed to directories
/1 Firewall policies - MTAs allow SMTP traffic
/2 - AA allows IMAP traffic
/1 - IMAP traffic limited to local network
/1 - Samba server allows samba traffic
/1 - Samba traffic limited to local network
/1 Less Deductions (One mark per issue for EACH VM): - Not using zone filenames: mydb-for-bond.villains.ops and mydb-for-172.19.1
- DOMAIN Name NOT Resolved
- VM hostname NOT set
- firewallenabled / running
- iptables disabled / not running
- No Yum update
- Services NOT active
- Local hostname resolution appears in /etc/hosts (1 mark per entry, per vm)
- Neglecting major safeguards (e.g. no firewall present, firewall allowing all traffic, no active SELinux) (4 marks per issue, per VM)
- Failing to backup VMs (1 mark deduction for each VM not backed up)
TOTAL /40 - Additional Assignment Information: