Skip Navigation Links | |
Exit Print View | |
Trusted Extensions Configuration and Administration Oracle Solaris 11.1 Information Library |
Part I Initial Configuration of Trusted Extensions
1. Security Planning for Trusted Extensions
2. Configuration Roadmap for Trusted Extensions
3. Adding the Trusted Extensions Feature to Oracle Solaris (Tasks)
4. Configuring Trusted Extensions (Tasks)
Setting Up the Global Zone in Trusted Extensions
How to Check and Install Your Label Encodings File
How to Configure an IPv6 CIPSO Network in Trusted Extensions
How to Configure a Different Domain of Interpretation
How to Create a Default Trusted Extensions System
How to Create Labeled Zones Interactively
How to Assign Labels to Two Zone Workspaces
Configuring the Network Interfaces in Trusted Extensions
How to Share a Single IP Address With All Zones
How to Add an IP Instance to a Labeled Zone
How to Add a Virtual Network Interface to a Labeled Zone
How to Connect a Trusted Extensions System to Other Trusted Extensions Systems
How to Configure a Separate Name Service for Each Labeled Zone
Creating Roles and Users in Trusted Extensions
How to Create the Security Administrator Role in Trusted Extensions
How to Create a System Administrator Role
How to Create Users Who Can Assume Roles in Trusted Extensions
How to Verify That the Trusted Extensions Roles Work
How to Enable Users to Log In to a Labeled Zone
Creating Centralized Home Directories in Trusted Extensions
How to Create the Home Directory Server in Trusted Extensions
Troubleshooting Your Trusted Extensions Configuration
How to Move Desktop Panels to the Bottom of the Screen
Additional Trusted Extensions Configuration Tasks
How to Create a Secondary Labeled Zone
How to Create and Share a Multilevel Dataset
How to Copy Files to Portable Media in Trusted Extensions
5. Configuring LDAP for Trusted Extensions (Tasks)
Part II Administration of Trusted Extensions
6. Trusted Extensions Administration Concepts
7. Trusted Extensions Administration Tools
8. Security Requirements on a Trusted Extensions System (Overview)
9. Performing Common Tasks in Trusted Extensions
10. Users, Rights, and Roles in Trusted Extensions (Overview)
11. Managing Users, Rights, and Roles in Trusted Extensions (Tasks)
12. Remote Administration in Trusted Extensions (Tasks)
13. Managing Zones in Trusted Extensions
14. Managing and Mounting Files in Trusted Extensions
15. Trusted Networking (Overview)
16. Managing Networks in Trusted Extensions (Tasks)
17. Trusted Extensions and LDAP (Overview)
18. Multilevel Mail in Trusted Extensions (Overview)
19. Managing Labeled Printing (Tasks)
20. Devices in Trusted Extensions (Overview)
21. Managing Devices for Trusted Extensions (Tasks)
22. Trusted Extensions Auditing (Overview)
23. Software Management in Trusted Extensions
Creating and Managing a Security Policy
Site Security Policy and Trusted Extensions
Computer Security Recommendations
Physical Security Recommendations
Personnel Security Recommendations
Additional Security References
B. Configuration Checklist for Trusted Extensions
Checklist for Configuring Trusted Extensions
C. Quick Reference to Trusted Extensions Administration
Administrative Interfaces in Trusted Extensions
Oracle Solaris Interfaces Extended by Trusted Extensions
Tighter Security Defaults in Trusted Extensions
Limited Options in Trusted Extensions
D. List of Trusted Extensions Man Pages
Trusted Extensions Man Pages in Alphabetical Order
Oracle Solaris Man Pages That Are Modified by Trusted Extensions
The following tasks can be helpful in configuring a Trusted Extensions system to your requirements. The final task enables you to remove the Trusted Extensions feature from an Oracle Solaris system.
|
Secondary labeled zones are useful for isolating services in different zones, yet allowing the services to run at the same label. For more information, see Primary and Secondary Labeled Zones.
Before You Begin
The primary zone must exist. The secondary zone must have an exclusive IP address and cannot require a desktop.
You must be in the root role in the global zone.
You can use the command line or the Labeled Zone GUI, txzonemgr.
# tncfg -z secondary-label-service primary=no # tncfg -z secondary-label-service label=public
# txzonemgr &
Navigate to Create a new zone, and follow the prompts.
Note - The netmask must be entered in prefix form. For example, the 255.255.254.0 netmask requires a prefix of 23.
# tncfg -z zone info primary primary=no
Example 4-6 Creating a Zone for Public Scripts
In this example, the administrator isolates a public zone that is designed to run scripts and batch jobs.
# tncfg -z public-scripts primary=no # tncfg -z public-scripts label=public
Multilevel datasets are useful containers when you downgrade or upgrade information. For more information, see Multilevel Datasets for Relabeling Files. Multilevel datasets are also useful for multilevel NFS file servers to provide files at many labels to a number of NFS clients.
Before You Begin
To create a multilevel dataset, you must be in the root role in the global zone.
# zfs create -o mountpoint=/multi -o multilevel=on rpool/multi
rpool/multi is a multilevel dataset that is mounted in the global zone at /multi.
To limit the upper label range of the dataset, see Example 4-7.
