|
1 | 1 | <div class="flex-container"> |
2 | 2 | <img src="https://github.com/ProfessionalLinuxUsersGroup/img/blob/main/Assets/Logos/ProLUG_Round_Transparent_LOGO.png?raw=true" width="64" height="64"></img> |
3 | 3 | <p> |
4 | | - <h1>Under Construction</h1> |
| 4 | + <h1>Unit 2 Worksheet - Securing the Network Connection</h1> |
5 | 5 | </p> |
6 | 6 | </div> |
| 7 | + |
| 8 | +## Instructions |
| 9 | + |
| 10 | +--- |
| 11 | + |
| 12 | +Fill out this sheet as you progress through the lab and discussions. Hold your worksheets until |
| 13 | +the end to turn them in as a final submission packet. |
| 14 | + |
| 15 | +### Resources / Important Links |
| 16 | + |
| 17 | +- <https://www.sans.org/information-security-policy/> |
| 18 | +- <https://www.sans.org/blog/the-ultimate-list-of-sans-cheat-sheets/> |
| 19 | +- <https://docs.rockylinux.org/guides/security/pam/> |
| 20 | +- <https://docs.rockylinux.org/guides/security/authentication/active_directory_authentication/> |
| 21 | +- <https://docs.rockylinux.org/books/admin_guide/06-users/> |
| 22 | + |
| 23 | +#### Downloads |
| 24 | + |
| 25 | +The worksheet has been provided below. The document(s) can be transposed to |
| 26 | +the desired format so long as the content is preserved. For example, the `.txt` |
| 27 | +could be transposed to a `.md` file. |
| 28 | + |
| 29 | +- <a href="./assets/downloads/u3/u3_worksheet.pdf" target="_blank" download>📥 u3_worksheet(`.pdf`)</a> |
| 30 | +- <a href="./assets/downloads/u3/u3_worksheet.txt" target="_blank" download>📥 u3_worksheet(`.txt`)</a> |
| 31 | +<!-- - <a href="./assets/downloads/u3/u3_worksheet.docx" target="_blank" download>📥 u3_worksheet(`.docx`)</a> --> |
| 32 | + |
| 33 | +### Unit 2 Recording |
| 34 | + |
| 35 | +<img src="./assets/images/under-construction.jpg" style="border-radius:2%"></img> |
| 36 | + |
| 37 | +<!-- <iframe --> |
| 38 | +<!-- style="width: 100%; height: 100%; border: none; --> |
| 39 | +<!-- aspect-ratio: 16/9; border-radius: 1rem; background:black" --> |
| 40 | +<!-- src="" --> |
| 41 | +<!-- title="" --> |
| 42 | +<!-- frameborder="0" --> |
| 43 | +<!-- allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" --> |
| 44 | +<!-- referrerpolicy="strict-origin-when-cross-origin" --> |
| 45 | +<!-- allowfullscreen> --> |
| 46 | +<!-- </iframe> --> |
| 47 | + |
| 48 | +#### Discussion Post #1 |
| 49 | + |
| 50 | +There are 16 Stigs that involve PAM for RHEL 9. |
| 51 | +Read the guide from Rocky Linux here: <https://docs.rockylinux.org/guides/security/pam/> |
| 52 | + |
| 53 | +1. What are the mechanisms and how do they affect PAM functionality? |
| 54 | + - Review `/etc/pam.d/sshd` on a Linux system. |
| 55 | + What is happening in that file relative to these functionalities? |
| 56 | +2. What are the common PAM modules? |
| 57 | + - Review `/etc/pam.d/sshd` on a Linux system. |
| 58 | + What is happening in that file relative to these functionalities? |
| 59 | +3. Look for a blog post or article about PAM that discusses real world application. |
| 60 | + Post it here and give us a quick synopsis. (Bonus arbitrary points if you find one of our ProLUG members blogs on the subject.) |
| 61 | + |
| 62 | +#### Discussion Post #2 |
| 63 | + |
| 64 | +Read about active directory (or LDAP) configurations of Linux via `sssd` here: |
| 65 | +<https://docs.rockylinux.org/guides/security/authentication/active_directory_authentication> |
| 66 | + |
| 67 | +1. Why do we not want to just use local authentication in Linux? Or really any system? |
| 68 | +2. There are 4 SSSD STIGS. |
| 69 | + - What are they? |
| 70 | + - What do they seek to do with the system? |
| 71 | + |
| 72 | +<div class="warning"> |
| 73 | +Submit your input by following the link below. |
| 74 | + |
| 75 | +The discussion posts are done in Discord threads. Click the 'Threads' icon on the top right and search for the discussion post. |
| 76 | + |
| 77 | +</div> |
| 78 | + |
| 79 | +- [Link to Discussion Posts](https://discord.com/channels/611027490848374811/1098309490681598072) |
| 80 | + |
| 81 | +## Definitions |
| 82 | + |
| 83 | +--- |
| 84 | + |
| 85 | +PAM: |
| 86 | + |
| 87 | +AD: |
| 88 | + |
| 89 | +LDAP: |
| 90 | + |
| 91 | +sssd: |
| 92 | + |
| 93 | +oddjob: |
| 94 | + |
| 95 | +krb5: |
| 96 | + |
| 97 | +realm/realmd: |
| 98 | + |
| 99 | +wheel (system group in RHEL): |
| 100 | + |
| 101 | +## Digging Deeper |
| 102 | + |
| 103 | +--- |
| 104 | + |
| 105 | +1. How does `/etc/security/access.conf` come into play with pam_access? |
| 106 | + Read up on it here: <https://man7.org/linux/man-pages/man8/pam_access.8.html> |
| 107 | + - Can you find any other good resources? |
| 108 | + - What is the structure of the access.conf file directives? |
| 109 | +2. What other important user access or user management information do you learn by |
| 110 | + reading this? <https://docs.rockylinux.org/books/admin_guide/06-users/> |
| 111 | + - What is the contents of the `/etc/login.defs` file? Why do you care? |
| 112 | + |
| 113 | +## Reflection Questions |
| 114 | + |
| 115 | +--- |
| 116 | + |
| 117 | +1. What questions do you still have about this week? |
| 118 | + |
| 119 | +2. How are you going to use what you've learned in your current role? |
0 commit comments