Updated: 2014-09-29 09:02 EDT

1 Readings, Assignments, Labs, and ToDo

1.1 Midterm Test #1

1.2 Quizzes: Midterm #1 Quiz

This quiz is one of several quizzes in this course. Each midterm and final exam will have an associated quiz. See the course outline for the mark weight of all course quizzes, midterm tests, and exams.

The quizzes are open-book, but the midterm tests and final exam are closed-book.

This quiz is based on the Midterm #1 Practice Test questions that are posted in the Class Notes. The quiz is 10 questions long and you see the answers right after you submit the quiz. You can take the quiz as many times as you like. Every time you take the quiz, you get a random set of ten questions from the practice test. You will not see all the practice questions by doing quizzes; to see all the practice questions, you must do all the questions in the actual practice test posted in the Course Notes.

This quiz closes just before the Final Exam in this course; quizzes submitted after the Final Exam begins may not count toward your best score.

Your mark for this quiz is the average of your five best quiz scores. Examples:

Your score will be taken from the five best scores. The more times you do the quiz, the more likely you are to have a set of excellent best scores. You must have five perfect quiz scores to get a perfect averaged quiz mark. Missing quizzes (fewer than five) count as zeroes. Only the five best scores are averaged. (Blackboard averages all the scores and thus displays your score incorrectly.)

This quiz closes just before the Final Exam in this course; quizzes submitted after the Final Exam begins may not count toward your best score.

See the “Quizzes” section in the Blackboard left side-bar for your course.

Note: Blackboard displays the quiz mark incorrectly, since it cannot calculate “best 5” and instead averages the marks of all your quiz attempts. Your quiz mark is actually the average of your five best attempts, not all the attempts as shown by Blackboard.

1.3 Assignments and Lab work this week

Check the due date for each assignment and put a reminder in your agenda, calendar, and digital assistant.

1.3.1 Worksheets

The worksheets are available in four formats: Open Office (ODT), PDF, HTML, and Text. Only the Open Office format allows you “fill in the blanks” in the worksheet. The PDF format looks good but doesn’t allow you to type into the blanks in the worksheet. The HTML format is crude but useful for quick for viewing online.

Do NOT open the ODT files using any Microsoft products; they will mangle the format and mis-number the questions. Use the free Libre Office or Open Office programs to open these ODT documents. On campus, you can download Libre Office here.

  • Worksheet #02 HTML – Using standard Linux commands I
    • PS1, cd, find, less, ls, man, mkdir, passwd, pwd, rmdir
  • Worksheet #03 HTML – Using standard Linux commands II
    • cat, clear, cp, find, grep, history, less, man, mv, rm, sleep, touch
  • Worksheet #04 HTML – GLOB Patterns and Aliases
    • bash GLOB patterns (wildcards), alias, sum
  • Worksheet #05 HTML – I/O Redirection and Pipes
    • bash I/O redirection (including pipes), date, head, nl, tail, tr, wc

1.3.2 Optional Bonus VIM Assignment – extra marks

  • Assignment #03 HTMLOptional VIM Text Editor Practice
    • this is an optional worksheet for a BONUS assignment using vim
  • Optional Reading: The VI (VIM) Text Editor
  • Worksheet #06 HTMLOptional VIM Text Editor Practice
    • this is an optional worksheet for a BONUS assignment using vim
  • Optional command-line VIM tutorial: the vimtutor program on the CLS.

3 From the Classroom Whiteboard/Chalkboard

4 Real Sysadmin Work

4.1 Attacks on the Course Linux Server

Here is a command pipeline that does real-time monitoring of who is trying to attack the Course Linux Server (may require privileged read permission on the log files). I ran this command last term:

$ fgrep 'refused connect' /var/log/auth.log | awk '{print $NF}' \
    | sort | uniq -c | sort -nr | head -n 5
686 (188.165.173.230)
 65 (70.35.59.13)
 53 (211.161.45.222)
 31 (61.160.215.170)
 31 (1.93.34.211)

The top listed attacker is from France. They tried to log in as several different accounts and the denyhosts intrusion protection package quickly blocked that IP address:

$ host 188.165.173.230
230.173.165.188.in-addr.arpa domain name pointer isis.cleonet.fr.

