Document Information
Preface
Part I Initial Configuration of Trusted Extensions
1. Security Planning for Trusted Extensions
2. Configuration Roadmap for Trusted Extensions
3. Adding Solaris Trusted Extensions Software to the Solaris OS (Tasks)
4. Configuring Trusted Extensions (Tasks)
5. Configuring LDAP for Trusted Extensions (Tasks)
6. Configuring a Headless System With Trusted Extensions (Tasks)
Part II Administration of Trusted Extensions
7. Trusted Extensions Administration Concepts
8. Trusted Extensions Administration Tools
9. Getting Started as a Trusted Extensions Administrator (Tasks)
10. Security Requirements on a Trusted Extensions System (Overview)
11. Administering Security Requirements in Trusted Extensions (Tasks)
12. Users, Rights, and Roles in Trusted Extensions (Overview)
13. Managing Users, Rights, and Roles in Trusted Extensions (Tasks)
14. Remote Administration in Trusted Extensions (Tasks)
15. Trusted Extensions and LDAP (Overview)
16. Managing Zones in Trusted Extensions (Tasks)
17. Managing and Mounting Files in Trusted Extensions (Tasks)
18. Trusted Networking (Overview)
19. Managing Networks in Trusted Extensions (Tasks)
Managing the Trusted Network (Task Map)
Configuring Trusted Network Databases (Task Map)
Configuring Routes and Checking Network Information in Trusted Extensions (Task Map)
20. Multilevel Mail in Trusted Extensions (Overview)
21. Managing Labeled Printing (Tasks)
22. Devices in Trusted Extensions (Overview)
23. Managing Devices for Trusted Extensions (Tasks)
24. Trusted Extensions Auditing (Overview)
25. Software Management in Trusted Extensions (Tasks)
A. Site Security Policy
Creating and Managing a Security Policy
Site Security Policy and Trusted Extensions
Computer Security Recommendations
Physical Security Recommendations
Personnel Security Recommendations
Common Security Violations
Additional Security References
B. Using CDE Actions to Install Zones in Trusted Extensions
Associating Network Interfaces With Zones by Using CDE Actions (Task Map)
Preparing to Create Zones by Using CDE Actions (Task Map)
Creating Labeled Zones by Using CDE Actions (Task Map)
C. Configuration Checklist for Trusted Extensions
Checklist for Configuring Trusted Extensions
D. Quick Reference to Trusted Extensions Administration
Administrative Interfaces in Trusted Extensions
Solaris Interfaces Extended by Trusted Extensions
Tighter Security Defaults in Trusted Extensions
Limited Options in Trusted Extensions
E. List of Trusted Extensions Man Pages
Trusted Extensions Man Pages in Alphabetical Order
Solaris Man Pages That Are Modified by Trusted Extensions
Glossary
Index
|
Troubleshooting the Trusted Network (Task Map)
The following task map describes tasks to debug your network.
How to Verify That a Host's Interfaces Are UpUse this procedure if your system does not communicate with other hosts as
expected. Before You BeginYou must be in the global zone in a role that can
check network settings. The Security Administrator role and the System Administrator role can
check these settings.
- Verify that the system's network interface is up.
The following output shows that the system has two network interfaces, hme0 and
hme0:3. Neither interface is up. # ifconfig -a
...
hme0: flags=1000843<BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 index 2
inet 192.168.0.11 netmask ffffff00 broadcast 192.168.0.255
hme0:3 flags=1000843<BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 index 2
inet 192.168.0.12 netmask ffffff00 broadcast 192.168.0.255
- If the interface is not up, bring it up and then verify
that it is up.
The following output shows that both interfaces are up. # ifconfig hme0 up
# ifconfig -a
...
hme0: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,...
hme0:3 flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,..
How to Debug the Trusted Extensions NetworkTo debug two hosts that should be communicating but are not, you can
use Trusted Extensions and Solaris debugging tools. For example, Solaris network debugging commands
such as snoop and netstat are available. For details, see the snoop(1M) and
netstat(1M) man pages. For commands that are specific to Trusted Extensions, see Table 8-4.
Before You BeginYou must be in the global zone in a role that can
check network settings. The Security Administrator role or the System Administrator role can
check these settings.
- To troubleshoot the tnd daemon, change the polling interval and collect debugging information.
For details, see the tnd(1M) man page.
- Check that the hosts that cannot communicate are using the same naming service.
- On each host, check the nsswitch.conf file.
- Check the values for the Trusted Extensions databases in the nsswitch.conf file.
For example, at a site that uses LDAP to administer the network, the
entries are similar to the following: # Trusted Extensions
tnrhtp: files ldap
tnrhdb: files ldap
- If the values are different, correct the nsswitch.conf file.
To modify these entries, the system administrator uses the Name Service Switch action.
For details, see How to Start CDE Administrative Actions in Trusted Extensions. This action preserves the required DAC and MAC file
permissions.
- Check that the LDAP naming service is configured.
$ ldaplist -l
- Check that both hosts are in the LDAP naming service.
