| |
±âŸ Eserv ¼Â¾÷°ú »ç¿ë¹æ¹ý
-
FTP
Server
- Activity
monitoring(¼¹ö»óÅÂ¿Í ·Î±×)
- ¼¹öÀÇ ÇöÀç »óÅÂ
- Log
files
- Server access
management
-
Restriction
of access from subnets
-
User access
management
-
Safety
provisions
-
Socket
parameters
-
Interface
languages
-
Plugins
-
Several Eserv
copies on one computer
¡¡
In Eserv, similarly to integration of the
HTTP proxy and the HTTP Server, the FTP Server is combined with
FTP-gate. By default they work at Port 3121.
Setup of the FTP Server is done in the section FTPserver and is
in many respects similar to that of the Web Server. The default
directory is ftproot. Virtual directories can be created.
(03.08.1999) | |
Activity monitoring(¼¹ö»óÅÂ¿Í ·Î±×)
ÇöÀç ¼¹öÀÇ È°¼º »óÅ¿¡ ´ëÇÑ Á¤º¸¸¦ Á¦°øÇÕ´Ï´Ù. Eserv´Â
ÀÚ½ÅÀÇ ¾²·¹µå(³»ºÎÇÁ·Î¼¼½º)ÀÇ ´ÙÀ̳«¹ÍÇÑ ¸ñ·ÏÀ» ¸¸µé°í
ÀÚ¼¼ÇÑ ·Î±×¸¦ Á¦°øÇÕ´Ï´Ù. ·Î±× ÆÄÀÏÀº text/plain Çü½ÄÀ¸·Î
ÀúÀåµÇ¾î ÀÖÀ¸¸é ¸Þ¸ðÀå°ú °°Àº ÇÁ·Î±×·¥À» º¼¼ö ÀÖÀ¸¸ç,
¶ÇÇÑ ¿ø°Ý¿¡¼ À¥-ÀÎÅÍÆäÀ̽º¸¦ ÅëÇÏ¿©
/admin/log.html ÆäÀÌÁö¿¡¼ º¼ ¼öµµ ÀÖ½À´Ï´Ù.
¼¹öÀÇ ÇöÀç »óÅÂ
The current state of the servers includes a
list of operating servers, a list of current connections to each of
the servers and a list of other threads not associated with the
servers (Scheduler thread, service management threads, interface
servicing thread, etc.). This list is accessible for viewing in the
interface section CurrentState/Threads. Each thread in the list has
a name defining its type and assignment. For thread serving client
connections, information on the connected client is shown, i.e. the
client’s IP address and name (if the authentication protocol and the
name verification phase have been completed). (24.11.1999) | |
Log files
Log files are Eserv’s reports on work
performed. As the server’s operation is factually “invisible? logs
are the best way of monitoring its actions for the Administrator.
Logs can be viewed as normal files (if viewed with the help of FAR,
“live?monitoring of the process of addition of records by Eserv in
the log is possible), or with the help of a browser through the Web
interface.
Eserv saves logs in files with names of the type
LOG\MMDDPROT.LOG, where MM is the double-digit month number, DD is
the date, and PROT is the name of the server protocol that makes
records in this log (http, ftp, socks, pop3, smtp, nntp) or the name
of the service (sch: Scheduler log, eserv: Eserv’s basic flow log).
Records in a log look like text lines of the following format:
hh:mm:ss nnn info, where hh:mm:ss is the time of the event, nnn is
the serial number of the flow and info is a description of the
event.
Eserv can keep logs of various levels of detailing. The existing
levels and their assignments are: 0 - minimum; the most important messages are entered only;
1 - starts and stops of services are entered;
2 - client connections are entered (only facts of connection);
3 - connections and character of inquiries are entered;
4 - creation of flows for clients are entered;
5 - protocol details of work with a client program are entered;
6 - transmitted information (except HTTP files) is entered;
7 - transmitted HTTP and FTP information is entered.
The resolution (level of detailing) is set up in the field
CommonSettings/LogFiles/LogLevel. Level 3 means log file record of
events of levels 0,1,2 and 3.
Logs can be automatically deleted by Eserv when the age of a
particular log exceeds the number of days set in the parameter
KeepLogsDays. This is done by the Scheduler. If there is no such
task in the Scheduler, Eserv will check the age of logs and delete
old ones only at the moment of starting. (24.11.1999) | |
Server access management
While managing servers located on PC’s
connected to the Internet, it’s always worth to remember that a
server connected to the Internet, regardless of the mode of
connection (dialup or leased line), becomes a true part of the
Internet, which, as well as giving access for this computer to
external services in the Internet, also does the reverse, i.e. the
server operating on this computer can be accessed by anybody from
the Internet.
