Solaris 10 Security. Technical Deep Dive. Glenn Brunette. Distinguished Engineer Sun Microsystems, Inc.
|
|
|
- Tracey Scarlett Page
- 10 years ago
- Views:
Transcription
1 Solaris 10 Security Technical Deep Dive Glenn Brunette Distinguished Engineer Sun Microsystems, Inc.
2 Agenda Solaris Security Goals Solaris 9 Security Review an overview of features from past releases. Solaris 10 Security Deep Dive a dive into new features including: Secure by Default, SMF, Privileges, ZFS, Zones, Trusted Extensions, and more! 2
3 Solaris Security Goals Defending Provide strong assurance of system integrity. Defend system from unauthorized access. Enabling Secure authentication of all active subjects. Protect communications between endpoints. Deploying Emphasize an integratable stack architecture. Interoperate with other security architectures. Ease management and use of security features. Receive independent assessment of security. 3
4 Solaris 9 Security Review Access Control Lists Solaris Fingerprint DB Role-based Access Control Solaris Secure Shell IPsec / IKE Kerberos Solaris Auditing /dev/[u]random TCP Wrappers (inetd, rpcbind) Enhanced PAM Framework Flexible Crypt Smartcard Framework Signed Patches Java Security Granular Packaging SunScreen 3.2 SSL-enabled LDAP Solaris Security Toolkit WAN Boot sadmind DES Auth IKE Hardware Accel. LDAP Password Management 4
5 Solaris 10 Technical Security Deep Dive 5
6 Reduced Networking Metacluster Metacluster Reduced Networking SUNWCrnet Core SUNWCreq End User SUNWCuser Developer SUNWCprog Entire SUNWCall Entire + OEM SUNWCXall Size (MB) # Pkgs # Set-UID # Set-GID
7 Reduced and Minimal Configurations Some environments remove or simply do not install software packages that are not needed (business or technical reasons) Less software to install, upgrade, patch, and maintain. Less software equates to reduced exposure to security vulnerabilities. Refer to Sun's Rules of Engagement for the Support of Reduced or Minimal Configurations Solaris Package Companion can be used to understand software package relationships and dependencies 7
8 Solaris Package Companion Examples EXAMPLE 1: What packages depend on StarOffice? $ spc-v0.8.ksh -r./nv72.rep -l -F -f /opt/staroffice8/program/soffice SUNWCstaroffice $ spc-v0.8.ksh -r./nv72.rep -F -Z -v SUNWCstaroffice SUNWCstaroffice [C] StarOffice EXAMPLE 2: On what does SSH depend? $ spc-v0.8.ksh -r./nv72.rep -D -F -v SUNWCssh SUNWCcs [C] Core Solaris SUNWCfwcmp [C] Freeware Compression Utilities SUNWCopenssl [C] OpenSSL SUNWCssh [C] Secure Shell SUNWcakr [P] Core Solaris Kernel Architecture (Root) SUNWcar [P] Core Architecture, (Root) SUNWgss [P] GSSAPI V2 SUNWgssc [P] GSSAPI CONFIG V2 SUNWkvm [P] Core Architecture, (Kvm) SUNWloc [P] System Localization For more details and information, see the Solaris Package Companion OpenSolaris Project site at: 8
9 Cryptographically Signed ELF Objects ELF Objects Cryptographically Signed binaries, libraries, kernel modules, crypto modules, etc. # file /usr/lib/ssh/sshd /usr/lib/ssh/sshd: ELF 32-bit MSB executable SPARC Version 1, dynamically linked, stripped # elfsign verify -e /usr/lib/ssh/sshd elfsign: verification of /usr/lib/ssh/sshd passed. # elfsign list -f signer -e /usr/bin/ls CN=SunOS 5.10, OU=Solaris Signed Execution, O=Sun Microsystems Inc Cryptographic modules must be signed by Sun. Signature must be validated before module can be loaded. Crypto. modules will not load if not signed or have invalid signature. 9
10 Non-Executable Stack Example #include <stdio.h #include <string.h typedef void (*fptr)(void); #ifdef sparc char shellcode[] = "\x2d\x0b\xd8\x9a\xac\x15\xa1\x6e\x2f\x0b\xdc\xda\x90\x0b\x80\x0e" "\x92\x03\xa0\x08\x94\x1a\x80\x0a\x9c\x03\xa0\x10\xec\x3b\xbf\xf0" "\xdc\x23\xbf\xf8\xc0\x23\xbf\xfc\x82\x10\x20\x3b\x91\xd0\x20\x08"; #endif int main(int argc, char **argv) { fptr f; char code[100]; } memcpy(code, shellcode, sizeof(shellcode)); printf("attempting to start a shell...\n"); f = (fptr)code; f(); return (0); 10
11 Non-Executable Stack #1 $ cc -o myshell shell.c $ cc -o myshell-nx -M /usr/lib/ld/map.noexst shell.c $./myshell Attempting to start a shell... $ exit $./myshell-nx Attempting to start a shell... Segmentation Fault(coredump) Sep 16 15:06:06 kilroy genunix: [ID kern.notice] NOTICE: shell-noexstk[23132] attempt to execute code on stack by uid 101 Stacks can be globally configured to be non-executable using the noexec_user_stack tunable in /etc/system. 11
12 Non-Executable Stack #2 $ telnet victimhost myshell Trying Connected to victimhost. Escape character is '^]'. finger; Login Name TTY gbrunett Glenn Brunette pts/5 \377\277\375\364: ^M: not found [...] Connection to victimhost closed. Idle When Wed 13:48 Where void $ telnet victimhost myshell-nx Trying Connected to victimhost. Escape character is '^]'. Connection to victimhost closed by foreign host. For more information on Solaris non-executable stack functionality, see: 12
13 Service Management Facility Provide a uniform mechanism to disable/manage services. e.g., svcadm [disable enable] telnet Support alternative service profiles e.g., Secure by Default profile (since Solaris 10 11/06) Leverage authorizations to manage/configure services. Define context to permit services to be started as a specific user and group and with specific privileges. Support automatic service dependency resolution. e.g., svcadm enable -r nfs/client Facilitate delegated service restarts. 13
14 SMF Example #1 $ profiles Service Operator Basic Solaris User All $ svcs network/inetd STATE STIME FMRI online 1:28:15 svc:/network/inetd:default $ svcadm disable network/inetd $ svcs -x -v network/inetd svc:/network/inetd:default (inetd) State: disabled since Thu Jul 13 17:05: Reason: Disabled by an administrator. See: See: man -M /usr/share/man -s 1M inetd See: /var/svc/log/network-inetd:default.log Impact: 5 dependent services are not running: 14
15 SMF Example #2 # svcprop -v -p defaults inetd defaults/bind_addr astring "" defaults/bind_fail_interval integer -1 defaults/bind_fail_max integer -1 defaults/con_rate_offline integer -1 [...] defaults/stability astring Evolving defaults/tcp_trace boolean false defaults/tcp_wrappers boolean false # svcprop -p config/local_only rpc/bind false # svcs -x sendmail svc:/network/smtp:sendmail (sendmail SMTP mail transfer agent) State: maintenance since Wed Dec 01 01:31: Reason: Start method failed repeatedly, last exited with status 208. See: See: sendmail(1m) Impact: 0 services are not running. 15
16 SMF Access Control Integrated with Solaris Roles (Rights Profiles) Service Administrator Service Operator Integrated with Solaris Authorizations Global: Global: Per Service: solaris.smf.modify solaris.smf.manage action_authorization Services may have property-group specific authorizations value_authorization modify_authorization change existing property values add, modify, or delete properties 16
17 SMF Example #3 # svcprop -p httpd -p general apache2 general/enabled boolean false general/action_authorization astring sunw.apache.oper general/entity_stability astring Evolving httpd/ssl boolean false httpd/stability astring Evolving httpd/value_authorization astring sunw.apache.admin Example taken from the Sun BluePrint: Restricting Service Administration in the Solaris 10 Operating System, 17
