14
Cyber Security Review, April 23-24, 2002, 1 Operated by the Southeastern Universities Research Association for the U.S. Depart. Of Energy Thomas Jefferson National Accelerator Facility Cfengine @ JLab David J. Bianco [email protected]

Cyber Security Review, April 23-24, 2002, 0 Operated by the Southeastern Universities Research Association for the U.S. Depart. Of Energy Thomas Jefferson

Embed Size (px)

Citation preview

Page 1: Cyber Security Review, April 23-24, 2002, 0 Operated by the Southeastern Universities Research Association for the U.S. Depart. Of Energy Thomas Jefferson

Cyber Security Review, April 23-24, 2002, 1

Operated by the Southeastern Universities Research Association for the U.S. Depart. Of Energy

Thomas Jefferson National Accelerator Facility

Cfengine @ JLab

David J. Bianco

[email protected]

Page 2: Cyber Security Review, April 23-24, 2002, 0 Operated by the Southeastern Universities Research Association for the U.S. Depart. Of Energy Thomas Jefferson

Cyber Security Review, April 23-24, 2002, 2

Operated by the Southeastern Universities Research Association for the U.S. Depart. Of Energy

Thomas Jefferson National Accelerator Facility

Table of Contents

• Introduction• JLab’s Environment• What is cfengine?• JLab’s cfengine architecture• JLab templates• Summary• Questions

Page 3: Cyber Security Review, April 23-24, 2002, 0 Operated by the Southeastern Universities Research Association for the U.S. Depart. Of Energy Thomas Jefferson

Cyber Security Review, April 23-24, 2002, 3

Operated by the Southeastern Universities Research Association for the U.S. Depart. Of Energy

Thomas Jefferson National Accelerator Facility

JLab’s Unix Environment

• ~90 central computing Unix servers (Linux, Solaris, HP)• General computing resources, web, email, etc.

• ~50 CAD nodes (HP)• ~185 compute farm nodes (Linux)• A large number of user-managed Unix workstations

(mostly Linux)

Page 4: Cyber Security Review, April 23-24, 2002, 0 Operated by the Southeastern Universities Research Association for the U.S. Depart. Of Energy Thomas Jefferson

Cyber Security Review, April 23-24, 2002, 4

Operated by the Southeastern Universities Research Association for the U.S. Depart. Of Energy

Thomas Jefferson National Accelerator Facility

JLab’s Unix Environment

• The lab’s Unix admin staff is just 6 people.• Changes are made to these machines all the time• As with any environment, proper communication & documentation

can be a problem• Once a problem is fixed… will it remain fixed?• Several recent incidents have underscored the need for proper

configuration management• In January 2002, JLab started looking into cfengine to help solve

these problems

Page 5: Cyber Security Review, April 23-24, 2002, 0 Operated by the Southeastern Universities Research Association for the U.S. Depart. Of Energy Thomas Jefferson

Cyber Security Review, April 23-24, 2002, 5

Operated by the Southeastern Universities Research Association for the U.S. Depart. Of Energy

Thomas Jefferson National Accelerator Facility

What is cfengine?

• Stands for “Configuration Engine”• Policy driven configuration management for a network of

machines• Open source• Unix & NT/2000

• Mostly Unix, though

Page 6: Cyber Security Review, April 23-24, 2002, 0 Operated by the Southeastern Universities Research Association for the U.S. Depart. Of Energy Thomas Jefferson

Cyber Security Review, April 23-24, 2002, 6

Operated by the Southeastern Universities Research Association for the U.S. Depart. Of Energy

Thomas Jefferson National Accelerator Facility

What is cfengine?

• Developed by Mark Burgess @ Oslo University College in 1993

• Used on an estimated 100,000 nodes worldwide• Currently in version 2.0

Page 7: Cyber Security Review, April 23-24, 2002, 0 Operated by the Southeastern Universities Research Association for the U.S. Depart. Of Energy Thomas Jefferson

Cyber Security Review, April 23-24, 2002, 7

Operated by the Southeastern Universities Research Association for the U.S. Depart. Of Energy

Thomas Jefferson National Accelerator Facility

What is cfengine?