# getlabel /multi /multi: ADMIN_LOW
Set the following ZFS properties to off for all file systems in the pool:
# zfs set devices=off rpool/multi # zfs set exec=off rpool/multi # zfs set setuid=off rpool/multi
Typically, compression is set in ZFS at the file system level. However, because all the file systems in this pool are data files, compression is set at the top-level dataset for the pool.
# zfs set compression=on rpool/multi
# cd /multi # mkdir public internal # chmod 777 public internal # setlabel PUBLIC public # setlabel "CNF : INTERNAL" internal
For example, the following series of zonecfg commands mounts the dataset in the public zone.
# zonecfg -z public zonecfg:public> add fs zonecfg:public:fs> set dir=/multi zonecfg:public:fs> set special=/multi zonecfg:public:fs> set type=lofs zonecfg:public:fs> end zonecfg:public> exit
Multilevel datasets permit writing files at the same label as the mounting zone and reading lower-level files. The label of the mounted files can be viewed and set.
# tncfg -z global add mlp_private=2049/tcp # tncfg -z global add mlp_private=111/udp # tncfg -z global add mlp_private=111/tcp
# svcadm restart nfs/server
# share /multi
NFS-mounted multilevel datasets permit writing files at the same label as the mounting zone and reading lower-level files. The label of the mounted files cannot be viewed reliably or set. For more information, see Mounting Multilevel Datasets From Another System.
Example 4-7 Creating a Multilevel Dataset With a Highest Label Below ADMIN_HIGH
In this example, the administrator creates a multilevel dataset with a upper bound, or highest label, that is lower than the default, ADMIN_HIGH. At dataset creation, the administrator specifies the upper label bound in the mslabel property. This upper bound prevents global zone processes from creating any files or directories in the multilevel dataset. Only labeled zone processes can create directories and files in the dataset. Because the multilevel property is on, the mlslabel property sets the upper bound, not the label for a single-label dataset.
# zfs create -o mountpoint=/multiIUO -o multilevel=on \ -o mlslabel="CNF : INTERNAL" rpool/multiIUO
Then, the administrator logs in to each labeled zone to create a directory at that label in the mounted dataset.
# zlogin public # mkdir /multiIUO # chmod 777 /multiIUO # zlogin internal # mkdir /multiIUO # chmod 777 /multiIUO
The multilevel datasets are visible at the label of the mounting zone to authorized users after the zone is rebooted.
Next Steps
To enable users to relabel files, see How to Enable Files to Be Relabeled From a Labeled Zone.
For instructions about relabeling files, see How to Upgrade Data in a Multilevel Dataset in Trusted Extensions User’s Guide and How to Downgrade Data in a Multilevel Dataset in Trusted Extensions User’s Guide.
When copying to portable media, label the media with the sensitivity label of the information.
Note - During Trusted Extensions configuration, the root role might use portable media to transfer the label_encodings files to all systems. Label the media with Trusted Path.
Before You Begin
To copy administrative files, you must be in the root role in the global zone.
Use the Device Manager, and insert clean media. For details, see How to Allocate a Device in Trusted Extensions in Trusted Extensions User’s Guide.
The File Browser displays the contents of the clean media.
For details, see How to Deallocate a Device in Trusted Extensions in Trusted Extensions User’s Guide.
Note - Remember to physically affix a label to the media with the sensitivity label of the copied files.
Example 4-8 Keeping Configuration Files Identical on All Systems
The system administrator wants to ensure that every system is configured with the same settings. So, on the first system that is configured, the administrator creates a directory that cannot be deleted between reboots. In that directory, the administrator places the files that must be identical or very similar on all systems.
For example, the administrator modifies the policy.conf file, and the default login and passwd files for this site. So, the administrator copies the following files to the permanent directory.
# mkdir /export/commonfiles # cp /etc/security/policy.conf \ # cp /etc/default/login \ # cp /etc/default/passwd \ # cp /etc/security/tsol/label_encodings \ /export/commonfiles
The administrator uses the Device Manager to allocate a CD-ROM in the global zone, transfers the files to the CD, and affixes a Trusted Path label.
It is safe practice to rename the original Trusted Extensions file before replacing the file. When configuring a system, the root role renames and copies administrative files.
Before You Begin
To copy administrative files, you must be in the root role in the global zone.
For details, see How to Allocate a Device in Trusted Extensions in Trusted Extensions User’s Guide.
The File Browser displays the contents.
For example, add .orig to the end of the original file:
# cp /etc/security/tsol/label_encodings /etc/security/tsol/label_encodings.orig
For details, see How to Deallocate a Device in Trusted Extensions in Trusted Extensions User’s Guide.
You must perform specific steps to remove the Trusted Extensions feature from an Oracle Solaris system.
Before You Begin
You are in the root role in the global zone.
For portable media, affix a physical sticker with the sensitivity label of the zone to each archived zone.
For details, see How to Remove a Non-Global Zone in Oracle Solaris Administration: Oracle Solaris Zones, Oracle Solaris 10 Zones, and Resource Management.
# svcadm disable labeld
Various services might need to be configured for your Oracle Solaris system. Possibilities include basic networking, naming services, and file system mounts.