SlideShare a Scribd company logo
Ball State University
Security Lessons Learned from an
EZproxy Administrator
Paul R Butler
• What is EZproxy?
• Why Talk About EZproxy?
• What are we trying to identify?
• Tools of the Trade
• A Review of EZproxy Log Files
• A Review of a Few EZproxy Security Features
• Performing a Security Audit with EZproxy
• Post Review Activities
• Advanced Tools
• Some Security Lessons Learned
• Next Steps
• Questions?
Presentation Outline
Ball State University
EZproxy is a web proxy server used by libraries to give access
from outside the library's computer network to restricted-access
websites that authenticate users by IP address. This allows
library patrons at home or elsewhere to log in through their
library's EZproxy server and gain access to bibliographic
databases and the like to which their library subscribes.
What is EZproxy?
Ball State University
- From the Ezproxy Wikipedia article on 2016-11-11. https://en.wikipedia.org/wiki/EZproxy
• Large market share in the industry
• The canary in the coal mine
• Talking about EZproxy’s capabilities with publishers & vendors improves
communication down the road
• Lessons learned can be useful in other products
Why talk about EZproxy?
Ball State University
• Different type of compromised accounts
• The Vacuum
• Scripted Attack
• The Lone Wolf
• Individual User
• The Swarm
• Individual User That Gets Shared
• IP addresses
• Referrers
What are we trying to identify?
Ball State University
• ILS, Banner, Social Media (LinkedIn), etc.
• IP Address Geolocation Information
• MaxMind - https://www.maxmind.com
• Aggregate geolocation website - https://www.iplocation.net
• Grep & Regular Expressions (regex)
• Cygwin on a Windows machine
• https://www.cygwin.com
• NotePad++, Excel, Access, etc.
• https://notepad-plus-plus.org
Tools of the Trade
Ball State University
A Review of EZproxy Log Files
Ball State University
Ex: audit20161111.txt
A Review of EZproxy Log Files, continued
Ball State University
• Ex: ezproxy201611.log
• 102.XX.XX.XXX 8MxydoKBwdLhVE1 USERNAME [08/Nov/2016:09:41:06 -0500] "GET
http://bsu.summon.serialssolutions.com:80/ HTTP/1.1" 200 17180
"http://www.rclweb.net.proxy.bsu.edu/TitleDetail/DetailedView?hreciid=|7861093|53073089&mc=U
SA&ht=1&click=newtitle"
• 102.XX.XX.XXX 8MxydoKBwdLhVE1 USERNAME [08/Nov/2016:09:41:11 -0500] "GET
http://bsu.summon.serialssolutions.com:80/api/search?pn=1&ho=t&fvf%5B%5D=SourceType%2CL
ibrary+Catalog%2Cf&l=en&q=Technical+Communication HTTP/1.1" 200 14010
"http://bsu.summon.serialssolutions.com.proxy.bsu.edu/"
• 102.XX.XX.XXX 8MxydoKBwdLhVE1 USERNAME [08/Nov/2016:09:41:27 -0500] "GET
http://bsu.summon.serialssolutions.com:80/2.0.0/availability/SB6NW2TX4E?s.id=KGK+778758&s.i
d=KGK+1136745&s.id=KGK+1669664&s.id=KGK+1589219&s.id=KGK+417000&s.id=KGK+12771
55&s.id=KGK+221368&s.id=KGK+244958&s.id=KGK+527175&s.id=KGK+23691&uilang=en
HTTP/1.1" 200 7621 "http://bsu.summon.serialssolutions.com.proxy.bsu.edu/"
• Audit Most
• Audit Session.IPChange
• IntruderIPAttempts
• IntruderUserAttempts
• Location
• LogFormat
• Option BlockCountryChange
• UsageLimit
A Review of a Few EZproxy Security Features
Ball State University
Performing a Security Audit with EZproxy
Ball State University
• Events
• IP
• Location
• Username
• Other
Performing a Security Audit with EZproxy, continued
Ball State University
• Events
• IP
• Location
• Username
• Other
Performing a Security Audit with EZproxy, continued
Ball State University
• Events
• IP
• Location
• Username
• Other
Performing a Security Audit with EZproxy, continued
Ball State University
• Events
• IP
• Location
• Username
• Other
Performing a Security Audit with EZproxy, continued
Ball State University
• Events
• IP
• Location
• Username
• Other
• Add items from the audit files to my notes file as needed.
• Block users from EZproxy that I have deemed compromised. Terminate active
sessions.
• Block IP addresses and referrers from EZproxy that were used for illegitimate
activity.
• Report compromised user accounts to the University’s security team.
• Report IP addresses from other institutions used for illegitimate activity to that
institution.
• Report IP addresses used for illegitimate activity to the Ezproxy IP Blacklist.
Post Review Activities
Ball State University
• EZproxy conditionals
• IfCountry
• IfIP
• https://github.com/prbutler/EZProxy_IP_Blacklist
• IfReferer
• Daily audit file analysis
• EZProxy Audit Log Email Script
• https://github.com/prbutler/EZProxy_Audit_Log_Email_Script
• Web server log file analysis
• Ex: EzPAARSE - http://ezpaarse.couperin.org
• Real-time log file analysis
• Code4Lib article “A Novel Open Source Approach to Monitor EZproxy Users’ Activities”
Advanced Tools
Ball State University
• Take geolocation information with a heaping pile of salt.
• Honeypots are a good thing.
• Failed attempts are valuable information; learn from compromised access.
• You can find a good balance for usage limits, but one size does not fit all vendors
and users.
• Get familiar with your users and their behaviors.
• You will need to invest time and resources.
• Automate what you can, but humans are still useful.
Some Security Lessons Learned
Ball State University
• Expand the conversation
• Increase the dialogues we are already having
• EZproxy listserv
• ezproxy-request@ls.suny.edu
• http://www.oclc.org/support/services/ezproxy/documentation/list.en.html
• Thank you to NISO, the other speakers, and those listening.
Next Steps
Ball State University
Questions?
Ball State University
Paul R Butler
Library Technologies Support Analyst @ Ball State University
PRBUTLER@BSU.EDU

