From a99d6baf6dbde6ac562917c5f2820743c3cd49ab Mon Sep 17 00:00:00 2001 From: Keshav Bhardwaj <110217847+keshavbhrdwaj7@users.noreply.github.com> Date: Fri, 16 Jun 2023 21:37:55 +0530 Subject: [PATCH 1/5] Update SOLUTION --- projects/bash_networking_security/SOLUTION | 10 ++++++---- 1 file changed, 6 insertions(+), 4 deletions(-) diff --git a/projects/bash_networking_security/SOLUTION b/projects/bash_networking_security/SOLUTION index 2edfbaf..eb85c69 100644 --- a/projects/bash_networking_security/SOLUTION +++ b/projects/bash_networking_security/SOLUTION @@ -1,16 +1,18 @@ Local DNS Server IP ------------------- - +127.0.0.53 Default gateway IP ------------------- - +10.0.0.1 DHCP IP allocation sys-logs ------------------- - - +Jun 16 15:58:21 ip-10-0-0-57 dhclient[359]: DHCPDISCOVER on eth0 to 255.255.255.255 port 67 interval 3 (xid=0xf261654f) +Jun 16 15:58:21 ip-10-0-0-57 dhclient[359]: DHCPOFFER of 10.0.0.57 from 10.0.0.1 +Jun 16 15:58:21 ip-10-0-0-57 dhclient[359]: DHCPREQUEST for 10.0.0.57 on eth0 to 255.255.255.255 port 67 (xid=0x4f6561f2) +Jun 16 15:58:21 ip-10-0-0-57 dhclient[359]: DHCPACK of 10.0.0.57 from 10.0.0.1 (xid=0xf261654f) From c21ab4f4cf1128957a0ed863454b014c919eb95b Mon Sep 17 00:00:00 2001 From: Keshav Bhardwaj <110217847+keshavbhrdwaj7@users.noreply.github.com> Date: Fri, 16 Jun 2023 21:39:16 +0530 Subject: [PATCH 2/5] Update vpc.sh --- projects/bash_networking_security/vpc.sh | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/projects/bash_networking_security/vpc.sh b/projects/bash_networking_security/vpc.sh index 951abba..c7e1e0c 100644 --- a/projects/bash_networking_security/vpc.sh +++ b/projects/bash_networking_security/vpc.sh @@ -1,4 +1,4 @@ -REGION="" -VPC_ID="" -PUBLIC_INSTANCE_ID="" -PRIVATE_INSTANCE_ID="" \ No newline at end of file +REGION="us-east-1" +VPC_ID="vpc-0e8480e1e2d697bda" +PUBLIC_INSTANCE_ID="i-07a818c1b84d7e560" +PRIVATE_INSTANCE_ID="i-0b790e9592b94b74f" From e60baa6d60b9861060e3f87998ac2b06b0b2bc11 Mon Sep 17 00:00:00 2001 From: Keshav Bhardwaj <110217847+keshavbhrdwaj7@users.noreply.github.com> Date: Fri, 16 Jun 2023 21:59:44 +0530 Subject: [PATCH 3/5] Update bastion_connect.sh --- .../bastion_connect.sh | 21 +++++++++++++++++++ 1 file changed, 21 insertions(+) diff --git a/projects/bash_networking_security/bastion_connect.sh b/projects/bash_networking_security/bastion_connect.sh index a9bf588..8c1af5c 100644 --- a/projects/bash_networking_security/bastion_connect.sh +++ b/projects/bash_networking_security/bastion_connect.sh @@ -1 +1,22 @@ #!/bin/bash + +if [[ -z "$KEY_PATH" ]]; then + echo "KEY_PATH environment variable is not set!" + exit 5 +fi + +if [[ $# -lt 1 ]]; then + echo "KEY_PATH env var is expected" + echo "Please provide Public Instance (Bastion) IP address" + exit 5 +fi + +public_ip=$1 +private_ip=$2 +command="${@:3}" + +if [[ -n "$private_ip" ]]; then + ssh -t -i "$KEY_PATH" ubuntu@"$public_ip" ssh -i "new_key" ubuntu@"$private_ip" "$command" +else + ssh -i "$KEY_PATH" ubuntu@"$public_ip" "$command" +fi From a4f86699332599f6416db783144a107ccdbbdb5e Mon Sep 17 00:00:00 2001 From: Keshav Bhardwaj <110217847+keshavbhrdwaj7@users.noreply.github.com> Date: Fri, 16 Jun 2023 22:00:41 +0530 Subject: [PATCH 4/5] Update tlsHandshake.sh --- .../bash_networking_security/tlsHandshake.sh | 50 +++++++++++++++++++ 1 file changed, 50 insertions(+) diff --git a/projects/bash_networking_security/tlsHandshake.sh b/projects/bash_networking_security/tlsHandshake.sh index a9bf588..06971fa 100644 --- a/projects/bash_networking_security/tlsHandshake.sh +++ b/projects/bash_networking_security/tlsHandshake.sh @@ -1 +1,51 @@ #!/bin/bash + +IPADDRESS=54.160.100.250 +# Step 1: Client Hello +client_hello=$(curl -s -X POST -H "Content-Type: application/json" -d '{ + "version": "1.3", + "ciphersSuites": [ + "TLS_AES_128_GCM_SHA256", + "TLS_CHACHA20_POLY1305_SHA256" + ], + "message": "Client Hello" +}' http://$IPADDRESS:8080/clienthello) + +# Step 2: Server Hello +version=$(echo "$client_hello" | jq -r '.version') +cipher_suite=$(echo "$client_hello" | jq -r '.cipherSuite') +session_id=$(echo "$client_hello" | jq -r '.sessionID') +server_cert=$(echo "$client_hello" | jq -r '.serverCert') + +# Step 3: Server Certificate Verification +wget -q https://devops-feb23.s3.eu-north-1.amazonaws.com/cert-ca-aws.pem +openssl verify -CAfile cert-ca-aws.pem <<< "$server_cert" +verification_result=$? + +if [ $verification_result -ne 0 ]; then + echo "Server Certificate is invalid." + exit 5 +fi + +# Step 4: Client-Server master-key exchange +master_key=$(openssl rand -base64 32) +encrypted_master_key=$(echo "$master_key" | openssl smime -encrypt -aes-256-cbc -binary -outform DER cert.pem | base64 -w 0) + +# Step 5: Server verification message +server_verification_msg=$(curl -s -X POST -H "Content-Type: application/json" -d '{ + "sessionID": "'"$session_id"'", + "masterKey": "'"$encrypted_master_key"'", + "sampleMessage": "Hi server, please encrypt me and send to client!" +}' http://$IPADDRESS:8080/keyexchange) + +encrypted_sample_msg=$(echo "$server_verification_msg" | jq -r '.encryptedSampleMessage') + +# Step 6: Client verification message +decrypted_sample_msg=$(echo "$encrypted_sample_msg" | base64 -d | openssl enc -d -aes-256-cbc -pbkdf2 -pass pass:"$master_key" -md sha256) + +if [ "$decrypted_sample_msg" != "Hi server, please encrypt me and send to client!" ]; then + echo "Server symmetric encryption using the exchanged master-key has failed." + exit 6 +fi + +echo "Client-Server TLS handshake has been completed successfully" From 86856fcb3d228d35925484812f0031b909f1e5cd Mon Sep 17 00:00:00 2001 From: Keshav Bhardwaj <110217847+keshavbhrdwaj7@users.noreply.github.com> Date: Fri, 16 Jun 2023 22:26:32 +0530 Subject: [PATCH 5/5] Update vpc.sh