Eserv servers can be the objective of intruders as an
intermediate vehicle for their traffic (proxy servers, SMTP Server,
etc.) and as an information objects (NNTP Server, HTTP Server and
FTP Server).
Access control facilities are provided for:
- Prevention of unauthorised access to files (mailboxes, news
groups, contents of the HTTP Server and the FTP Server);
- Prevention of unauthorised access to Eserv services.
To gain access to a file or another information object on
your computer (mail, news, etc.), an external user has to know the
name or the IP address of this computer, the number of the port used
by the service providing the means of file acquisition (FTP Server,
HTTP Server, etc.) and the authentication information (normally, a
name and a password) providing full access to this service.
Correspondingly, external user access can be limited in a number
of ways:
- Making it thoroughly impossible to contact Eserv servers from
any or some external networks, i.e. setting up the server for
reception of connections outgoing only from the LAN (6.9.1).
- Granting access to a limited and known circle of users on the
basis of name and password authentication (6.9.2).
- Making a part of the connection information unknown for
external users, e.g. establishing non-standard port numbers (for
more detail see 6.9.3.).
(03.08.1999) | |
Granting access to a limited circle of
networks is a very simple and very steadfast method of protection
against intrusion. Accepting a connection, any server from the Eserv
set can find out the IP address of the connecting computer, check it
with the table of permitted network connections, and if the IP does
not belong in the authorised category, the TCP connection will be
immediately interrupted by the server. In this case trial-and-error
identification of the password, just as any other unauthorised
action, is simply impossible, since the one thing needed for this is
connection. These restrictions should equally apply to all servers,
because if an external user has obtained full access to one of your
proxy servers, he can obtain further access to any other of your
servers, even if they are protected from external connections. This
can take place since a proxy server makes further connections on
behalf of its IP address, and in case of connection to local servers
the address also looks as a LAN address, i.e. one permitted for
connection.
In Eserv, subnet restrictions are applied to all servers in the
set. Setup is done in the section
CommonSettings/AccessRight/AllowAddressesConnection. The options
include a list of network masks granted access to the services of
the server.
For instance, if you wish to grant access to the services of a
server only to clients from the local network, and IP addresses in
your local network look like 10.1.1.*, you can add a mask
10.1.1.0 255.255.255.0
To do this, enter the string 10.1.1.0 255.255.255.0 in the
editing field below and click the Add button. The default mask is
0.0.0.0 0.0.0.0 - access is granted to anybody. (03.08.1999) | |
Eserv allows to restrict external access to
any of its information objects:
- Access to user mailboxes is granted to users (user programs)
who have passed name and password authentication by the POP3
protocol;
- Access to files on the FTP Server is granted to users who have
past name and password authentication by the FTP protocol;
- Access to news groups can be limited.
- Access to files on the HTTP Server is granted to users who
have past name and password authentication by the HTTP protocol;
After successful completion of the authentication stage,
the user rights to take further actions are determined on the basis
of the user rights of the groups in which this user belongs. The
rights of a group are determined on the basis of a list of groups
granted access to a certain information object (usually, a file).
For all Eserv servers the program keeps a general list of users
and a list of groups. These lists are kept in the sections
CommonSettings/Users and CommonSettings/UserGroups.
To add a new user, enter his or her name in the editing field and
click the Add button or the New icon. Then go to the section of this
user and enter their password and other attributes.
To add a group, enter its name in the editing field and click the
Add button or the New icon. Then enter the created group and in a
similar way add the names of the users included in this group.
Group access to specific objects is set in the section
Access_Right/Objects. This section has the form of a list. Each
element of the list describes attributes of a certain object and a
list of groups granted access to it. Addition of elements in this
list is done similarly to that in user and user group lists. Object
- is a path to diectory. For example, wwwroot\admin\ - folder on the
web-server. In the object section you can insert list of users of
groups to whom access is granted or denied. If access is grantet to
all server users (having own mailboxes) - you can specify AllUsers
predefinded group. If for anybody (including extern users and users
with wrong names:passwords) - the group 'All'.
In Eserv, some of the objects (mailboxes) have pre-set access and
do not need to be set up, as the name of the object coincides with
the name of the user. Access for other objects, i.e. directories and
files on the HTTP and FTP servers, news groups and proxy servers, is
set in the Setup Program.
