[LON-CAPA-admin] Help understanding hosting other domains' users on our access servers
Stuart Raeburn
raeburn at msu.edu
Mon Oct 5 18:49:18 EDT 2015
Mike,
> What traffic goes across the other ports that LON-CAPA uses (e.g. 5663) and
> is that encrypted? Is this FERPA covered data being transmitted without
> encryption?
My suggestion would be to run the request_ssl_key.sh script (in
/home/httpd/lonCerts) on your library server and each of your access
servers so you can use SSL encryption for internal LON-CAPA traffic
via port 5663 when your servers connect to other servers in the
network, which have also installed LON-CAPA SSL certs (and had them
signed by the LON-CAPA Certificate Authority).
Please read the instructions in the "Internal LON-CAPA SSL" part of
section 2.21 "Encrypting server traffic with SSL" in the domain
coordination manual --
https://loncapa.purdue.edu/adm/help/domain.manual.pdf -- for more
information.
Despite the fact that this infrastructure has been a part of LON-CAPA
since version 1.3.0 (December 2004) the number of domains using
internal SSL is still a minority.
Note: you could also change the settings for the PerlVars:
loncAllowInsecure
londAllowInsecure
in /etc/httpd/conf/loncapa.conf from 1 to 0 to prevent LON-CAPA
internal connections to/from the purdue servers to other LON-CAPA
servers in the network, which have not yet installed LON-CAPA SSL certs.
However, I do not believe any other domains have so far chosen to do that.
If purdue were to do that, it would be appropriate first to give other
domains in the network which are currently sharing their resources
with you a chance to install internal LON-CAPA SSL keys/certs on their
own servers, if they have not yet done that.
Even without LON-CAPA internal SSL enabled, a number of internal
LON-CAPA transactions are encrypted. To see which those are you can
grep for the string: encrypt: within
/home/httpd/lib/perl/Apache/lonnet.pm
> Any idea how someone from Binghamton used our server despite our access
> nodes configured as they are?
If someone from the binghamton domain has a co-author role in an
Authoring Space in the purdue domain then that user would be allowed
to have a user session hosted on the purdue library server. However,
I think it unlikely that such a co-author role exists.
So my guess would be that this may have been possible because of a
discrepancy between the "internet domain" listed in the
/home/httpd/lonTabs/hosts.tab file present on one of the binghamton
LON-CAPA servers, and the "internet domain" retrieved for the same
LON-CAPA host from the authoritative "LON-CAPA DNS" servers at MSU,
UIUC, and SFU.
This particular situation at binghamton was discussed on this list
recently, see:
http://mail.lon-capa.org/pipermail/lon-capa-admin/2015-September/003100.html
It has been my personal experience that ever since a purdue domain
coordinator modified your domain configuration this summer to deny
hosting of user sessions from other domains, I have been unable to
transfer my own LON-CAPA user session (msu domain) to any of the
purdue servers.
Stuart Raeburn
LON-CAPA Academic Consortium
Quoting Mike Budzik <mikeb at purdue.edu>:
> For hosting other domains' users, we have our access nodes set to deny all
> except the following (and none of the following are checked). However,
> today we noticed session data files in /home/httpd/perl/tmp on one of our
> access nodes that are named with another domain.
>
> USERNAME1_binghamton_4231791afc6bb5593binghamtona6.db
> USERNAME1_binghamton_4231791afc6bb5593binghamtona6.db.lock
> USERNAME1_binghamton_4231791afc6bb5593binghamtona6_parms.db
> USERNAME1_binghamton_4231791afc6bb5593binghamtona6.state
> USERNAME1_binghamton_4231791afc6bb5593binghamtona6_symb.db
>
> USERNAME2_binghamton_4231791afc6bb5593binghamtona6.db
> USERNAME2_binghamton_4231791afc6bb5593binghamtona6.db.lock
> USERNAME2_binghamton_4231791afc6bb5593binghamtona6_parms.db
> USERNAME2_binghamton_4231791afc6bb5593binghamtona6.state
> USERNAME2_binghamton_4231791afc6bb5593binghamtona6_symb.db
>
> In the access log I think it looks like the users posted answers to some
> problems. For example:
> POST /res/binghamton/gonzales/Postlab/analysisOfBottledWaterV3.problem
> HTTP/1.1" 200 44989 "
> https://loncapa03.purdue.edu/res/binghamton/gonzales/Postlab/analysisOfBottledWaterV3.problem
>
> POST /res/binghamton/gonzales/Postlab/SimultaneousAnalysis.problem
> HTTP/1.1" 200 56842 "
> https://loncapa02.purdue.edu/res/binghamton/gonzales/Postlab/SimultaneousAnalysis.problem
>
> Any idea how someone from Binghamton used our server despite our access
> nodes configured as they are?
>
> Our organization is very sensitive to FERPA issues, so I'm pretty curious
> about it. In this case, based on the access log I could not guess which
> course the user is in. However, if the course had been named with a course
> number/name, that would mean I could discover some roster data which is
> covered by FERPA. What if the user used our access server to view their
> grades?
>
> What traffic goes across the other ports that LON-CAPA uses (e.g. 5663) and
> is that encrypted? Is this FERPA covered data being transmitted without
> encryption?
>
> Thanks,
> Mike B
More information about the LON-CAPA-admin
mailing list