Index: SBE-Appendix2.xml =================================================================== --- SBE-Appendix2.xml (revision 1146) +++ SBE-Appendix2.xml (working copy) @@ -24,33 +24,33 @@ as well as two Microsoft Windows XP Professional Workstations, each equipped with an Ethernet card connected using a hub. Also required is one additional server (either Windows NT4 Server, Windows 2000 Server, or a Samba-3 on UNIX/Linux server) running a network - sniffer and analysis application (ethereal is a good choice). All work should be undertaken + sniffer and analysis application (Wireshark is a good choice). All work should be undertaken on a quiet network where there is no other traffic. It is best to use a dedicated hub with only the machines under test connected at the time of the exercises. - Ethereal + Wireshark - Ethereal has become the network protocol analyzer of choice for many network administrators. - You may find more information regarding this tool from the - Ethereal Web site. Ethereal installation - files for Windows may be obtained from the Ethereal Web site. Ethereal is provided with - SUSE and Red Hat Linux distributions, as well as with many other Linux distributions. It may - not be installed on your system by default. If it is not installed, you may also need - to install the libpcap software before you can install or use Ethereal. - Please refer to the instructions for your operating system or to the Ethereal Web site - for information regarding the installation and operation of Ethereal. + Wireshark (formerly Ethereal) has become the network protocol analyzer of choice for many network administrators. + You may find more information regarding this tool from the + Wireshark Web site. Wireshark installation + files for Windows may be obtained from the Wireshark Web site. Wireshark is provided with + SUSE and Red Hat Linux distributions, as well as with many other Linux distributions. It may + not be installed on your system by default. If it is not installed, you may also need + to install the libpcap software before you can install or use Wireshark. + Please refer to the instructions for your operating system or to the Wireshark Web site + for information regarding the installation and operation of Wireshark. - To obtain ethereal for your system, please visit the Ethereal - download site. + To obtain Wireshark for your system, please visit the Wireshark + download site. The successful completion of this chapter requires that you capture network traffic - using Ethereal. It is recommended that you use a hub, not an + using Wireshark. It is recommended that you use a hub, not an Ethernet switch. It is necessary for the device used to act as a repeater, not as a filter. Ethernet switches may filter out traffic that is not directed at the machine that is used to monitor traffic; this would not allow you to complete the projects. @@ -69,17 +69,17 @@ protocol analysis - Please do not be alarmed at the use of a high-powered analysis tool (Ethereal) in this - primer. We expose you only to a minimum of detail necessary to complete + Please do not be alarmed at the use of a high-powered analysis tool (Wireshark) in this + primer. We expose you only to a minimum of detail necessary to complete the exercises. If you choose to use any other network sniffer and protocol analysis tool, be advised that it may not allow you to examine the contents of recently added security protocols used by Windows 200x/XP. - You could just skim through the exercises and try to absorb the key points made. - The exercises provide all the information necessary to convince the die-hard network - engineer. You possibly do not require so much convincing and may just want to move on, + You could just skim through the exercises and try to absorb the key points made. + The exercises provide all the information necessary to convince the die-hard network + engineer. You possibly do not require so much convincing and may just want to move on, in which case you should at least read . @@ -94,8 +94,8 @@ The purpose of this chapter is to create familiarity with key aspects of Microsoft Windows - network computing. If you want a solid technical grounding, do not gloss over these exercises. - The points covered are recurrent issues on the Samba mailing lists. + network computing. If you want a solid technical grounding, do not gloss over these exercises. + The points covered are recurrent issues on the Samba mailing lists. @@ -142,7 +142,7 @@ The networking protocols used by MS Windows networking when working with Samba use TCP/IP as the transport protocol. The protocols that are specific to Windows - networking are encapsulated in TCP/IP. The network analyzer we use (Ethereal) + networking are encapsulated in TCP/IP. The network analyzer we use (Wireshark) is able to show you the contents of the TCP/IP packets (or