Trusted Extensions Administrator's Procedures · HowtoRegainControloftheDesktop'sCurrentFocus.....70 HowtoObtaintheHexadecimalEquivalentforaLabel.....71

Embed Size (px)

Citation preview

  • Trusted Extensions Administrator'sProcedures

    Part No: E2721910January 2013

  • Copyright 1992, 2013, Oracle and/or its affiliates. All rights reserved.

    This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectualproperty laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license,transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software,unless required by law for interoperability, is prohibited.

    The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing.

    If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice isapplicable:

    U.S. GOVERNMENT END USERS. Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/ordocumentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation andagency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system,integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to theprograms. No other rights are granted to the U.S. Government.

    This software or hardware is developed for general use in a variety of information management applications. It is not developed or intended for use in any inherentlydangerous applications, including applications that may create a risk of personal injury. If you use this software or hardware in dangerous applications, then you shallbe responsible to take all appropriate fail-safe, backup, redundancy, and other measures to ensure its safe use. Oracle Corporation and its affiliates disclaim anyliability for any damages caused by use of this software or hardware in dangerous applications.

    Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners.

    Intel and Intel Xeon are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are used under license and are trademarks or registeredtrademarks of SPARC International, Inc. AMD, Opteron, the AMD logo, and the AMD Opteron logo are trademarks or registered trademarks of Advanced MicroDevices. UNIX is a registered trademark of The Open Group.

    This software or hardware and documentation may provide access to or information on content, products, and services from third parties. Oracle Corporation andits affiliates are not responsible for and expressly disclaim all warranties of any kind with respect to third-party content, products, and services. Oracle Corporationand its affiliates will not be responsible for any loss, costs, or damages incurred due to your access to or use of third-party content, products, or services.

    Ce logiciel et la documentation qui laccompagne sont protgs par les lois sur la proprit intellectuelle. Ils sont concds sous licence et soumis des restrictionsdutilisation et de divulgation. Sauf disposition de votre contrat de licence ou de la loi, vous ne pouvez pas copier, reproduire, traduire, diffuser, modifier, breveter,transmettre, distribuer, exposer, excuter, publier ou afficher le logiciel, mme partiellement, sous quelque forme et par quelque procd que ce soit. Par ailleurs, il estinterdit de procder toute ingnierie inverse du logiciel, de le dsassembler ou de le dcompiler, except des fins dinteroprabilit avec des logiciels tiers ou tel queprescrit par la loi.

    Les informations fournies dans ce document sont susceptibles de modification sans pravis. Par ailleurs, Oracle Corporation ne garantit pas quelles soient exemptesderreurs et vous invite, le cas chant, lui en faire part par crit.

    Si ce logiciel, ou la documentation qui laccompagne, est concd sous licence au Gouvernement des Etats-Unis, ou toute entit qui dlivre la licence de ce logicielou lutilise pour le compte du Gouvernement des Etats-Unis, la notice suivante sapplique:

    U.S. GOVERNMENT END USERS. Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/ordocumentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation andagency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system,integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to theprograms. No other rights are granted to the U.S. Government.

    Ce logiciel ou matriel a t dvelopp pour un usage gnral dans le cadre dapplications de gestion des informations. Ce logiciel ou matriel nest pas conu ni nestdestin tre utilis dans des applications risque, notamment dans des applications pouvant causer des dommages corporels. Si vous utilisez ce logiciel ou matrieldans le cadre dapplications dangereuses, il est de votre responsabilit de prendre toutes les mesures de secours, de sauvegarde, de redondance et autres mesuresncessaires son utilisation dans des conditions optimales de scurit. Oracle Corporation et ses affilis dclinent toute responsabilit quant aux dommages causspar lutilisation de ce logiciel ou matriel pour ce type dapplications.

    Oracle et Java sont des marques dposes dOracle Corporation et/ou de ses affilis. Tout autre nom mentionn peut correspondre des marques appartenant dautres propritaires quOracle.

    Intel et Intel Xeon sont des marques ou des marques dposes dIntel Corporation. Toutes les marques SPARC sont utilises sous licence et sont des marques ou desmarques dposes de SPARC International, Inc. AMD, Opteron, le logo AMD et le logo AMD Opteron sont des marques ou des marques dposes dAdvanced MicroDevices. UNIX est une marque dpose dThe Open Group.

