Repository for http://www.infsec.ethz.ch/education/as2013/appliedlab
- Some linux shit
- OpenVPN
- Debian
- Iptables
- Nginx
- Python
- Flask
- ZeroRPC
- SSH access for connections from firewall
- Debian
- Iptables
- Python
- ZeroRPC
- OpenSSL
- MySQL
- SSH access for connections from firewall
- Debian
- Iptables
- SSH access for connections from firewall and CACore
- Syslog server
- Only accessible via HTTPS
- Identifies each visitor with a session cookie or something like that
- Check legacy db for valid username/password combination
- Returns a session id and user data on success, raises exception otherwise
- Validate the session id
- Returns the corresponding user id on success, raises exception otherwise
- Kills the session
- Returns True
- How does this work?
- Returns a session id and user data on success, raises Exception otherwise
- Create a update request for the users data
- Revokes all certificates for the current users data
- Returns True on success, raises exception otherwise
- Returns the Certificate revocation list
- Create a new public/private keypair and sign it with the CA key
- Returns public and private keys and the signed certificate
- Revokes the certificate if it belongs to the user that coresponds to the session_id
- Returns True on success, raises exception otherwise
- Same as user certLogin, but only for CA administrators
- Returns an admin_session_id on success, raises exception otherwise
- Returns the current status of the CA (# issued certs, current serial number, ...)
- LOL DUNNO HAHAHAHAHAHAHAHAHAA
- Syslog server