messages). @@ -182,12 +182,12 @@ Exercises - ethereal + wireshark You are embarking on a course of discovery. The first part of the exercise requires two MS Windows 9x/Me systems. We called one machine WINEPRESSME and the other MILGATE98. Each needs an IP address; we used 10.1.1.10 and 10.1.1.11. The test machines need to be networked via a hub. A UNIX/Linux - machine is required to run Ethereal to enable the network activity to be captured. + machine is required to run Wireshark to enable the network activity to be captured. It is important that the machine from which network activity is captured must not interfere with the operation of the Windows workstations. It is helpful for this machine to be passive (does not send broadcast information) to the network. @@ -212,7 +212,7 @@ ethereal The network captures provided on the CD-ROM included with this book were captured using Ethereal - version 0.10.6. A later version suffices without problems, but an earlier version may not + version 0.10.6. A later version suffices without problems (i.e. you should be using Wireshark), but an earlier version may not expose all the information needed. Each capture file has been decoded and listed as a trace file. A summary of all packets has also been included. This makes it possible for you to do all the studying you like without the need to perform the time-consuming equipment configuration and test work. This is a good time to point out that the value @@ -231,8 +231,8 @@ Monitoring Windows 9x Steps - Start the machine from which network activity will be monitored (using ethereal). - Launch ethereal, click + Start the machine from which network activity will be monitored (using Wireshark). + Launch Wireshark, click Capture Start @@ -240,7 +240,7 @@ - Click the following: + Click the following: Update list of packets in real time Automatic scrolling in live capture @@ -419,7 +419,7 @@ of various announcements, re-election of a browse master, and name queries. These create the symphony of announcements by which network browsing is made possible. - + CIFS @@ -444,8 +444,8 @@ Monitoring of Second Machine Activity - On the machine from which network activity will be monitored (using ethereal), - launch ethereal and click + On the machine from which network activity will be monitored (using Wireshark), + launch Wireshark and click Capture Start @@ -453,7 +453,7 @@ - Click: + Click: Update list of packets in real time Automatic scrolling in live capture @@ -625,12 +625,12 @@ - Start ethereal (or the network sniffer of your choice). + Start Wireshark (or the network sniffer of your choice). From the WINEPRESSME machine, right-click Network Neighborhood, select - Explore, select + Explore, select My Network Places Entire Network @@ -650,7 +650,7 @@ session setup From the top of the packets captured, scan down to locate the first packet that has - interpreted as Session Setup AndX, User: anonymous; Tree Connect AndX, + interpreted as Session Setup AndX, User: anonymous; Tree Connect AndX, Path: \\MILGATE98\IPC$. @@ -686,8 +686,8 @@ IPC$ - The IPC$ share serves a vital purposeTOSHARG2, Sect 4.5.1 - in SMB/CIFS-based networking. A Windows client connects to this resource to obtain the list of + The IPC$ share serves a vital purposeTOSHARG2, Sect 4.5.1 + in SMB/CIFS-based networking. A Windows client connects to this resource to obtain the list of resources that are available on the server. The server responds with the shares and print queues that are available. In most but not all cases, the connection is made with a NULL username and a NULL password. @@ -780,7 +780,7 @@ Steps to Explore Windows XP Pro Connection Set-up - Start your domain controller. Also, start the ethereal monitoring machine, launch ethereal, + Start your domain controller. Also, start the Wireshark monitoring machine, launch Wireshark, and then wait for the next step to complete. @@ -789,8 +789,8 @@ - On the machine from which network activity will be monitored (using ethereal), - launch ethereal and click + On the machine from which network activity will be monitored (using Wireshark), + launch Wireshark and click Capture Start @@ -810,7 +810,7 @@ - On the Windows XP Professional client, press Ctrl-Alt-Delete to bring + On the Windows XP Professional client, press Ctrl-Alt-Delete to bring up the domain logon screen. Log in using valid credentials for a domain user account. @@ -834,7 +834,7 @@ - Stop the capture on the ethereal monitoring machine. Be sure to save the captured data + Stop the capture on the Wireshark monitoring machine. Be sure to save the captured data to a file so that you can refer to it again later. @@ -908,7 +908,7 @@ This exercise demonstrates that, while the specific protocol for the Session Setup AndX is handled in a more sophisticated manner by recent MS Windows clients, the underlying rules or principles - remain the