Administration web-interface login.

Discussions on more advanced topics such as monolithic vs micro-kernels, transactional memory models, and paging vs segmentation should go here. Use this forum to expand and improve the wiki!
Post Reply
User avatar
01000101
Member
Member
Posts: 1599
Joined: Fri Jun 22, 2007 12:47 pm
Contact:

Administration web-interface login.

Post by 01000101 »

Hey,
I've gotten to the stage where I can easily modify/create HTML pages for my OS to dish out upon request (entering either the hostname or ip into a web-browser). Now, I need to start looking into authentication so that only the intended admin is allowed in.

A few options have come to mind:
1: Only allow the webserver (DiNS) to acknowledge one computer (the server or any other machine on 'that end' of the network).
2: Use some sort of login screen to weed out the people that dont have the right credentials.
3: Use a third ethernet jack as the administration link (webserver only acknowledges request from the console port)... cisco style :D .

I would really like to stick with a login screen, but are there any easily implemented public domain encryption schemes that would be suitable for the job?

Any other ideas/methods of accomplishing this?
pcmattman
Member
Member
Posts: 2566
Joined: Sun Jan 14, 2007 9:15 pm
Libera.chat IRC: miselin
Location: Sydney, Australia (I come from a land down under!)
Contact:

Re: Administration web-interface login.

Post by pcmattman »

I actually like the third ethernet port option. It means an admin must have physical access to make changes. Although, it also means anyone with physical access to the box can make changes too...

Maybe mix a login screen with the third ethernet port option?
User avatar
Steve the Pirate
Member
Member
Posts: 152
Joined: Fri Dec 15, 2006 7:01 am
Location: Brisbane, Australia
Contact:

Re: Administration web-interface login.

Post by Steve the Pirate »

The way I'd do it is to use a login page, or get the browser to display an authentication dialogue box (like you can with most other web servers), and have the user log in with their username and password for their user account on your OS.
My Site | My Blog
Symmetry - My operating system.
User avatar
Brynet-Inc
Member
Member
Posts: 2426
Joined: Tue Oct 17, 2006 9:29 pm
Libera.chat IRC: brynet
Location: Canada
Contact:

Re: Administration web-interface login.

Post by Brynet-Inc »

Image
Twitter: @canadianbryan. Award by smcerm, I stole it. Original was larger.
User avatar
Combuster
Member
Member
Posts: 9301
Joined: Wed Oct 18, 2006 3:45 am
Libera.chat IRC: [com]buster
Location: On the balcony, where I can actually keep 1½m distance
Contact:

Re: Administration web-interface login.

Post by Combuster »

The problem is not that encryption methods are unavailable - I know how to do RSA by hard - the problem in the US is that many of them are covered by patents.

I did some background research and it seems you can use Blowfish (public domain) and RSA (for which the patent expired)
"Certainly avoid yourself. He is a newbie and might not realize it. You'll hate his code deeply a few years down the road." - Sortie
[ My OS ] [ VDisk/SFS ]
User avatar
mystran
Member
Member
Posts: 670
Joined: Thu Mar 08, 2007 11:08 am

Re: Administration web-interface login.

Post by mystran »

Combuster wrote:The problem is not that encryption methods are unavailable - I know how to do RSA by hard - the problem in the US is that many of them are covered by patents.
Move away from US -> problem solved. Might be a good idea anyway. ;)

Oh and forget Blowfish (which has some problems) for symmetric.. there's AES (Rjindael) now, which does the trick just fine, with publicly available (PD too) source code (it's often said that you should never attempt to write your own encryption methods unless you're a cryptoanalysist, 'cos a single typo can make it vulnerable, and you really really don't want that). http://www.efgh.com/software/rijndael.htm for example.

Seriously though, for a webserver, I'd use HTTPS, login with a pretty box, and use cookies for session management. The nice thing is that you can develop the pretty login box and the cookie stuff separately from the HTTPS handlers. If you don't want unencrypted admin logins, then just disable access to the login page when using HTTP.
The real problem with goto is not with the control transfer, but with environments. Properly tail-recursive closures get both right.
User avatar
01000101
Member
Member
Posts: 1599
Joined: Fri Jun 22, 2007 12:47 pm
Contact:

Re: Administration web-interface login.

Post by 01000101 »

I think the https will help the transport encryption issue alot.

I've been doing alot of thinking over using OTP (one time pad) encryption for the actual password transmit/recieve (within ssl of course).

I read up alot on blowfish and it does have a few core weaknesses due to variable signedness and such. I was unaware that AES was PD, I'll look into that later.

Cookie management will probably be a no go on the browser as I can handle login/state/logout sessions from within the OS, and it also cuts down on the potential cookie stealing or cache usage to re-activate a session. My OS just makes it so that when all the active TCP/http sessions have been FIN'd it waits for about 10 seconds and then closes the login state. So the only time it logs out automatically is when all the browser windows have been closed, or inactive (longer timeout).

I really do like the third port idea though. I'd like to create a mixture. But if I find it is too difficult/sketchy to implement WWW-based encryption, I will just use the 3rd port as the console login.
User avatar
Owen
Member
Member
Posts: 1700
Joined: Fri Jun 13, 2008 3:21 pm
Location: Cambridge, United Kingdom
Contact:

Re: Administration web-interface login.

Post by Owen »

Browsers very optimistically (In as little as 5 seconds) close sockets to webservers. Cookies exist for a reason, and when done right can be very secure

(Attach a session ID to a cookie; on the web server, attach the client's IP address to the session ID. If the session IP isn't the client's IP, the session is invalid. Also add timeouts, of course)
EddyDeegan
Posts: 11
Joined: Sun Nov 02, 2008 9:27 pm

Re: Administration web-interface login.

Post by EddyDeegan »

Out of band management is generally perceived favourably by serious players. If you do implement encryption, it makes sense to go with something fairly industry standard if you have any long term aspirations to integrate with anything else. HTTPS or SSH tunnelling over a dedicated management interface would generally be the way to go. Certificates as opposed to passwords also makes sense. Passwords lead to bits of paper with things written on, people using their kids name etc., or even worse, hardcoded strings in admin scripts ;-)

Eddy
Post Reply