18 SMF Execution Context exec methods can be forced to run as a given user: {start, stop, etc.}/user exec methods can be forced to run as a given group: {start, stop, etc.}/group exec methods can be forced to use specific privileges: {start, stop, etc.}/privileges {start, stop, etc.}/limit_privileges Other exec context can also be defined: default project and resource pool, supplemental groups, etc. 18
19 SMF Example #4 # svcprop -v -p start apache2 start/exec astring /lib/svc/method/http-apache2\ start start/timeout_seconds count 60 start/type astring method start/user astring webservd start/group astring webservd start/privileges astring basic,!proc_session,!proc_info,!file_link_any, net_privaddr start/limit_privileges astring :default start/use_profile boolean false start/supp_groups astring :default start/working_directory astring :default start/project astring :default start/resource_pool astring :default Example taken from the Sun BluePrint: Limiting Service Privileges in the Solaris 10 Operating System, 19
20 SMF Example #5 20
21 SMF Example #6 21
22 Solaris Secure By Default Only Secure Shell is reachable by default. root use of Secure Shell is not permitted by default. Existing services are configured in SMF to either be: Disabled by default Listening for local (e.g., loopback) connections only Configuration can be selected using CLI or JumpStart: netservices: open (traditional) or limited (SBD) service_profile: open or limited_net Default installation method in Nevada/OpenSolaris: Solaris upgrades are not changed or impacted. Solaris 10 initial (fresh) installations can select SBD mode. 22
23 Solaris Secure By Default Example #1 # netservices netservices: usage: netservices [ open limited ] # netservices limited restarting syslogd restarting sendmail dtlogin needs to be restarted. Restart now? [Y] y restarting dtlogin # netstat -af inet -P tcp grep [...] *.sunrpc *.* 0 *.ssh *.* 0 localhost.smtp *.* 0 localhost.submission *.* 0 LISTEN LISTEN LISTEN LISTEN LISTEN 23
24 Solaris Secure By Default Example #2 Service FMRI Property Values rpcbind svc:/network/rpc/bind config/local_only true, false syslog svc:/system/system-log config/log_from_remote true, false sendmail svc:/network/smtp:sendmail config/local_only true, false smcwebserver svc:/system/webconsole:console options/tcp_listen true, false wbem svc:/application/management/wbem options/tcp_listen true, false X11 svc:/application/x11/x11-server options/tcp_listen true, false CDE svc:/application/graphical-login/cde-login dtlogin/args [null], -udpport 0 ToolTalk svc:/network/rpc/cde-ttdbserver:tcp proto tcp, ticotsord calendar svc:/network/rpc/cde-calendar-manager proto tcp, ticlts BSD printing svc:/application/print/rfc1179:default bind_addr [null], localhost 24
25 User/Password Management Enforced for All Naming Services Password Complexity Checks Login Name!= Password White Space Permitted Minimum Characters by Class Alphabetic, Non-Alphabetic, Uppercase, Lowercase, Digits, Special Maximum Consecutive Repeating Characters Local Banned Password List (Dictionary) Enforced for files Naming Service Only Local Password History Local Account Lockout (3 Strikes) New Account Locked Semantics 25
26 Password Management Example $ passwd gbrunett Enter existing login password: New Password: passwd: The password must contain at least 1 numeric or special character(s). Please try again New Password: passwd: The password must contain at least 1 uppercase alpha character(s). Please try again New Password: passwd: Too many consecutively repeating characters. Maximum allowed is 3. Permission denied $ passwd gbrunett Enter existing login password: New Password: passwd: Password in history list. 26
27 User Rights Management (Roles) Solaris Users versus Roles Roles can only be accessed by users already logged in. Users cannot assume a role unless authorized. $ id -a uid=80(webservd) gid=80(webservd) $ roles No roles $ su - root Password: Roles can only be assumed by authorized users su: Sorry 27
28 User Rights Management (Rights) 28
29 User Rights Management Example #1 $ profiles -l Object Access Management: /usr/bin/chgrp /usr/bin/chmod [...] privs=file_chown privs=file_owner [...] $ ls -ld mnt drwxr-xr-x 2 gbrunett gbrunett 512 Nov 7 12:54 mnt 512 Nov 7 12:54 mnt $ chown bin:bin mnt chown: mnt: Not owner $ pfexec chown bin:bin mnt $ ls -ld mnt drwxr-xr-x 2 bin bin 29
30 User Rights Management Example #2 # svcprop -p httpd -p general apache2 general/enabled boolean false general/action_authorization astring sunw.apache.oper general/entity_stability astring Evolving httpd/ssl boolean false httpd/stability astring Evolving # auths weboper sunw.apache.oper # profiles -l weboper Apache Operator: /usr/sbin/svcadm /usr/bin/svcs 30
31 User Rights Management Example #3 $ svcs -o state,ctid,fmri apache2 STATE CTID FMRI online svc:/network/ $ svcadm restart apache2 $ svcs -o state,ctid,fmri apache2 STATE CTID FMRI online svc:/network/ $ ls ls: not found $ echo * local.cshrc local.login local.profile 31
32 Process Privileges Solaris kernel checks for privileges and not just UID == 0! Division of root authority into over 60 discrete privileges. Privileges can be granted to processes based on need. Privileges can be disabled or dropped when not needed. Child processes can have different (fewer) privileges than the parent. Completely backward compatible and extensible. No changes required to use existing code. Privilege bracketing helps to mitigate effects of future flaws. e.g., proc_fork and proc_exec e.g., proc_info 32
33 Process Privilege Sets E - Effective I - Inheritable set Privileges in effect Privileges of executed programs P - Permitted set L - Limit set Upper bound of E Upper bound for the process and all its descendants Effective Permitted Inheritable Limit 33
34 Process Privilege Inheritance Limit (L) is unchanged L is used to bound privileges in Inheritable (I) I' = I L Child's Permitted (P') & Effective (E') are: P' = E' = I' Typical process P = E = I = {basic} L = {all privileges} Since P = E = I, children run with same privileges 34
35 Process Privileges basic privileges file_link_any, proc_exec, proc_fork, proc_info, proc_session all privileges includes basic + over 60 administrative privileges dtrace_kernel, file_dac_write, net_privaddr, proc_priocntl, sys_net_config, etc. zone privileges the set of privileges available to a Solaris zone. Trusted Extensions privileges privileges specific for use when TX is enabled. 35
36 Root Account Still Special root owns all configuration/system files UID 0 is therefore still very powerful Privilege escalation prevention Require ALL privileges to modify objects owned by root when euid 0 Fine tuning in certain policy routines Not all privileges, only nosuid mounts Prefer services be non-uid 0 + privileges Additive approach is safer than UID 0 privileges 36