    Ce logiciel ou matriel et la documentation qui laccompagne peuvent fournir des informations ou des liens donnant accs des contenus, des produits et des servicesmanant de tiers. Oracle Corporation et ses affilis dclinent toute responsabilit ou garantie expresse quant aux contenus, produits ou services manant de tiers. Enaucun cas, Oracle Corporation et ses affilis ne sauraient tre tenus pour responsables des pertes subies, des cots occasionns ou des dommages causs par laccs des contenus, produits ou services tiers, ou leur utilisation.

    130204@25097

  • Contents

    Preface ...................................................................................................................................................17

    1 Trusted Extensions Administration Concepts ................................................................................23Trusted Extensions Software and the Oracle Solaris OS ................................................................. 23

    Similarities Between Trusted Extensions and the Oracle Solaris OS ..................................... 23Differences Between Trusted Extensions and the Oracle Solaris OS ..................................... 24Multiheaded Systems and the Trusted Extensions Desktop ................................................... 25

    Basic Concepts of Trusted Extensions .............................................................................................. 26Trusted Extensions Protections ................................................................................................. 26Trusted Extensions and Access Control .................................................................................... 27Roles and Trusted Extensions .................................................................................................... 28Labels in Trusted Extensions Software ...................................................................................... 28

    2 Trusted Extensions Administration Tools ........................................................................................33Administration Tools for Trusted Extensions ................................................................................. 33txzonemgr Script ................................................................................................................................. 35Trusted CDE Actions .......................................................................................................................... 35Device Allocation Manager ................................................................................................................ 36Solaris Management Console Tools .................................................................................................. 38

    Trusted Extensions Tools in the Solaris Management Console ............................................. 39Client-Server Communication With the Solaris Management Console .............................. 41Solaris Management Console Documentation ........................................................................ 42

    Label Builder in Trusted Extensions ................................................................................................. 43Command Line Tools in Trusted Extensions .................................................................................. 44Remote Administration in Trusted Extensions ............................................................................... 46

    3

  • 3 Getting Started as a Trusted Extensions Administrator (Tasks) .................................................. 47What's New in Trusted Extensions ................................................................................................... 47Security Requirements When Administering Trusted Extensions ............................................... 48

    Role Creation in Trusted Extensions ......................................................................................... 49Role Assumption in Trusted Extensions ................................................................................... 49

    Getting Started as a Trusted Extensions Administrator (Task Map) ............................................ 49 How to Enter the Global Zone in Trusted Extensions ............................................................. 50 How to Exit the Global Zone in Trusted Extensions ............................................................... 52 How to Administer the Local System With the Solaris Management Console .................... 52 How to Start CDE Administrative Actions in Trusted Extensions ........................................ 53 How to Edit Administrative Files in Trusted Extensions ........................................................ 54

    4 Security Requirements on a Trusted Extensions System (Overview) ......................................... 57Configurable Oracle Solaris Security Features ................................................................................. 57

    Trusted Extensions Interfaces for Configuring Security Features ......................................... 57Extension of Oracle Solaris Security Mechanisms by Trusted Extensions ........................... 58Trusted Extensions Security Features ........................................................................................ 58

    Security Requirements Enforcement ................................................................................................ 58Users and Security Requirements .............................................................................................. 59Email Usage .................................................................................................................................. 59Password Enforcement ................................................................................................................ 59Information Protection ............................................................................................................... 60Password Protection .................................................................................................................... 61Group Administration ................................................................................................................ 61User Deletion Practices ............................................................................................................... 61

    Rules When Changing the Level of Security for Data ..................................................................... 61sel_config File ............................................................................................................................ 63

    Customization of Solaris Trusted Extensions (CDE) ..................................................................... 64Front Panel Customization ......................................................................................................... 64Workspace Menu Customization .............................................................................................. 64

    5 Administering Security Requirements in Trusted Extensions (Tasks) ....................................... 67Common Tasks in Trusted Extensions (Task Map) ....................................................................... 67

    How to Assign the Editor of Your Choice as the Trusted Editor ............................................ 68 How to Change the Password for root ...................................................................................... 69

    Contents

    Trusted Extensions Administrator's Procedures January 20134

  • How to Regain Control of the Desktop's Current Focus ......................................................... 70 How to Obtain the Hexadecimal Equivalent for a Label ......................................................... 71 How to Obtain a Readable Label From Its Hexadecimal Form .............................................. 72 How to Change Security Defaults in System Files .................................................................... 73