There is no need to set access to objects not included in the
terms of reference of Eserv. For instance, there is no need to
define access to directories and files outside the wwwroot and
ftproot directories and virtual directories, as Eserv does not grant
access to files located beyond these anyway.
The name of group or user, who granted to access to this resource
(object) is entered in the left side (Property field). In the right
side you must enter the access code. Code is calculated by bit mask
DLRWX. D- user have the rights to Delete object L - rights to
List object's content (FTP list, for example) R - rights to Read
object W - rights to Write and create objects X - rights to
eXecute object (for script folders of the
Web-server) Examples: All 1 - anybody can access this resource
as script (run this script) - this is suitable for public cgi-bin
directory. All 12 - all users have rights to list and read folder
contents. Suitable for 'pub' directory of anonymous
FTP. Administrators 30 - users from Administrators group have
full access rights, including write and delete, excluding execute.
If you want to restrict users access to your Eserv HTTP-proxy,
you can add the object "http://" and in the access list of this
object add the list of users and groups, who granted the access. In
this case browsers will popup dialog boxes for username and password
to access proxy.
If you want to restrict access to newsgroups - add the newsgroups
names in the objects lists and enter the access list. In this
context right W means user can post messages to this group, and R -
user can read the messages from newsgroup.
You can use wildcards ("*" and "?") in the object
names. (24.11.1999) | |
You can limit intrusion attempts or simple
curiosity of external users by increasing the number of unknown
components on the way to your servers. Two of these components, the
name and the access password, are used commonly. Not knowing the
name and the password for access to the server, a cracker would have
to apply exhaustive trial-and-error search. One more way of reducing
the probability of intrusion attempt that can be recommended is to
use non-standard port numbers for servers. As a rule,
Internet-widespread network scanners used for search of poorly
protected servers try to contact servers on the standard or commonly
used Ports 21, 23, 25, 80, 110, 119, 1080, 3121, 3128 and 8080. Such
automatic programs much less often scan ports. A port scanner may be
launched by an abuser who does not just simply probes the network,
but has become particularly interested in your PC. Having set
non-standard port numbers you will introduce an additional degree of
safety. (03.08.1999) | |
Socket parameters are set in the section
CommonSettings/SocketParameters. Timeout is set for socket
reading/recording operations in seconds. On expiration of the set
time the server will automatically close inactive TCP connections.
This applies to HTTP, FTP, HTTP&FTPproxy, POP3, SMTP, NNTP
Servers and external connectors. This cannot be applied though to
Socks and MAP servers, since it is impossible to set timeout for
some of the protocols that may go through these universal proxies
(e.g. telnet). The default is 600, i.e. 10 minutes. So, if the
client has not given a command for over 10 minutes, or it has been
impossible to send the next portion of data for 10 minutes, the
connection will be closed on timeout (the log will show Error Code
10060). (03.08.1999) | |
Interface languages
¿ìÃø ÇÏ´Ü¿¡ Ç¥½ÃµÇ´Â Tip¿¡ ´ëÇÑ ¾ð¾î¸¦
CommonSettings/Interface ¼½¼Ç¿¡¼ ÁöÁ¤ÇÒ ¼ö ÀÖ½À´Ï´Ù.
Eserv can support any number of interface languages. Translation
into another language is done through translation of a simple text
file containing Eserv messages. Persons and companies interested in
translation of the interface and documentation into other languages
are welcome to contact the developers. (03.08.1999) | |
Plugins
Additionally to the already described Eserv
facilitation by mail robots and CGI programs, Eserv allows to
contact external program modules through an additional interface. As
this interface is based on Eserv’s built-in programming language, it
is possible to connect modules directly expanding the functional
capability of Eserv servers without running EXE or DLL files. The
same interface can be used for updating Eserv’s core.
To load a plugin, click the icon LoadPlugin, select the plugin
file and click OK.
It is possible to use plugins, which will be autoloaded when
Eserv started. These plugins must be saved to the plugin folder and
have file name 'autorun*'.
So far, the Eserv plugin interface has not been described, and it
is assumed that you will use the plugins offered by the Eserv
developers. However, should other developers express interest, the
interface can be uncovered in the future. (24.11.1999) | |
Several Eserv copies on one computer
ÇöÀç Eserv2.91¹öÀü±îÁö´Â ÇÑ´ëÀÇ ÄÄÇ»ÅÍ¿¡ ¿©·¯ Eserv ¼¹ö
ÇÁ·Î±×·¥À» ½ÇÇà ½Ãų ¼ö ¾ø½À´Ï´Ù.
|