37 Using Process Privileges ppriv(1) # ppriv -e -D -s -proc_fork,-proc_exec /bin/sh -c finger sh[387]: missing privilege "proc_fork" (euid = 0, syscall = 143) needed at cfork+0x18 /bin/sh: permission denied User Rights Management (RBAC) # grep Network Management /etc/security/exec_attr Network Management:solaris:cmd:::/sbin/ifconfig:privs=sys_net_config Network Management:solaris:cmd:::/sbin/route:privs=sys_net_config Service Management Framework (SMF) # svcprop -p start rpc/bind grep privileges start/privileges astring basic,file_chown,file_chown_self,file_owner,net_privaddr, proc_setid,sys_nfs,net_bindmlp stop/limit_privileges astring :default Privilege Aware Commands / Services e.g., ping, rmformat, quota, rpcbind, nfsd, mountd 37
38 Process Privileges Example #1 $ ppriv $$ 28983: bash flags = <none E: basic I: basic P: basic L: all $ ppriv -l basic file_link_any proc_exec proc_fork proc_info proc_session $ ppriv -De cat /etc/shadow cat[3988]: missing privilege "file_dac_read" (euid = 101, syscall = 225) needed at ufs_iaccess+0xc9 cat: cannot open /etc/shadow $ ppriv -s -proc_fork,-proc_exec -De /bin/vi [attempt to run a command/escape to a shell] vi[4180]: missing privilege "proc_fork" (euid = 101, syscall = 143) needed at cfork+0x3b 38
39 Process Privileges Example #2 # ppriv -S `pgrep rpcbind` 933: /usr/sbin/rpcbind flags = PRIV_AWARE E: net_bindmlp,net_privaddr,proc_fork,sys_nfs I: none P: net_bindmlp,net_privaddr,proc_fork,sys_nfs L: none # ppriv -S `pgrep statd` 5139: /usr/lib/nfs/statd flags = PRIV_AWARE E: net_bindmlp,proc_fork I: none P: net_bindmlp,proc_fork L: none 39
40 Process Privileges Example #3 usr/src/lib/print/libpapi-lpd/common/lpd-port.c #ifdef PRIV_ALLSETS if ((priv_set(priv_on, PRIV_EFFECTIVE, PRIV_FILE_DAC_READ, PRIV_FILE_DAC_WRITE, NULL)) < 0) { syslog(log_err, "lpd_port:next_job_id:priv_set fails: : %m"); return (-1); } #else seteuid(0); #endif /* open the sequence file */ if (((fd = open(job_id_file, O_RDWR)) < 0) && (errno == ENOENT)) fd = open(job_id_file, O_CREAT O_EXCL O_RDWR, 0644); syslog(log_debug, "sequence file fd: %d", fd); #ifdef PRIV_ALLSETS /* drop file access privilege */ priv_set(priv_off, PRIV_PERMITTED, PRIV_FILE_DAC_READ, PRIV_FILE_DAC_WRITE, NULL); #else seteuid(getuid()); #endif 40
41 Process Privileges Example #3 usr/src/lib/print/libpapi-lpd/common/lpd-port.c #ifdef PRIV_ALLSETS if ((priv_set(priv_on, PRIV_EFFECTIVE, PRIV_FILE_DAC_READ, PRIV_FILE_DAC_WRITE, NULL)) < 0) { syslog(log_err, "lpd_port:next_job_id:priv_set fails: : %m"); return (-1); } #else seteuid(0); #endif Turn Required Privileges On /* open the sequence file */ if (((fd = open(job_id_file, O_RDWR)) < 0) && (errno == ENOENT)) fd = open(job_id_file, O_CREAT O_EXCL O_RDWR, 0644); syslog(log_debug, "sequence file fd: %d", fd); #ifdef PRIV_ALLSETS /* drop file access privilege */ priv_set(priv_off, PRIV_PERMITTED, PRIV_FILE_DAC_READ, PRIV_FILE_DAC_WRITE, NULL); #else seteuid(getuid()); #endif 41
42 Process Privileges Example #3 usr/src/lib/print/libpapi-lpd/common/lpd-port.c #ifdef PRIV_ALLSETS if ((priv_set(priv_on, PRIV_EFFECTIVE, PRIV_FILE_DAC_READ, PRIV_FILE_DAC_WRITE, NULL)) < 0) { syslog(log_err, "lpd_port:next_job_id:priv_set fails: : %m"); return (-1); } #else seteuid(0); #endif Turn Required Privileges On /* open the sequence file */ if (((fd = open(job_id_file, O_RDWR)) < 0) && (errno == ENOENT)) fd = open(job_id_file, O_CREAT O_EXCL O_RDWR, 0644); Perform the Privileged Operation(s) syslog(log_debug, "sequence file fd: %d", fd); #ifdef PRIV_ALLSETS /* drop file access privilege */ priv_set(priv_off, PRIV_PERMITTED, PRIV_FILE_DAC_READ, PRIV_FILE_DAC_WRITE, NULL); #else seteuid(getuid()); #endif 42
43 Process Privileges Example #3 usr/src/lib/print/libpapi-lpd/common/lpd-port.c #ifdef PRIV_ALLSETS if ((priv_set(priv_on, PRIV_EFFECTIVE, PRIV_FILE_DAC_READ, PRIV_FILE_DAC_WRITE, NULL)) < 0) { syslog(log_err, "lpd_port:next_job_id:priv_set fails: : %m"); return (-1); } #else seteuid(0); #endif Turn Required Privileges On /* open the sequence file */ if (((fd = open(job_id_file, O_RDWR)) < 0) && (errno == ENOENT)) fd = open(job_id_file, O_CREAT O_EXCL O_RDWR, 0644); Perform the Privileged Operation(s) syslog(log_debug, "sequence file fd: %d", fd); #ifdef PRIV_ALLSETS /* drop file access privilege */ priv_set(priv_off, PRIV_PERMITTED, PRIV_FILE_DAC_READ, PRIV_FILE_DAC_WRITE, NULL); #else seteuid(getuid()); #endif Turn Required Privileges Off 43
44 Process Privilege Debugging web_svc zone: # svcadm disable apache2 global zone: # privdebug -v -f -n httpd web_svc zone: # svcadm enable apache2 global zone: [output of privdebug command] STAT USED USED USED USED USED USED USED TIMESTAMP PPID PID PRIV net_privaddr proc_fork proc_fork proc_fork proc_fork proc_fork proc_fork CMD httpd httpd httpd httpd httpd httpd httpd privdebug is available from the OpenSolaris Security Community, 44
45 Zones Zones are virtualized application environments. No direct access to hardware. Zones have security boundaries around them. Zones have their own: root directory, naming service configuration, process containment, resource controls, devices, etc. Zones communicate via network only (default). shared vs. exclusive IP Zones operate with fewer privileges (default). some privileges can be added or removed 45
46 Why run services in Zones? Restricted Operations for Enhanced Security Individual Solaris OS hardening and RBAC configurations. Prohibited from directly accessing the kernel or raw memory. Prohibited from manipulating network interfaces and kernel modules. Enforcement with Integrity Configurable privileges, sparse root zones, IP Instances, IP Filter, etc. Resource Control and Management CPU, Memory, Disk, Networking, Devices, etc. Observability with Integrity BART, Solaris Auditing, etc. 46
47 Zones Security System Calls Permitted System Calls: chmod(2), chroot(2), chown(2), and setuid(2) Prohibited System Calls: memcntl(2), mknod(2), stime(2), and pset_create(2) Limited System Calls: kill(2) 47
48 Zones Security Devices /dev Permitted System Calls: chmod(2), chown(2), and chgrp(1) /dev Prohibited System Calls: rename(2), unlink(2), symlink(2), link(2), creat(2), and mknod(2) Forced nodevices mount option Prevents import of malicious device files from NFS and other foreign sources. Security audit performed on all drivers included in default zone configuration. 48
49 Zones Security Privileges Mandatory privileges Privileges required by a non-global zone. proc_fork, proc_exec, proc_mount,... Restricted privileges Privileges prohibited from use in a non-global zone. dtrace_kernel, sys_config, sys_net_config,... Optional privileges Privileges that can be added to a non-global zone. dtrace_user, proc_lock_memory, sys_time,... Other default privileges can be taken away! 49
50 Zones Example #1 # modload autofs Insufficient privileges to load a module # modunload -i 101 Insufficient privileges to unload a module # snoop snoop: No network interface devices found # mdb -k mdb: failed to open /dev/ksyms: No such file or directory # dtrace -l ID PROVIDER NAME MODULE FUNCTION # ppriv -D -e route add net default route[4676]: missing privilege "sys_net_config" (euid = 0, syscall = 4) needed at ip_rts_request+0x138 add net default: gateway : insufficient privileges 50