$ whois 188.165.173.230
[...]
address:        59100 Roubaix
address:        France

$ fgrep '188.165.173.230' /var/log/auth.log      # (output edited slightly)
Jan 19 21:51:18 Invalid user aion from 188.165.173.230
Jan 19 21:51:18 Invalid user asterisk from 188.165.173.230
Jan 19 21:51:18 Invalid user bugzilla from 188.165.173.230
Jan 19 21:51:20 Failed password for invalid user aion from 188.165.173.230 port 49674 ssh2
Jan 19 21:51:20 Failed password for invalid user asterisk from 188.165.173.230 port 50007 ssh2
Jan 19 21:51:21 Failed password for invalid user bugzilla from 188.165.173.230 port 50347 ssh2
Jan 19 21:51:26 Failed password for invalid user bugzilla from 188.165.173.230 port 50683 ssh2
Jan 19 21:51:28 Failed password for invalid user bugzilla from 188.165.173.230 port 51020 ssh2
Jan 19 21:51:28 refused connect from isis.cleonet.fr (188.165.173.230)
Jan 19 21:51:31 refused connect from isis.cleonet.fr (188.165.173.230)
[...600 repeat lines deleted...]

The next most persistent attacker is from California:

$ host 70.35.59.13
13.59.35.70.in-addr.arpa domain name pointer 70-35-59-13.static.wiline.com.

$ whois 70.35.59.13
[...]
City:           Foster City
StateProv:      CA
Country:        US

$ fgrep '70.35.59.13' /var/log/auth.log          # (output edited slightly)
Jan  9 05:13:10 Failed password for invalid user admin from 70.35.59.13 port 47336 ssh2
Jan  9 05:13:12 Failed password for invalid user admin from 70.35.59.13 port 47336 ssh2
Jan  9 05:13:17 Failed password for invalid user admin from 70.35.59.13 port 47471 ssh2
Jan  9 05:13:19 Failed password for invalid user admin from 70.35.59.13 port 47471 ssh2
Jan  9 05:13:30 Failed password for invalid user admin from 70.35.59.13 port 47635 ssh2
Jan  9 05:13:33 Failed password for invalid user admin from 70.35.59.13 port 47635 ssh2
Jan  9 05:13:55 refused connect from 70-35-59-13.static.wiline.com (70.35.59.13)
Jan  9 05:14:12 refused connect from 70-35-59-13.static.wiline.com (70.35.59.13)
[...]

The third most persistent attacker is from China:

$ host 211.161.45.222
222.45.161.211.in-addr.arpa domain name pointer Dns-Slave.bjgwbn.net.cn.

$ whois 211.161.45.222
descr:          Beijing,China

$ fgrep '211.161.45.222' /var/log/auth.log       # (output edited slightly)
Jan 23 10:03:31 Invalid user szabol from 211.161.45.222
Jan 23 10:03:36 Invalid user szabol from 211.161.45.222
Jan 23 10:03:44 Invalid user szabol from 211.161.45.222
Jan 23 10:03:56 refused connect from 211.161.45.222 (211.161.45.222)
Jan 23 10:04:03 refused connect from 211.161.45.222 (211.161.45.222)
[...]
Take Notes in Class

Take Notes in Class

Author: 
| Ian! D. Allen  -  idallen@idallen.ca  -  Ottawa, Ontario, Canada
| Home Page: http://idallen.com/   Contact Improv: http://contactimprov.ca/
| College professor (Free/Libre GNU+Linux) at: http://teaching.idallen.com/
| Defend digital freedom:  http://eff.org/  and have fun:  http://fools.ca/

Plain Text - plain text version of this page in Pandoc Markdown format

Campaign for non-browser-specific HTML   Valid XHTML 1.0 Transitional   Valid CSS!   Creative Commons by nc sa 3.0   Hacker Ideals Emblem   Author Ian! D. Allen