• Three main parts• cfagent• Network services• Declarative configuration templates

• Optional anomaly detection service

Page 8: Cyber Security Review, April 23-24, 2002, 0 Operated by the Southeastern Universities Research Association for the U.S. Depart. Of Energy Thomas Jefferson

Cyber Security Review, April 23-24, 2002, 8

Operated by the Southeastern Universities Research Association for the U.S. Depart. Of Energy

Thomas Jefferson National Accelerator Facility

JLab’s cfengine Architecture

Cfengine Unix Clients (Desktops & Servers)

Cfengine master server

Configuration Database

Critical File Database

Page 9: Cyber Security Review, April 23-24, 2002, 0 Operated by the Southeastern Universities Research Association for the U.S. Depart. Of Energy Thomas Jefferson

Cyber Security Review, April 23-24, 2002, 9

Operated by the Southeastern Universities Research Association for the U.S. Depart. Of Energy

Thomas Jefferson National Accelerator Facility

JLab’s cfengine Architecture

• Cfengine master server contains • Cfengine binaries for all platforms• ‘All configuration templates• Master copies of critical system/software configuration files

• Cfengine clients contain• Local copies of their own binaries• A complete copy of the configuration templates

Page 10: Cyber Security Review, April 23-24, 2002, 0 Operated by the Southeastern Universities Research Association for the U.S. Depart. Of Energy Thomas Jefferson

Cyber Security Review, April 23-24, 2002, 10Operated by the Southeastern Universities Research Association for the U.S. Depart. Of

Energy

Thomas Jefferson National Accelerator Facility

JLab’s cfengine Architecture

• Clients use crontab to run “cfexecd –F” every 30 minutes• Wrapper to run cfagent and email any output to the system administrator• “splay time” keeps all client from overloading the master at once• Cfagent automatically copies updated binaries and config templates from

master• Most configuration checks are performed during each run• Expensive checks (file sweeps) performed only during the midnight run

Page 11: Cyber Security Review, April 23-24, 2002, 0 Operated by the Southeastern Universities Research Association for the U.S. Depart. Of Energy Thomas Jefferson

Cyber Security Review, April 23-24, 2002, 11Operated by the Southeastern Universities Research Association for the U.S. Depart. Of

Energy

Thomas Jefferson National Accelerator Facility

JLab’s cfengine Architecture

• Administrator can also run cfengine manually• Local root user (on a single client): cfagent (local root user)• Cfengine admin (remotely from the master): cfrun

Page 12: Cyber Security Review, April 23-24, 2002, 0 Operated by the Southeastern Universities Research Association for the U.S. Depart. Of Energy Thomas Jefferson

Cyber Security Review, April 23-24, 2002, 12Operated by the Southeastern Universities Research Association for the U.S. Depart. Of

Energy

Thomas Jefferson National Accelerator Facility

Installing cfengine on a host

Starting cfengine installation for sysdevs1 @ Tue Mar 5 09:08:42 EST 2002

Installation host is: SunOS

Generating keypair... DONE

Exchanging keypairs...

Running cfagent for the first time...

cfengine:sysdevs1: Update of image /home/janed/.ssh/authorized_keys from master

/local/cfengine/REPOSITORY/common/home/janed/.ssh/authorized_keys on cfm.jlab.org

[Additonal config output]

• Run /local/cfengine/bin/cfinstall <hostname> as root• Log is /tmp/cfinstall-<hostname>

Page 13: Cyber Security Review, April 23-24, 2002, 0 Operated by the Southeastern Universities Research Association for the U.S. Depart. Of Energy Thomas Jefferson

Cyber Security Review, April 23-24, 2002, 13Operated by the Southeastern Universities Research Association for the U.S. Depart. Of

Energy

Thomas Jefferson National Accelerator Facility

Summary

• JLab uses cfengine 2.0 to manage configuration on a network of hundreds of Unix hosts

• The configuration master contains full copies of all configuration binaries, templates and important system files

• All network connections are encrypted and mutually authenticated• The template files are modular, enabling us to pick and choose

among the pieces we run for a particular host

Page 14: Cyber Security Review, April 23-24, 2002, 0 Operated by the Southeastern Universities Research Association for the U.S. Depart. Of Energy Thomas Jefferson

Cyber Security Review, April 23-24, 2002, 14Operated by the Southeastern Universities Research Association for the U.S. Depart. Of

Energy

Thomas Jefferson National Accelerator Facility

Questions?

David J. Bianco

<[email protected]>