51 Zones Example #2 # mount -p / - / zfs - no rw,devices,setuid,exec,atime /dev - /dev lofs - no /lib - /lib lofs - no /platform - /platform lofs /sbin - /sbin lofs - no /usr - /usr lofs - no [...] zonedevfs ro,nodevices,nosub - no ro,nodevices,nosub ro,nodevices,nosub ro,nodevices,nosub # mv /usr/bin/login /usr/bin/login.foo mv: cannot rename /usr/bin/login to /usr/bin/login.foo: Read-only file system 51
52 Zones Example #3 # zonecfg -z myzone info limitpriv limitpriv: default,sys_time # zlogin myzone ppriv -l zone grep sys_time sys_time # zlogin myzone svcs -v ntp STATE NSTATE online svc:/network/ntp:default STIME CTID FMRI 10:17: # zlogin myzone ntpq -c peers remote refid st t when poll reach [...] ================================================[...] *blackhole u [...] # ssh blackhole date ; date ; zlogin myzone date Thu Jun 15 10:25:25 EDT 2006 Thu Jun 15 10:25:25 EDT 2006 Thu Jun 15 10:25:25 EDT
53 Virtualization / Compartmentalization Hard Partitions App Server Database Identity Server Virtual Machines File Server Web Server Mail Server OS Virtualization Calendar Server Database Web Server Resource Management SunRay Server Database App App Server OS Server Multiple OSs Single OS Trend to flexibility Dynamic System Domains Trend to isolation Logical Domains Xen VMware Microsoft Virtual Server Solaris Containers (Zones + SRM) Solaris Trusted Extensions Solaris Containers for Linux Applications Solaris Resource Manager (SRM) 53
54 ZFS Data Integrity Everything is copy on write Never overwrites live data On disk state is always valid No need to fsck(1m) Everything is transactional Related changes succeed or fail as a whole No need for journaling Everything is validated with a 256-bit checksum No silent data corruption No panics due to corrupted meta-data Bad data can be healed using mirrored copies 54
55 ZFS Data Security NFSv4 / NTFS-style Access Control Lists Granular access can be allowed/denied (w/inheritance) Authentication with Cryptographic Checksums Selectable 256-bit checksum algorithms, including SHA-256 Uber-checksum provides check for the entire ZFS pool File system Snapshots Read-only version of a file system at a specific point in time. File system Quotas and Reservations Set maximum (quota) or minimum (reservation) usage limits. 55
56 ZFS Example #1 $ touch testfile $ chmod 600 testfile $ chmod A+user:gmb:read_data:allow testfile $ ls -l testfile -rw gbrunett gbrunett 0 Nov 7 14:22 testfile $ ls -v testfile -rw gbrunett gbrunett 0 Nov 7 14:22 testfile 0:user:gmb:read_data:allow 1:owner@:execute:deny 2:owner@:read_data/write_data/append_data/write_xattr/ write_attributes/write_acl/write_owner:allow 3:group@:read_data/write_data/append_data/execute:deny 4:group@::allow 5:everyone@:read_data/write_data/append_data/write_xattr/ execute/write_attributes/write_acl/write_owner:deny 6:everyone@:read_xattr/read_attributes/read_acl/ synchronize:allow 56
57 ZFS Example #2 $ touch test-xattr $ runat test-xattr cp /etc/motd. $ runat test-xattr ls motd $ touch test-no-xattr $ chmod A+user:gbrunett:write_xattr:deny test-no-xattr $ runat test-no-xattr cp /etc/motd. runat: cannot open attribute directory for test-no-xattr: Permission denied 57
58 ZFS Example #3 $ profiles [...] ZFS File System Management [...] Basic Solaris User All $ pfexec zfs set quota=4g laptop/ws $ pfexec zfs list -o name,mountpoint,quota NAME MOUNTPOINT laptop /laptop laptop/briefcase /laptop/briefcase laptop/ws /laptop/ws QUOTA none none 4G 58
59 ZFS Delegation Grant or revoke specific rights to ZFS pools and volumes. create, destroy, clone, snapshot, mount, etc. Set specific properties on ZFS pools and volumes. mountpoint, sharenfs, compression, setuid, etc. Assignments can be made to both users and groups. assigned rights can optionally be granted to other users and groups. 59
60 ZFS Example #4 $ id uid=102(gmb) gid=102(gmb) $ zfs list -r pool/home/gmb NAME USED AVAIL pool/home/gmb 19.5K 25.9G REFER 19.5K MOUNTPOINT /pool/home/gmb $ zfs allow pool/home/gmb $ zfs snapshot pool/home/gmb@backup cannot create snapshot 'pool/home/gmb@backup': permission denied $ pfexec zfs allow gmb snapshot,mount pool/home/gmb $ zfs allow pool/home/gmb Local+Descendent permissions on (pool/home/gmb) user gmb mount,snapshot $ zfs snapshot pool/home/gmb@backup $ zfs list -r pool/home/gmb NAME USED AVAIL REFER MOUNTPOINT pool/home/gmb 19.5K 25.9G 19.5K /pool/home/gmb pool/home/gmb@backup K 60
61 Kerberos MIT Kerberos Code-base Refresh Kerberos Ticket / Credentials Auto-Renewal Kebreros LDAP Backend KDC Incremental Propagation kclient Auto-configuration Tool pam_krb5_migrate KDC Auto-population Tool TCP and IPv6 Support AES-128, AES-256, 3DES, RC4-HMAC Support SPNego GSS-API Dynamic Security Negotiation Bundled Remote Applications (Clients & Servers) telnet, ftp, rlogin, rsh, rcp, rdist, Secure Shell, Mozilla and Apache Public Kerberos Developer APIs 61
62 Secure Shell OpenSSH 3.6p2++ Refresh GSS-API Support Enhanced Password Aging Support Keyboard Break Sequence Support X11 Forwarding on by default RC4, AES CTR mode Encryption Support /etc/default/login Synchronization SSH2 Rekeying Server Side Keepalives 62
63 TCP Wrappers Supports both tcpd and libwrap and integrated with: ssh and sendmail (automatically) rpcbind (optionally) $ svcprop -p config rpc/bind grep wrappers config/enable_tcpwrappers boolean false inetd-services (optionally, globally or per-service) $ svcprop -p defaults inetd grep wrappers defaults/tcp_wrappers boolean false $ inetadm -l telnet grep wrappers default tcp_wrappers=false Configured using /etc/hosts.{allow, deny} and logs to syslog: Nov 10 15:18:03 blackhole sshd[17568]: [ID auth.warning] refused connect from
64 IP Filter Stateful and stateless packet inspection IPv4, IPv6 Kernel-based packet filtering Protocol proxies (TCP, UDP, FTP, rcmds, etc.) Transparent proxy support Text-based configuration Support for both NAT and PAT SYSLOG Logging Lightweight, small footprint, high performance 64
65 IP Filter Example pass out quick all keep state keep frags # Drop all NETBIOS traffic block in quick from any to block in quick from any to block in quick from any to # Allow pass in pass in pass in but any any any don't log it. port = 137 #netbios-ns port = 138 #netbios-dgm port = 139 #netbios-ssn incoming IKE/IPsec quick proto udp from any to any port = ike quick proto udp from any to any port = 4500 proto esp from any to any # Allow ping pass in quick proto icmp from any to any icmp-type echo # Allow routing info pass in quick proto udp from any to port = route pass in quick proto icmp from any to any icmp-type 9 # routeradvert pass in quick proto igmp from any to any # Block and log everything else that comes in block in log all block in from any to block in from any to /32 65
66 Cryptographic Framework Standards-based, pluggable framework Kernel support as well as user-land (PKCS#11) Supports administrative policies (e.g., FIPS 140 algorithms only) By default, supports major algorithms. Encryption : AES, ECC, Blowfish, RC4, DES, 3DES, RSA Digest : MD5, SHA-1, SHA-256, SHA-384, SHA-512 MAC : DES MAC, MD5 HMAC, SHA-1 HMAC, SHA-256 HMAC, SHA-384 HMAC, SHA-512 HMAC Optimized for both SPARC, Intel and AMD Framework supports pluggable hardware/software providers: e.g., UltraSPARC T1/T2 and the Sun CryptoAccelerator