    6 Users, Rights, and Roles in Trusted Extensions (Overview) ......................................................... 75User Security Features in Trusted Extensions ................................................................................. 75Administrator Responsibilities for Users ......................................................................................... 76

    System Administrator Responsibilities for Users .................................................................... 76Security Administrator Responsibilities for Users ................................................................... 76

    Decisions to Make Before Creating Users in Trusted Extensions ................................................. 77Default User Security Attributes in Trusted Extensions ................................................................. 77

    label_encodings File Defaults .................................................................................................. 77policy.conf File Defaults in Trusted Extensions ................................................................... 78

    Configurable User Attributes in Trusted Extensions ...................................................................... 78Security Attributes That Must Be Assigned to Users ...................................................................... 79

    Security Attribute Assignment to Users in Trusted Extensions ............................................. 80.copy_files and .link_files Files ......................................................................................... 81

    7 Managing Users, Rights, and Roles in Trusted Extensions (Tasks) ..............................................83Customizing the User Environment for Security (Task Map) ....................................................... 83

    How to Modify Default User Label Attributes .......................................................................... 84 How to Modify policy.conf Defaults ...................................................................................... 84 How to Configure Startup Files for Users in Trusted Extensions .......................................... 86 How to Log In to a Failsafe Session in Trusted Extensions ..................................................... 88

    Managing Users and Rights With the Solaris Management Console (Task Map) ...................... 89 How to Modify a User's Label Range in the Solaris Management Console ........................... 89 How to Create a Rights Profile for Convenient Authorizations ............................................. 90 How to Restrict a User's Set of Privileges .................................................................................. 92 How to Prevent Account Locking for Users ............................................................................. 94 How to Enable a User to Change the Security Level of Data ................................................... 95 How to Delete a User Account From a Trusted Extensions System ...................................... 95

    Handling Other Tasks in the Solaris Management Console (Task Map) ..................................... 96

    Contents

    5

  • 8 Remote Administration in Trusted Extensions (Tasks) ................................................................. 99Secure Remote Administration in Trusted Extensions .................................................................. 99Methods for Administering Remote Systems in Trusted Extensions ......................................... 100Remote Login by a Role in Trusted Extensions ............................................................................. 101

    Remote Role-Based Administration From Unlabeled Hosts ................................................ 101Remote Login Management in Trusted Extensions .............................................................. 101

    Administering Trusted Extensions Remotely (Task Map) ........................................................... 102 How to Log In Remotely From the Command Line in Trusted Extensions ....................... 103 How to Remotely Administer Trusted Extensions With dtappsession ............................ 103 How to Remotely Administer Systems by Using the Solaris Management Console From a

    Trusted Extensions System ....................................................................................................... 105 How to Remotely Administer Systems by Using the Solaris Management Console From an

    Unlabeled System ....................................................................................................................... 106 How to Enable Specific Users to Log In Remotely to the Global Zone in Trusted

    Extensions ................................................................................................................................... 108 How to Use Xvnc to Remotely Access a Trusted Extensions System ................................... 109

    9 Trusted Extensions and LDAP (Overview) ..................................................................................... 111Using a Naming Service in Trusted Extensions ............................................................................. 111

    Non-Networked Trusted Extensions Systems ........................................................................ 112Trusted Extensions LDAP Databases ...................................................................................... 112

    Using the LDAP Naming Service in Trusted Extensions .............................................................. 113

    10 Managing Zones in Trusted Extensions (Tasks) ............................................................................ 115Zones in Trusted Extensions ............................................................................................................ 115

    Zones and IP Addresses in Trusted Extensions ...................................................................... 116Zones and Multilevel Ports ....................................................................................................... 117Zones and ICMP in Trusted Extensions ................................................................................. 118

    Global Zone Processes and Labeled Zones ..................................................................................... 118Zone Administration Utilities in Trusted Extensions .................................................................. 119Managing Zones (Task Map) ........................................................................................................... 120

    How to Display Ready or Running Zones ............................................................................... 121 How to Display the Labels of Mounted Files .......................................................................... 122 How to Loopback Mount a File That Is Usually Not Visible in a Labeled Zone ................. 123 How to Disable the Mounting of Lower-Level Files .............................................................. 124