More Related Content

PPTX
Discovery Systems Used in Academic Libraries Projects & Case Study
PPTX
The workflows for the ingest of digital objects into a repository/digital l...
PDF
Hoeppner Feb 8 Imagining Better E-Resource Access
PDF
Role of libraries in accelerating research
Discovery Systems Used in Academic Libraries Projects & Case Study
The workflows for the ingest of digital objects into a repository/digital l...
Hoeppner Feb 8 Imagining Better E-Resource Access
Role of libraries in accelerating research

What's hot (20)

PDF
Current and emerging trends in library services
PPTX
PPTX
PPTX
Software Repositories for Research-- An Environmental Scan
PPTX
Dulin PermaCC Talk for MIT PIS
PPTX
Multilingual presentation ifla 2013 08-19
PPTX
Sept 24 NISO Virtual Conference: Library Data in the Cloud
PDF
PPTX
Gary Price, MIT Program on Information Science
PPTX
Sept 24 NISO Virtual Conference: Library Data in the Cloud
PPTX
Sept 24 NISO Virtual Conference: Library Data in the Cloud
PPT
Customization For Libraries
PDF
Brooking Ingesting Metadata - FINAL
PDF
Introduction to using REDCap for multi-site longitudinal research in medicine
PPTX
The future of the integrated library system
PPTX
Exposing Library Content with the NISO Metasearch XML Gateway Protocol
PPTX
Sept 24 NISO Virtual Conference: Library Data in the Cloud
PPTX
Sept 24 NISO Virtual Conference: Library Data in the Cloud
PPTX
Some technical hurdles towards open science
Current and emerging trends in library services
Software Repositories for Research-- An Environmental Scan
Dulin PermaCC Talk for MIT PIS
Multilingual presentation ifla 2013 08-19
Sept 24 NISO Virtual Conference: Library Data in the Cloud
Gary Price, MIT Program on Information Science
Sept 24 NISO Virtual Conference: Library Data in the Cloud
Sept 24 NISO Virtual Conference: Library Data in the Cloud
Customization For Libraries
Brooking Ingesting Metadata - FINAL
Introduction to using REDCap for multi-site longitudinal research in medicine
The future of the integrated library system
Exposing Library Content with the NISO Metasearch XML Gateway Protocol
Sept 24 NISO Virtual Conference: Library Data in the Cloud
Sept 24 NISO Virtual Conference: Library Data in the Cloud
Some technical hurdles towards open science
Ad

Viewers also liked (20)