same. Thus it is demonstrated that MS Windows XP Professional clients still use a + remain the same. Thus it is demonstrated that MS Windows XP Professional clients still use a NULL-Session connection to query and locate resources on an advanced network technology server (one using Windows NT4/200x or Samba). It also demonstrates that an authenticated connection must be made before resources can be used. @@ -932,7 +932,7 @@ Network browsing protocols query information stored on browse masters that manage - information provided by NetBIOS Name Registrations and by way of ongoing host + information provided by NetBIOS Name Registrations and by way of ongoing host announcements and workgroup announcements. @@ -1151,7 +1151,7 @@ WINS NetBIOS - Yes, there are two ways to do this. The first involves use of WINS (See TOSHARG2, Chapter 9, + Yes, there are two ways to do this. The first involves use of WINS (See TOSHARG2, Chapter 9, Section 9.5, WINS &smbmdash; The Windows Inter-networking Name Server); the alternate method involves disabling the use of NetBIOS over TCP/IP. This second method requires a correctly configured DNS server (see TOSHARG2, Chapter 9, Section 9.3, Discussion). @@ -1161,9 +1161,9 @@ broadcast NetBIOSNode Type Hybrid - The use of WINS reduces network broadcast traffic. The reduction is greatest when all network - clients are configured to operate in Hybrid Mode. This can be effected through - use of DHCP to set the NetBIOS node type to type 8 for all network clients. Additionally, it is + The use of WINS reduces network broadcast traffic. The reduction is greatest when all network + clients are configured to operate in Hybrid Mode. This can be effected through + use of DHCP to set the NetBIOS node type to type 8 for all network clients. Additionally, it is beneficial to configure Samba to use wins host cast. @@ -1201,11 +1201,11 @@ disabling this. When network connections are dropped by the client, it is not possible to re-establish the connection automatically. Users need to log off and then log on again. Plain-text password support may interfere with recent enhancements that are part of the Microsoft move toward a more secure computing - environment. + environment. - Samba-3 supports Microsoft encrypted passwords. Be advised not to reintroduce plain-text password handling. + Samba-3 supports Microsoft encrypted passwords. Be advised not to reintroduce plain-text password handling. Just create user accounts by running smbpasswd -a 'username' Index: SBE-glossary.xml =================================================================== --- SBE-glossary.xml (revision 1146) +++ SBE-glossary.xml (working copy) @@ -53,7 +53,7 @@ Domain Master Browser DMB - The Domain Master Browser maintains a list of all the servers that + The Domain Master Browser maintains a list of all the servers that have announced their services within a given workgroup or NT domain. @@ -81,16 +81,6 @@ - Ethereal - ethereal - - A network analyzer, also known as a network sniffer or a protocol analyzer. Ethereal is - freely available for UNIX/Linux and Microsoft Windows systems from - the Ethereal Web site. - - - - Group IDentifier GID @@ -130,10 +120,10 @@ outweigh any need to add, delete, or modify records. LDAP does provide a means for replication of the database to keep slave servers up to date with a master. It also has built-in capability to - handle external references and deferral. + handle external references and deferral. - + Local Master Browser LMB @@ -177,7 +167,7 @@ Network Basic Input/Output System NetBIOS - NetBIOS is a simple application programming interface (API) invented in the 1980s + NetBIOS is a simple application programming interface (API) invented in the 1980s that allows programs to send data to certain network names. NetBIOS is always run over another network protocol such as IPX/SPX, TCP/IP, or Logical Link Control (LLC). NetBIOS run over LLC is best known as NetBEUI (the NetBIOS Extended User Interface @@ -189,11 +179,11 @@ NetBT NBT - Protocol for transporting NetBIOS frames over TCP/IP. Uses ports 137, 138, and 139. + Protocol for transporting NetBIOS frames over TCP/IP. Uses ports 137, 138, and 139. NetBT is a fully routable protocol. - + NT/LanManager Security Support Provider NTLMSSP @@ -210,7 +200,7 @@ SMB SMB was the original name of the protocol spoken by Samba. It was invented in the 1980s - by IBM and adopted and extended further by Microsoft. Microsoft renamed the protocol to + by IBM and adopted and extended further by Microsoft. Microsoft renamed the protocol to CIFS during the Internet hype in the 1990s. @@ -255,4 +245,14 @@ + + Wireshark + wireshark + + A network analyzer, also known as a network sniffer or a protocol analyzer. Formerly known as Ethereal, Wireshark is + freely available for UNIX/Linux and Microsoft Windows systems from + the Wireshark Web site. + + +