67 Cryptographic Framework Commercial App PKCS 11 Open Source Web Server Sun Java Web Server Java VM Application OpenSSL NSS Java Enterprise System JCE Java Crypto. Extensions Consumer Interface (PKCS 11) Cryptographic Framework (DES, 3DES, AES, Blowfish, RSA, MD5, SHA_, RC4) Hardware Accelerator UltraSPARC T1 UltraSPARC T2 Your current cryptographic choices and any future technology can easily plug in and just work. Standards-based framework Same API, software or hardware Extensible for future technologies Provider Interface (PKCS 11) Sun Software Crypto. Plug-in Now the framework for cryptography is standardized and extensible. Hardware Crypto. Accelerator
68 T2/Solaris Cryptographic Architecture Access to T2 accelerators is controlled by Solaris CF Userland access is via PKCS#11 Simple to modify applications to use PKCS#11 (if not used already) Can interface via OpenSSL Offload from Java (JCE) Kernel modules communicate directly with the kernel crypto framework e.g. KSSL, IPsec 68
69 UltraSPARC T2 Processor Performance Competitive Cryptographic Performance Outperforms competing processors by up to 10X With significant core idle time that can be used for other processing Cipher 2.2GHz dual-core Opteron 2.7GHz quad-core Clovertown 1.4GHz UltraSPARC T2 RSA K Ops/sec 4.8 K Ops/sec 37.0K Ops/sec AES Gb/sec 4.2 Gb/s 44.0 Gb/sec Outperforms accelerator cards by a wide margin Cipher Sun SCA6000 Cavium Nitrox PX 1.4GHz UltraSPARC T2 RSA K Ops/sec 12K Ops/sec 37K Ops/sec AES Gb/sec 2.5Gb/sec 44Gb/sec On-chip accelerators are more versatile than off-chip solutions Cost effective to off-load even small packets with UltraSPARC T2 processor 69
70 Key Management Framework 70
71 Basic Audit and Reporting Tool File-level integrity validation tool: Evalutes: uid, gid, permissions/acls, contents, mtime, size, type, etc. Enables point-in-time comparison against a previous snapshot. # cat./rules /etc CHECK all # find /etc bart create -I newmanifest # bart compare -r./rules./oldmanifest./newmanifest /etc/user_attr: size control:28268 test:23520 acl control:user::rw-,group::rw-,mask:r-x,other:r-test:user::rw-,group::rw-,mask:r-x,other:rwcontents control:28dd3a3af2fcc103f422993de5b162f3 test:28893a3af2fcc103f422993de5b162f3 Sun BluePrint: Automating File Integrity Checks, 71
72 Solaris Fingerprint Database Searchable database of MD5 fingerprints for files included in Solaris, Trusted Solaris, and bundled software. # digest -v -a md5 /usr/lib/ssh/sshd md5 (/usr/lib/ssh/sshd) = b94b091a2d33dd4d6481dffa784ba632 [Process fingerprint using the Solaris Fingerprint DB] b94b091a2d33dd4d6481dffa784ba632 (/usr/lib/ssh/sshd) 1 match(es) * canonical-path: /usr/lib/ssh/sshd * package: SUNWsshdu * version: ,REV= * architecture: sparc * source: Solaris 10/SPARC 72
73 Solaris Audit Kernel auditing of system calls and administrative actions. Can record events happening in any zone (from the global zone). Can also delegate audit configuration to local zone administrators. Can capture complete command line and environment. Records original (audit) ID as well as current credentials. Audit trail can be formatted as text, XML, and/or delivered via syslog. Example: header,77,2,su,,tundra, :55: :00 subject,joe,joe,other,joe,other,2444, , marduk text,root return,failure,authentication failed Example adapted from the Sun BluePrint: Enforcing the Two-Person Rule Via Role-based Access Control in the Solaris 10 OS, 73
74 Trusted Solaris History Product Year Evaluation SunOS MLS SunOS CMW 1.0 Trusted Solaris 1.2 Trusted Solaris Trusted Solaris TCSEC Conformance (1985 Orange Book) ITSEC Certified for E3 / F-B1 ITSEC Certified for E3 / F-B1 ITSEC Certified for E3 / F-B1 Common Criteria Evaluated: CAPP, RBACPP, LSPP at EAL4+ Mandatory Access Control, Labeled Desktop, Labeled Printing, Labeled Networking, Labeled Filesystems, Device Allocation, etc. 74
75 Solaris Trusted Extensions A redesign of the Trusted Solaris product using a layered architecture. An extension of the Solaris 10 security foundation providing access control policies based on the sensitivity/label of objects. A set of label-aware services which implement multilevel security. 75
76 Extending Solaris 10 Security Features Process Rights Management (Privileges) Fine-grained privileges for X windows Rights management applied to desktop actions User Rights Management (RBAC) Labels and clearances Additional desktop policies Solaris Containers (Zones) Unique Sensitivity Labels Trusted (label-based) Networking 76
77 Trusted Extensions in a Nutshell Every object has a label associated with it. Files, windows, printers, devices, network packets, network interfaces, processes, etc. Accessing or sharing data is controlled by the relationships between the labels of different objects. 'Secret' objects can not see 'Top Secret' objects. 'Company Internal' can not send to 'Partner' networks. Administrators utilize Solaris Roles for duty separation. Installation, System Admin., Security Admin., etc. 77
78 What are Label-Aware Services? Services that are trusted to protect multi-level information according to predefined policy. Trusted Extensions label-aware service include: Labeled Desktops Labeled Printing Labeled Networking Labeled Filesystems Label Configuration and Translation System Management Tools Device Allocation 78
79 Labeled Desktop 79
80 Mandatory Access Control 80
81 Putting It All Together Solaris 10 Security A Secure Foundation for Success: Reduced Networking Meta Cluster Signed Binary Execution Secure Service Management User Rights Management Process Rights Management Resource Management Kerberos, SSH, IPsec Cryptographic Framework Containers / Zones IP Filter, TCP Wrappers Auditing, BART Trusted Extensions 81
82 But wait! There's more! Network Security Improvements Kernel SSL Proxy IPsec/IKE NAT Traversal RIPv2 Protocol Support Packet Filtering Hooks Randomized TCP/UDP Ephemeral Port Selection Auditing Improvements Audit Trail Noise Reduction Audit Event Reclassification New Mount Options noexec, nodevices 82
83 and more... vacation(1) Mail Filtering root GID is now 0 (root) not 1 (other) ip_respond_to_timestamp now 0. find(1) Support for ACLs death by rm safety OpenSSL libraries with a PKCS#11 engine Hardware RNG using Crypto Framework open(2) [O_NOFOLLOW], getpeerucred(3c), and many other developer enhancements... Off the Record plugin for pidgin (nee gaim) Sendmail support for TLS 83
84 and more... NFSv4 Support for GSS_API, ACLs, etc. Sendmail Support for rate limiting and milters, TLS, etc. BIND DNSSEC, Views, IPv6 Support Java 5 Security (1.5.0_14) Security tokens, better support for more security standards (SASL, OCSP, TSP), various crypto and GSS security enhancements, etc.... and the list keep right on going... 84
85 Actions... 1 Enjoy the benefits of Solaris 10 Security today! 2 Join the OpenSolaris Security Community! 3 Share your requirements, experiences, etc! 85
86 For More Information Sun Security Home OpenSolaris Security Community Sun Security Coordination Center & Sun Security BluePrints Sun Security Bloggers 86
87 Acknowledgements Special thanks to the following people who contributed to this presentation: Stephen Browne Casper Dik Shawn Emery Glenn Faden Darren Moffat Scott Rotondo Christoph Schuba Mark Thacker Gary Winiger 87