PDF
Carver IT Security for Librarians
PDF
Lavignino Do You Know Your Privacy Risks
PDF
Opac customization
PDF
Koha presentation
PDF
Goans-Helms-IT Security at Georgia Tech Library
PPTX
Chris Shillum: Overview of the RA21 proejct presentation
PDF
Carpenter: Getting Access Control from Here to There
PDF
Carver-IT Security for Librarians
PPTX
Presentation of NISO Altmetrics RP - Charleston Library Conference
PPTX
Ralph Youngen: Evolving Identity & Access Management at ACS Presentation
PDF
Ferrante Durable Access to Digital Primary Sources
PDF
VanDyck Long-Term Preservation of Digital Scholarly Literature
PDF
Wittenberg Portico: Lessons From a Community Supported Archive
PDF
Goethals Harvard Library's Digital Preservation Repository
PDF
Madsen Digital Preservation Policy & Strategy
PDF
Wheeler & Benedict -- Enabling the Preservation Relay
PDF
Herdrich -The Digital Library of the Middle East (DLME)
PPTX
L’acquisition d’un outil de découverte_Expérience de l'Université Sherbrooke_...
PDF
Kettler Information Digitization in the Humanities
PDF
Waraksa Digital Library of the Middle East
Carver IT Security for Librarians
Lavignino Do You Know Your Privacy Risks
Opac customization
Koha presentation
Goans-Helms-IT Security at Georgia Tech Library
Chris Shillum: Overview of the RA21 proejct presentation
Carpenter: Getting Access Control from Here to There
Carver-IT Security for Librarians
Presentation of NISO Altmetrics RP - Charleston Library Conference
Ralph Youngen: Evolving Identity & Access Management at ACS Presentation
Ferrante Durable Access to Digital Primary Sources
VanDyck Long-Term Preservation of Digital Scholarly Literature
Wittenberg Portico: Lessons From a Community Supported Archive
Goethals Harvard Library's Digital Preservation Repository
Madsen Digital Preservation Policy & Strategy
Wheeler & Benedict -- Enabling the Preservation Relay
Herdrich -The Digital Library of the Middle East (DLME)
L’acquisition d’un outil de découverte_Expérience de l'Université Sherbrooke_...
Kettler Information Digitization in the Humanities
Waraksa Digital Library of the Middle East
Ad

Similar to Butler - Security Lessons Learned from an Ezproxy Admin (8)

PPTX
EZproxy Implementation in Sierra
PPTX
The Move to Hosted EZproxy as Experienced by Texas Tech University
PPT
Web Proxy Log Analysis and Management 2007
PDF
Schwartz ez proxy-logs
PDF
Beyond 'Set it and Forget it': Proactively managing your EZproxy server
PPTX
Cyber ppt
PPT
Application of EZProxy logs, Voyager’s Patron Database, MySQL, and ColdFusion...
PDF
Remote login based library services
EZproxy Implementation in Sierra
The Move to Hosted EZproxy as Experienced by Texas Tech University
Web Proxy Log Analysis and Management 2007
Schwartz ez proxy-logs
Beyond 'Set it and Forget it': Proactively managing your EZproxy server
Cyber ppt
Application of EZProxy logs, Voyager’s Patron Database, MySQL, and ColdFusion...
Remote login based library services

More from National Information Standards Organization (NISO) (20)