$ ldaplist -l hosts | grep hostname
- Check that each host is defined correctly.
- Use the Solaris Management Console to verify the definitions.
In the Security Templates tool, check that each host is assigned to a security template that is compatible with the security template of the other host.
For an an unlabeled system, check that the default label assignment is correct.
In the Trusted Network Zones tool, check that the multilevel ports (MLPs) are correctly configured.
- Use the command line to check that the network information in the kernel
is current.
Check that the assignment in each host's kernel cache matches the assignment on
the network, and on the other host. To get security information for the source, destination, and gateway hosts in the
transmission, use the tninfo command.
- Display the IP address and the assigned security template for a given host.
$ tninfo -h hostname
IP Address: IP-address
Template: template-name
- Display a template definition.
$ tninfo -t template-name
template: template-name
host_type: one of CIPSO or UNLABELED
doi: 1
min_sl: minimum-label
hex: minimum-hex-label
max_sl: maximum-label
hex: maximum-hex-label
- Display the MLPs for a zone.
$ tninfo -m zone-name
private: ports-that-are-specific-to-this-zone-only
shared: ports-that-the-zone-shares-with-other-zones
- Fix any incorrect information.
To change or check network security information, use the Solaris Management Console tools. For details, see How to Open the Trusted Networking Tools
To update the kernel cache, restart the tnctl service on the host whose information is out of date. Allow some time for this process to complete. Then, refresh the tnd service. If the refresh fails, try restarting the tnd service. For details, see How to Synchronize the Kernel Cache With Trusted Network Databases. Rebooting clears the kernel cache. At boot time, the cache is populated with database information. The nsswitch.conf file determines whether local databases or LDAP databases are used to populate the kernel.
- Collect transmission information to help you in debugging.
- Verify your routing configuration.
Use the get subcommand to the route command. $ route get [ip] -secattr sl=label,doi=integer For details, see the route(1M) man page.
- View the label information in packets.
Use the snoop -v command. The -v option displays the details of packet headers, including label information. This
command provides a lot of detail, so you might want to restrict the
packets that the command examines. For details, see the snoop(1M) man page.
- View the routing table entries and the security attributes on sockets.
Use the -R option with the netstat -a|-r command. The -aR option displays extended security attributes for sockets. The -rR option displays
routing table entries. For details, see the netstat(1M) man page.
How to Debug a Client Connection to the LDAP ServerMisconfiguration of the client entry on the LDAP server can prevent the client
from communicating with the server. Similarly, misconfiguration of files on the client can
prevent communication. Check the following entries and files when attempting to debug a
client-server communication problem. Before You BeginYou must be in the Security Administrator role in the global zone
on the LDAP client.
- Check that the remote host template for the LDAP server and for the
gateway to the LDAP server are correct.
# tninfo -h LDAP-server
# route get LDAP-server
# tninfo -h gateway-to-LDAP-server If a remote host template assignment is incorrect, assign the host to the
correct template by using the Security Templates tool in the Solaris Management
Console.
- Check and correct the /etc/hosts file.
Your system, the interfaces for the labeled zones on your system, the gateway
to the LDAP server, and the LDAP server must be listed in
the file. You might have more entries. Look for duplicate entries. Remove any entries that are labeled zones on other
systems. For example, if Lserver is the name of your LDAP server, and
LServer-zones is the shared interface for the labeled zones, remove LServer-zones from /etc/hosts.
- If you are using DNS, check and correct the entries in the
resolv.conf file.
# more resolv.conf
search list of domains
domain domain-name
nameserver IP-address
...
nameserver IP-address
- Check that the tnrhdb and tnrhtp entries in the nsswitch.conf file are accurate.
- Check that the client is correctly configured on the server.
# ldaplist -l tnrhdb client-IP-address
- Check that the interfaces for your labeled zones are correctly configured on the
LDAP server.
# ldaplist -l tnrhdb client-zone-IP-address
- Verify that you can ping the LDAP server from all currently running zones.
# ldapclient list
...
NS_LDAP_SERVERS= LDAP-server-address
# zlogin zone-name1 ping LDAP-server-address
LDAP-server-address is alive
# zlogin zone-name2 ping LDAP-server-address
LDAP-server-address is alive
...
- Configure LDAP and reboot.
- Run the Create LDAP Client action.
This action re-establishes the global zone as a client of the LDAP server.
- In every labeled zone, re-establish the zone as a client of the LDAP
server.
# zlogin zone-name1
# ldapclient init \
-a profileName=profileName \
-a domainName=domain \
-a proxyDN=proxyDN \
-a proxyPassword=password LDAP-Server-IP-Address
# exit
# zlogin zone-name2 ...
- Halt all zones, lock the file systems, and reboot.
If you are using Solaris ZFS, halt the zones and lock the file
systems before rebooting. If you are not using ZFS, you can reboot without
halting the zones and locking the file systems. # zoneadm list
# zoneadm -z zone-name halt
# lockfs -fa
# reboot
|