88 Solaris 10 Security Technical Deep Dive Glenn Brunette Sun Microsystems, Inc.
89 OpenSolaris: ZFS Crypto Operational goals are to support: software-only and hardware-accelerated environments as well as those requiring hardware key storage. secure delete via key destruction delegation of key management to individual zones restrict data sets to/from specific zones keep native ZFS copy on write semantics local hardware security module (HSM), trusted platform module (TPM), smart card or password or remote key manager 89
90 OpenSolaris: ZFS Crypto Current design decisions: Encryption policy will be set at the ZFS data set level. Allows zones to have different keys/algorithms Defined/set at data set creation time Support for encrypted zvols Encrypted raw storage (for databases, etc.) Other design considerations: Support for encrypted root filesystems Support for encrypted ZFS send/receive 90
91 OpenSolaris: ZFS Crypto Integrity protection of both data and meta-data Fletcher and SHA-256 Confidentiality of both data and filesystem meta-data AES-128, AES-192, AES-256 Modes: CBC (Prototype), CCM/GCM (Production) No direct use of asymmetric cryptography 91
92 OpenSolaris: ZFS Crypto What is Encrypted? YES: All application and zvol data POSIX layer data (e.g., permissions, owner, etc.) Directory structure ZFS clones and snapshots NO: ZFS pool meta-data (e.g., disks, mount times, raid, etc.) Data set names and properties 92
93 OpenSolaris: ZFS Crypto Current Status Phase 1 of 4 in progress Per data set policy for enabling encryption, including algorithm and key length. Per data set keys wrapped by single per pool key Pool key from passphrase using PKCS#5 PBE Pool key stored in PKCS#11 token Design review completed Scheduled for 11/2007 code integration into OpenSolaris More details at: 93
Practical Solaris 10 Security Glenn Brunette
Practical Solaris 10 Security Glenn Brunette Distinguished Engineer Sun Microsystems, Inc. Agenda Attacker Goals Attack Scenario Background Attack Defense Scenario Attack Detection Scenario Copyright 2006
Oracle Solaris Security: Mitigate Risk by Isolating Users, Applications, and Data
Oracle Solaris Security: Mitigate Risk by Isolating Users, Applications, and Data Will Fiveash presenter, Darren Moffat author Staff Engineer Solaris Kerberos Development Safe Harbor Statement The following
SOLARIS 10 SECURITY. Technical Overview. Andreas Neuhold Systems Practice Lead Austria Sun Microsystems, GesmbH
SOLARIS 10 SECURITY Technical Overview Andreas Neuhold Systems Practice Lead Austria Sun Microsystems, GesmbH Solaris 10 Lizenzen Millions ~ 7M ZFS 7,0 6,5 6,0 5,5 Solaris Container 5,0 4,5 4,0 3,5 3,0
Solaris For The Modern Data Center. Taking Advantage of Solaris 11 Features
Solaris For The Modern Data Center Taking Advantage of Solaris 11 Features JANUARY 2013 Contents Introduction... 2 Patching and Maintenance... 2 IPS Packages... 2 Boot Environments... 2 Fast Reboot...
McAfee Firewall Enterprise 8.2.1
Configuration Guide FIPS 140 2 Revision A McAfee Firewall Enterprise 8.2.1 The McAfee Firewall Enterprise FIPS 140 2 Configuration Guide, version 8.2.1, provides instructions for setting up McAfee Firewall
McAfee Firewall Enterprise 8.3.1
Configuration Guide Revision A McAfee Firewall Enterprise 8.3.1 FIPS 140-2 The McAfee Firewall Enterprise FIPS 140-2 Configuration Guide, version 8.3.1, provides instructions for setting up McAfee Firewall
IP Filter Host Based Firewall Using the Firewall Framework Author: Tim Wort
IP Filter Host Based Firewall Using the Firewall Framework Author: Tim Wort This paper explores configuring the IP Filter SMF service to use the Firewall Framework to build a Host Based Firewall. The IP
REDUCE RISK WITH ORACLE SOLARIS 11
REDUCE RISK WITH ORACLE SOLARIS 11 MITIGATE RISKS WITH INTELLIGENT SECURITY CONTROLS KEY FEATURES Security in Silicon: Hardware-integrated cryptographic acceleration to protect both data and network. Reduce
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
Using BroadSAFE TM Technology 07/18/05
Using BroadSAFE TM Technology 07/18/05 Layers of a Security System Security System Data Encryption Key Negotiation Authentication Identity Root Key Once root is compromised, all subsequent layers of security
Развертывание сервера приложений Oracle GlassFish Server на OpenSolaris: мониторинг, подготовка к работе и резервное копирование
Развертывание сервера приложений Oracle GlassFish Server на OpenSolaris: мониторинг, подготовка к работе и резервное копирование Филипп Торчинский Sun Microsystems 1 Agenda Introduction What is OpenSolaris,
Security Configuration Guide P/N 300-010-493 Rev A05
EMC VPLEX Security Configuration Guide P/N 300-010-493 Rev A05 June 7, 2011 This guide provides an overview of VPLEX security configuration settings, including secure deployment and usage settings needed
Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment
White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based
Configuring Security Features of Session Recording
Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording
Linux Operating System Security
Linux Operating System Security Kenneth Ingham and Anil Somayaji September 29, 2009 1 Course overview This class is for students who want to learn how to configure systems to be secure, test the security
An Oracle White Paper August 2010. Using Oracle Solaris 10 to Overcome Security Challenges
An Oracle White Paper August 2010 Using Oracle Solaris 10 to Overcome Security Challenges Introduction... 1 Security Features in Oracle Solaris 10... 2 Reduce and Securely Delegate Privileges... 2 Network
GL254 - RED HAT ENTERPRISE LINUX SYSTEMS ADMINISTRATION III
QWERTYUIOP{ GL254 - RED HAT ENTERPRISE LINUX SYSTEMS ADMINISTRATION III This GL254 course is designed to follow an identical set of topics as the Red Hat RH254, RH255 RHCE exam prep courses with the added
SonicWALL PCI 1.1 Implementation Guide
Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard
Proof of Concept Guide
Proof of Concept Guide Version 4.0 Published: OCT-2013 Updated: 2005-2013 Propalms Ltd. All rights reserved. The information contained in this document represents the current view of Propalms Ltd. on the
Did you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of
BorderWare Firewall Server 7.1. Release Notes
BorderWare Firewall Server 7.1 Release Notes BorderWare Technologies is pleased to announce the release of version 7.1 of the BorderWare Firewall Server. This release includes following new features and
vcloud Director User's Guide
vcloud Director 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of
Authentication in a Heterogeneous Environment
Authentication in a Heterogeneous Environment Integrating Linux (and UNIX and Mac) Identity Management in Microsoft Active Directory Mike Patnode VP of Technology Centrify Corporation [email protected]
Enabling SSL and Client Certificates on the SAP J2EE Engine
Enabling SSL and Client Certificates on the SAP J2EE Engine Angel Dichev RIG, SAP Labs SAP AG 1 Learning Objectives As a result of this session, you will be able to: Understand the different SAP J2EE Engine
Cedric Rajendran VMware, Inc. Security Hardening vsphere 5.5
Cedric Rajendran VMware, Inc. Security Hardening vsphere 5.5 Agenda Security Hardening vsphere 5.5 ESXi Architectural Review ESXi Software Packaging The ESXi Firewall ESXi Local User Security Host Logs
GL-550: Red Hat Linux Security Administration. Course Outline. Course Length: 5 days
GL-550: Red Hat Linux Security Administration Course Length: 5 days Course Description: This highly technical course focuses on properly securing machines running the Linux operating systems. A broad range
A Guide to New Features in Propalms OneGate 4.0
A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously
SoftNAS Application Guide: In-Flight Encryption 12/7/2015 SOFTNAS LLC
SoftNAS Application Guide: In-Flight Encryption 12/7/2015 SOFTNAS LLC SoftNAS Application Guide: In-Flight Encryption Contents Introduction to In-Flight Data Encryption... 2 CIFS Encryption In-Flight...
Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.
Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0 Accellion, Inc. December 24, 2009 Copyright Accellion, Inc. 2009. May be reproduced only in its original entirety
SSL Tunnels. Introduction
SSL Tunnels Introduction As you probably know, SSL protects data communications by encrypting all data exchanged between a client and a server using cryptographic algorithms. This makes it very difficult,
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Unit objectives IBM Power Systems
User-level security Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 9.0 Unit objectives After completing this unit, you should be able to: Describe
ENTERPRISE LINUX SECURITY ADMINISTRATION
ENTERPRISE LINUX SECURITY ADMINISTRATION This highly technical course focuses on properly securing machines running the Linux operating systems. A broad range of general security techniques such as packet
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
Syncplicity On-Premise Storage Connector
Syncplicity On-Premise Storage Connector Implementation Guide Abstract This document explains how to install and configure the Syncplicity On-Premise Storage Connector. In addition, it also describes how
Executive Summary and Purpose
ver,1.0 Hardening and Securing Opengear Devices Copyright Opengear Inc. 2013. All Rights Reserved. Information in this document is subject to change without notice and does not represent a commitment on
vsphere Security ESXi 5.5 vcenter Server 5.5 EN-001164-04
ESXi 5.5 vcenter Server 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions
MCSE 2003. Core exams (Networking) One Client OS Exam. Core Exams (6 Exams Required)
MCSE 2003 Microsoft Certified Systems Engineer (MCSE) candidates on the Microsoft Windows Server 2003 track are required to satisfy the following requirements: Core Exams (6 Exams Required) Four networking
MySQL Security: Best Practices
MySQL Security: Best Practices Sastry Vedantam [email protected] Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
Acano solution. Security Considerations. August 2015 76-1026-01-E
Acano solution Security Considerations August 2015 76-1026-01-E Contents Contents 1 Introduction... 3 2 Acano Secure Development Lifecycle... 3 3 Acano Security Points... 4 Acano solution: Security Consideration
How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)
Security principles Firewalls and NAT These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Host vs Network
System Security Fundamentals
System Security Fundamentals Alessandro Barenghi Dipartimento di Elettronica, Informazione e Bioingegneria Politecnico di Milano alessandro.barenghi - at - polimi.it April 28, 2015 Lesson contents Overview
TABLE OF CONTENTS NETWORK SECURITY 2...1
Network Security 2 This document is the exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors
Oracle Solaris: Aktueller Stand und Ausblick
Oracle Solaris: Aktueller Stand und Ausblick Detlef Drewanz Principal Sales Consultant, EMEA Server Presales The following is intended to outline our general product direction. It
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 24 Windows and Windows Vista Security First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Windows and Windows Vista Security
Guidance Regarding Skype and Other P2P VoIP Solutions
Guidance Regarding Skype and Other P2P VoIP Solutions Ver. 1.1 June 2012 Guidance Regarding Skype and Other P2P VoIP Solutions Scope This paper relates to the use of peer-to-peer (P2P) VoIP protocols,
Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, 2015. Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik
Network Security Chapter 3 Cornelius Diekmann Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik Version: October 21, 2015 IN2101, WS 15/16, Network Security 1 Security Policies and
SecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the
How To Set Up A Network Map In Linux On A Ubuntu 2.5 (Amd64) On A Raspberry Mobi) On An Ubuntu 3.5.2 (Amd66) On Ubuntu 4.5 On A Windows Box
CSC-NETLAB Packet filtering with Iptables Group Nr Name1 Name2 Name3 Date Instructor s Signature Table of Contents 1 Goals...2 2 Introduction...3 3 Getting started...3 4 Connecting to the virtual hosts...3
ANNEXURE TO TENDER NO. MRPU/IGCAR/COMP/5239
ANNEXURE TO TENDER NO. MRPU/IGCAR/COMP/5239 Check Point Firewall Software and Management Software I. Description of the Item Up gradation, installation and commissioning of Checkpoint security gateway
GL550 - Enterprise Linux Security Administration
GL550 - Enterprise Linux Security Administration This highly technical course focuses on properly securing machines running the Linux operating systems. A broad range of general security techniques such
COURCE TITLE DURATION LPI-202 Advanced Linux Professional Institute 40 H.
COURCE TITLE DURATION LPI-202 Advanced Linux Professional Institute 40 H. IMPLEMENTING A WEB SERVER Apache Architecture Installing PHP Apache Configuration Files httpd.conf Server Settings httpd.conf Main
ENTERPRISE LINUX SECURITY ADMINISTRATION
ENTERPRISE LINUX SECURITY ADMINISTRATION COURSE DESCRIPTION: This highly technical course focuses on properly securing machines running the Linux operating systems. A broad range of general security techniques
Ensure that the server where you install the Primary Server software meets the following requirements: Item Requirements Additional Details
ZENworks 11 SP3 System December 2014 The following sections provide the Novell ZENworks 11 SP3 requirements for hardware and software: Section 1, Primary Server, on page 1 Section 2, Managed Device, on
Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300
Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300 This example explains how to configure pre-shared key based simple IPSec tunnel between NetScreen Remote Client and RN300 VPN Gateway.