PPTX
Larry Bennett_ ALA Annual Convention 2025AL2 slides.pptx
PPTX
Potash "Our Journey & Vision for Accessible Content"
PPTX
O'Leary "Progress Assessment - How Far Are We from Delivery"
PPTX
Carpenter and O'Leary "Accessibility Standards and the Future of Inclusive Pu...
PPTX
Davidian "Transfer Code of Practice Standing Committee Update"
PPTX
Patham "NISO Open Discovery Initiative (ODI) Update"
PPTX
Hichliffe "A Standard Terminology for Peer Review"
PPTX
Levin "KBART RP Update at ALA Annual 2025"
PPTX
Carpenter "Advancing Infrastructure for Sustainable Collections: CCLP Project...
PPTX
Gibson "Secrets to Changing Behaviour in Scholarly Communication: A 2025 NISO...
PPTX
Gibson "Secrets to Changing Behaviour in Scholarly Communication: A 2025 NISO...
PDF
Carpenter "2025 NISO Annual Members Meeting"
PPTX
Allen "Social Marketing in Scholarly Communications"
PPTX
Gibson "Secrets to Changing Behaviour in Scholarly Communication: A 2025 NISO...
PDF
Gibson "Secrets to Changing Behaviour in Scholarly Communication: A 2025 NISO...
PDF
Pfeiffer "Secrets to Changing Behavior in Scholarly Communication: A 2025 NIS...
PPTX
Gilstrap "Accessibility Essentials: A 2025 NISO Training Series, Session 7, M...
PPTX
Turner "Accessibility Essentials: A 2025 NISO Training Series, Session 7, Lan...
PPTX
Comeford "Accessibility Essentials: A 2025 NISO Training Series, Session 7, A...
PPTX
Laverick and Richard "Accessibility Essentials: A 2025 NISO Training Series, ...
Larry Bennett_ ALA Annual Convention 2025AL2 slides.pptx
Potash "Our Journey & Vision for Accessible Content"
O'Leary "Progress Assessment - How Far Are We from Delivery"
Carpenter and O'Leary "Accessibility Standards and the Future of Inclusive Pu...
Davidian "Transfer Code of Practice Standing Committee Update"
Patham "NISO Open Discovery Initiative (ODI) Update"
Hichliffe "A Standard Terminology for Peer Review"
Levin "KBART RP Update at ALA Annual 2025"
Carpenter "Advancing Infrastructure for Sustainable Collections: CCLP Project...
Gibson "Secrets to Changing Behaviour in Scholarly Communication: A 2025 NISO...
Gibson "Secrets to Changing Behaviour in Scholarly Communication: A 2025 NISO...
Carpenter "2025 NISO Annual Members Meeting"
Allen "Social Marketing in Scholarly Communications"
Gibson "Secrets to Changing Behaviour in Scholarly Communication: A 2025 NISO...
Gibson "Secrets to Changing Behaviour in Scholarly Communication: A 2025 NISO...
Pfeiffer "Secrets to Changing Behavior in Scholarly Communication: A 2025 NIS...
Gilstrap "Accessibility Essentials: A 2025 NISO Training Series, Session 7, M...
Turner "Accessibility Essentials: A 2025 NISO Training Series, Session 7, Lan...
Comeford "Accessibility Essentials: A 2025 NISO Training Series, Session 7, A...
Laverick and Richard "Accessibility Essentials: A 2025 NISO Training Series, ...

Recently uploaded (20)

PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
Computing-Curriculum for Schools in Ghana
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Complications of Minimal Access Surgery at WLH
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Presentation on HIE in infants and its manifestations
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
RMMM.pdf make it easy to upload and study
PPTX
Cell Structure & Organelles in detailed.
PPTX
master seminar digital applications in india
PDF
O7-L3 Supply Chain Operations - ICLT Program
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
102 student loan defaulters named and shamed – Is someone you know on the list?
Computing-Curriculum for Schools in Ghana
2.FourierTransform-ShortQuestionswithAnswers.pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
Anesthesia in Laparoscopic Surgery in India
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Complications of Minimal Access Surgery at WLH
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
O5-L3 Freight Transport Ops (International) V1.pdf
Final Presentation General Medicine 03-08-2024.pptx
Presentation on HIE in infants and its manifestations
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Chinmaya Tiranga quiz Grand Finale.pdf
RMMM.pdf make it easy to upload and study
Cell Structure & Organelles in detailed.
master seminar digital applications in india
O7-L3 Supply Chain Operations - ICLT Program

