Changes

Jump to: navigation, search

SRT210 Lab 6

531 bytes added, 08:17, 10 July 2019
PART 2: USING OPENLDAP
* Set up linux machines to authenticate against an OpenLDAP server.
= PART 1: LDAP concepts CONCEPTS =
We'll use OpenLDAP in this course.
* There is a glossary at the end of the guide. It's not complete and it doesn't have any details, but it's a good place to look when you get confused by weird-looking shorthands like dc, dn, or cn.
= Part PART 2: Using OpenLDAP USING OPENLDAP =
You won't be asked to set up an OpenLDAP server from scratch, we don't have time for that. So you can start with a VM I made for you.
The rest of your tasks for this section of the lab are:
* Set up all your nested VMs to authenticate also against LDAP in lin3.(not including alice, which won't let you authenticate via a plain-text channel)
* Create three more users:
** yoursenecausername with the UID 10000 and full name Your Full Name (replace with your actual username/name)
** guest with the uid 10002 and full name Andrew's Guests
* Confirm that you can log in using all three usernames on all your nested VMs (except lin3).
 
= PART 3: SNIFFING LDAP TRAFFIC =
 
* Set up tcpdump on your asg1->network1 gateway to capture TCP traffic (LDAP works over TCP) in wireshark format.
* Start the packet capture, and log in to lin2a1 using one of the usernames in LDAP.
* Stop the packet capture, and copy the resulting file to c7host.
* Open the file with Wireshark, and examine the contents.
* Look for the password you typed into lin2a1. It should be in an LDAP bindRequest packet.
= Lab completion =

Navigation menu