CrashPlan Security SECURITY CONTEXT TECHNOLOGY
TECHNICAL SPECIFICATIONS CrashPlan Security CrashPlan is a continuous, multi-destination solution engineered to back up mission-critical data whenever and wherever it is created. Because mobile laptops
Network Security. Lecture 3
Network Security Lecture 3 Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Security protocols application transport network datalink physical Contents IPSec overview
Alliance Key Manager Solution Brief
Alliance Key Manager Solution Brief KEY MANAGEMENT Enterprise Encryption Key Management On the road to protecting sensitive data assets, data encryption remains one of the most difficult goals. A major
v7.8.2 Release Notes for Websense Content Gateway
v7.8.2 Release Notes for Websense Content Gateway Topic 60086 Web Security Gateway and Gateway Anywhere 12-Mar-2014 These Release Notes are an introduction to Websense Content Gateway version 7.8.2. New
Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2
BlackBerry Enterprise Service 10 BlackBerry Device Service Solution Version: 10.2 Security Technical Overview Published: 2014-09-10 SWD-20140908123239883 Contents 1 About BlackBerry Device Service solution
CimTrak Integrity & Compliance Suite 2.0.6.19
CimTrak Integrity & Compliance Suite 2.0.6.19 Master Repository Management Console App Server File System Agent Network Device Agent Command Line Utility Ping Utility Proxy Utility FTP Repository Interface
Linux Security Ideas and Tips
Linux Security Ideas and Tips Hugh Brown Sr. Systems Administrator ITS Enterprise Infrastructure University of Iowa October 8, 2014 Hugh Brown (University of Iowa) Linux Security Ideas and Tips October
SSL... 2 2.1. 3 2.2. 2.2.1. 2.2.2. SSL VPN
1. Introduction... 2 2. Remote Access via SSL... 2 2.1. Configuration of the Astaro Security Gateway... 3 2.2. Configuration of the Remote Client...10 2.2.1. Astaro User Portal: Getting Software and Certificates...10
Nortel Networks, Inc. VPN Client Software (Software Version: 7_11.101) FIPS 140-2 Non-Proprietary Security Policy
Nortel Networks, Inc. VPN Client Software (Software Version: 7_11.101) FIPS 140-2 Non-Proprietary Security Policy Level 1 Validation Document Version 0.5 Prepared for: Prepared by: Nortel Networks, Inc.
Complying with PCI Data Security
Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring
CIS 551 / TCOM 401 Computer and Network Security
CIS 551 / TCOM 401 Computer and Network Security Spring 2007 Lecture 3 1/18/07 CIS/TCOM 551 1 Announcements Email project groups to Jeff (vaughan2 AT seas.upenn.edu) by Jan. 25 Start your projects early!
Casper Suite. Security Overview
Casper Suite Security Overview JAMF Software, LLC 2015 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF Software 301 4th Ave S Suite
Network Management Card Security Implementation
[ APPLICATION NOTE #67 ] OFFER AT A GLANCE Offers Involved Network Management Card, APC Security Wizard Applications Configuration and monitoring of network managed devices Broad Customer Problem Secure
Managing Software and Configurations
55 CHAPTER This chapter describes how to manage the ASASM software and configurations and includes the following sections: Saving the Running Configuration to a TFTP Server, page 55-1 Managing Files, page
Best Practices on monitoring Solaris Global/Local Zones using IBM Tivoli Monitoring
Best Practices on monitoring Solaris Global/Local Zones using IBM Tivoli Monitoring Document version 1.0 Gianluca Della Corte, IBM Tivoli Monitoring software engineer Antonio Sgro, IBM Tivoli Monitoring
Secure Network Filesystem (Secure NFS) By Travis Zigler
Secure Network Filesystem (Secure NFS) By Travis Zigler Overview of Secure NFS Problems with NFS Security of Basic NFS Configurations Securing NFS with SSH Tutorial Securing NFS with SSL Overview Conclusions
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
FIPS 140-2 Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0
FIPS 40-2 Non- Proprietary Security Policy McAfee SIEM Cryptographic Module, Version.0 Document Version.4 December 2, 203 Document Version.4 McAfee Page of 6 Prepared For: Prepared By: McAfee, Inc. 282
Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.
Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet
Secure Compute Research Environment Data Security Plan (DSP)
Secure Compute Research Environment (DSP) Overview The Secure Compute Research Environment (SCRE) is a private, secured virtual environment designed for researchers to securely store, access and analyze
TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control
TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control Version 3.4, Last Edited 9/10/2011 Students Name: Date of Experiment: Read the following guidelines before working in
Virtual Private Networks
Virtual Private Networks Jonathan Reed [email protected] MIT IS&T VPN Release Team Overview Basic Networking Terms General Concepts How the VPN works Why it s useful What to watch out for Q&A Networking 101
FreeIPA 3.3 Trust features
FreeIPA 3.3 features Sumit Bose, Alexander Bokovoy March 2014 FreeIPA and Active Directory FreeIPA and Active Directory both provide identity management solutions on top of the Kerberos infrastructure
Release Notes. NCP Secure Entry Mac Client. Major Release 2.01 Build 47 May 2011. 1. New Features and Enhancements. Tip of the Day
NCP Secure Entry Mac Client Major Release 2.01 Build 47 May 2011 1. New Features and Enhancements Tip of the Day A Tip of the Day field for configuration tips and application examples is incorporated in
FIPS 140-2 Non-Proprietary Security Policy. IBM Internet Security Systems SiteProtector Cryptographic Module (Version 1.0)
FIPS 140-2 Non-Proprietary Security Policy IBM Internet Security Systems SiteProtector Document Version 2.3 August 5, 2010 Document Version 2.3 IBM Internet Security Systems Page 1 of 24 Prepared For:
Securing sensitive data at Rest ProtectFile, ProtectDb and ProtectV. Nadav Elkabets Presale Consultant
Securing sensitive data at Rest ProtectFile, ProtectDb and ProtectV Nadav Elkabets Presale Consultant Protecting Your Data Encrypt Your Data 1 ProtectFile StorageSecure ProtectDB ProtectV Databases File
Ahsay Replication Server v5.5. Administrator s Guide. Ahsay TM Online Backup - Development Department
Ahsay Replication Server v5.5 Administrator s Guide Ahsay TM Online Backup - Development Department October 9, 2009 Copyright Notice Ahsay Systems Corporation Limited 2008. All rights reserved. Author:
Security Guide for ActiveRoles Server 6.1
Security Guide for ActiveRoles Server 6.1 Written by Einar Mykletun, Ph.D Security and Compliance Architect Quest Software, Inc. Technical Brief 2009 Quest Software, Inc. ALL RIGHTS RESERVED. This document
owncloud Architecture Overview
owncloud Architecture Overview owncloud, Inc. 57 Bedford Street, Suite 102 Lexington, MA 02420 United States phone: +1 (877) 394-2030 www.owncloud.com/contact owncloud GmbH Schloßäckerstraße 26a 90443
FISMA / NIST 800-53 REVISION 3 COMPLIANCE
Mandated by the Federal Information Security Management Act (FISMA) of 2002, the National Institute of Standards and Technology (NIST) created special publication 800-53 to provide guidelines on security
Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client
Astaro Security Gateway V8 Remote Access via SSL Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If you are not
Firewalls. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49. Firewall Design Principles
Firewalls Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49 1 Firewall Design Principles Firewall Characteristics Types of Firewalls Firewall Configurations
NETASQ MIGRATING FROM V8 TO V9
UTM Firewall version 9 NETASQ MIGRATING FROM V8 TO V9 Document version: 1.1 Reference: naentno_migration-v8-to-v9 INTRODUCTION 3 Upgrading on a production site... 3 Compatibility... 3 Requirements... 4