Butler - Security Lessons Learned from an Ezproxy Admin

  • 1. Ball State University Security Lessons Learned from an EZproxy Administrator Paul R Butler
  • 2. • What is EZproxy? • Why Talk About EZproxy? • What are we trying to identify? • Tools of the Trade • A Review of EZproxy Log Files • A Review of a Few EZproxy Security Features • Performing a Security Audit with EZproxy • Post Review Activities • Advanced Tools • Some Security Lessons Learned • Next Steps • Questions? Presentation Outline Ball State University
  • 3. EZproxy is a web proxy server used by libraries to give access from outside the library's computer network to restricted-access websites that authenticate users by IP address. This allows library patrons at home or elsewhere to log in through their library's EZproxy server and gain access to bibliographic databases and the like to which their library subscribes. What is EZproxy? Ball State University - From the Ezproxy Wikipedia article on 2016-11-11. https://en.wikipedia.org/wiki/EZproxy
  • 4. • Large market share in the industry • The canary in the coal mine • Talking about EZproxy’s capabilities with publishers & vendors improves communication down the road • Lessons learned can be useful in other products Why talk about EZproxy? Ball State University
  • 5. • Different type of compromised accounts • The Vacuum • Scripted Attack • The Lone Wolf • Individual User • The Swarm • Individual User That Gets Shared • IP addresses • Referrers What are we trying to identify? Ball State University
  • 6. • ILS, Banner, Social Media (LinkedIn), etc. • IP Address Geolocation Information • MaxMind - https://www.maxmind.com • Aggregate geolocation website - https://www.iplocation.net • Grep & Regular Expressions (regex) • Cygwin on a Windows machine • https://www.cygwin.com • NotePad++, Excel, Access, etc. • https://notepad-plus-plus.org Tools of the Trade Ball State University
  • 7. A Review of EZproxy Log Files Ball State University Ex: audit20161111.txt
  • 8. A Review of EZproxy Log Files, continued Ball State University • Ex: ezproxy201611.log • 102.XX.XX.XXX 8MxydoKBwdLhVE1 USERNAME [08/Nov/2016:09:41:06 -0500] "GET http://bsu.summon.serialssolutions.com:80/ HTTP/1.1" 200 17180 "http://www.rclweb.net.proxy.bsu.edu/TitleDetail/DetailedView?hreciid=|7861093|53073089&mc=U SA&ht=1&click=newtitle" • 102.XX.XX.XXX 8MxydoKBwdLhVE1 USERNAME [08/Nov/2016:09:41:11 -0500] "GET http://bsu.summon.serialssolutions.com:80/api/search?pn=1&ho=t&fvf%5B%5D=SourceType%2CL ibrary+Catalog%2Cf&l=en&q=Technical+Communication HTTP/1.1" 200 14010 "http://bsu.summon.serialssolutions.com.proxy.bsu.edu/" • 102.XX.XX.XXX 8MxydoKBwdLhVE1 USERNAME [08/Nov/2016:09:41:27 -0500] "GET http://bsu.summon.serialssolutions.com:80/2.0.0/availability/SB6NW2TX4E?s.id=KGK+778758&s.i d=KGK+1136745&s.id=KGK+1669664&s.id=KGK+1589219&s.id=KGK+417000&s.id=KGK+12771 55&s.id=KGK+221368&s.id=KGK+244958&s.id=KGK+527175&s.id=KGK+23691&uilang=en HTTP/1.1" 200 7621 "http://bsu.summon.serialssolutions.com.proxy.bsu.edu/"
  • 9. • Audit Most • Audit Session.IPChange • IntruderIPAttempts • IntruderUserAttempts • Location • LogFormat • Option BlockCountryChange • UsageLimit A Review of a Few EZproxy Security Features Ball State University
  • 10. Performing a Security Audit with EZproxy Ball State University • Events • IP • Location • Username • Other
  • 11. Performing a Security Audit with EZproxy, continued Ball State University • Events • IP • Location • Username • Other
  • 12. Performing a Security Audit with EZproxy, continued Ball State University • Events • IP • Location • Username • Other
  • 13. Performing a Security Audit with EZproxy, continued Ball State University • Events • IP • Location • Username • Other
  • 14. Performing a Security Audit with EZproxy, continued Ball State University • Events • IP • Location • Username • Other
  • 15. • Add items from the audit files to my notes file as needed. • Block users from EZproxy that I have deemed compromised. Terminate active sessions. • Block IP addresses and referrers from EZproxy that were used for illegitimate activity. • Report compromised user accounts to the University’s security team. • Report IP addresses from other institutions used for illegitimate activity to that institution. • Report IP addresses used for illegitimate activity to the Ezproxy IP Blacklist. Post Review Activities Ball State University
  • 16. • EZproxy conditionals • IfCountry • IfIP • https://github.com/prbutler/EZProxy_IP_Blacklist • IfReferer • Daily audit file analysis • EZProxy Audit Log Email Script • https://github.com/prbutler/EZProxy_Audit_Log_Email_Script • Web server log file analysis • Ex: EzPAARSE - http://ezpaarse.couperin.org • Real-time log file analysis • Code4Lib article “A Novel Open Source Approach to Monitor EZproxy Users’ Activities” Advanced Tools Ball State University
  • 17. • Take geolocation information with a heaping pile of salt. • Honeypots are a good thing. • Failed attempts are valuable information; learn from compromised access. • You can find a good balance for usage limits, but one size does not fit all vendors and users. • Get familiar with your users and their behaviors. • You will need to invest time and resources. • Automate what you can, but humans are still useful. Some Security Lessons Learned Ball State University
  • 18. • Expand the conversation • Increase the dialogues we are already having • EZproxy listserv • ezproxy-request@ls.suny.edu • http://www.oclc.org/support/services/ezproxy/documentation/list.en.html • Thank you to NISO, the other speakers, and those listening. Next Steps Ball State University
  • 19. Questions? Ball State University Paul R Butler Library Technologies Support Analyst @ Ball State University PRBUTLER@BSU.EDU