    Contents

    Trusted Extensions Administrator's Procedures January 20136

  • How to Share a ZFS Dataset From a Labeled Zone ................................................................ 125 How to Enable Files to be Relabeled From a Labeled Zone ................................................... 128 How to Configure a Multilevel Port for NFSv3 Over udp ...................................................... 129 How to Create a Multilevel Port for a Zone ............................................................................. 130

    11 Managing and Mounting Files in Trusted Extensions (Tasks) .................................................... 133Sharing and Mounting Files in Trusted Extensions ...................................................................... 133NFS Mounts in Trusted Extensions ................................................................................................ 133Sharing Files From a Labeled Zone ................................................................................................. 135Access to NFS Mounted Directories in Trusted Extensions ........................................................ 135

    Home Directory Creation in Trusted Extensions .................................................................. 136Changes to the Automounter in Trusted Extensions ............................................................ 137

    Trusted Extensions Software and NFS Protocol Versions ........................................................... 138Backing Up, Sharing, and Mounting Labeled Files (Task Map) .................................................. 139

    How to Back Up Files in Trusted Extensions .......................................................................... 139 How to Restore Files in Trusted Extensions ........................................................................... 140 How to Share Directories From a Labeled Zone .................................................................... 140 How to NFS Mount Files in a Labeled Zone ........................................................................... 142 How to Troubleshoot Mount Failures in Trusted Extensions .............................................. 146

    12 Trusted Networking (Overview) ......................................................................................................149The Trusted Network ........................................................................................................................ 149

    Trusted Extensions Data Packets ............................................................................................. 150Trusted Network Communications ........................................................................................ 150Network Configuration Databases in Trusted Extensions ................................................... 152Network Commands in Trusted Extensions .......................................................................... 152Trusted Network Security Attributes ...................................................................................... 153

    Network Security Attributes in Trusted Extensions ..................................................................... 154Host Type and Template Name in Security Templates ......................................................... 155Default Label in Security Templates ........................................................................................ 155Domain of Interpretation in Security Templates ................................................................... 156Label Range in Security Templates .......................................................................................... 156Security Label Set in Security Templates ................................................................................. 156

    Trusted Network Fallback Mechanism ........................................................................................... 157Overview of Routing in Trusted Extensions .................................................................................. 159

    Contents

    7

  • Background on Routing ............................................................................................................ 159Routing Table Entries in Trusted Extensions ......................................................................... 159Trusted Extensions Accreditation Checks .............................................................................. 160

    Administration of Routing in Trusted Extensions ........................................................................ 161Choosing Routers in Trusted Extensions ............................................................................... 162Gateways in Trusted Extensions .............................................................................................. 163Routing Commands in Trusted Extensions ........................................................................... 163

    13 Managing Networks in Trusted Extensions (Tasks) ..................................................................... 165Managing the Trusted Network (Task Map) ................................................................................. 165Configuring Trusted Network Databases (Task Map) ................................................................. 166

    How to Determine If You Need Site-Specific Security Templates ....................................... 167 How to Open the Trusted Networking Tools ......................................................................... 168 How to Construct a Remote Host Template ........................................................................... 168 How to Add Hosts to the System's Known Network .............................................................. 173 How to Assign a Security Template to a Host or a Group of Hosts ...................................... 174 How to Limit the Hosts That Can Be Contacted on the Trusted Network ......................... 175

    Configuring Routes and Checking Network Information in Trusted Extensions (Task Map) 179 How to Configure Routes With Security Attributes .............................................................. 179 How to Check the Syntax of Trusted Network Databases ..................................................... 181 How to Compare Trusted Network Database Information With the Kernel Cache ......... 182 How to Synchronize the Kernel Cache With Trusted Network Databases ......................... 183

    Troubleshooting the Trusted Network (Task Map) ...................................................................... 185 How to Verify That a Host's Interfaces Are Up ...................................................................... 185 How to Debug the Trusted Extensions Network ................................................................... 186 How to Debug a Client Connection to the LDAP Server ...................................................... 188

    14 Multilevel Mail in Trusted Extensions (Overview) ....................................................................... 191Multilevel Mail Service ...................................................................................................................... 191Trusted Extensions Mail Features ................................................................................................... 191

    15 Managing Labeled Printing (Tasks) ................................................................................................193Labels, Printers, and Printing ........................................................................................................... 193

    Restricting Access to Printers and Print Job Information in Trusted Extensions .............. 194

    Contents

    Trusted Extensions Administrator's Procedures January 20138

  • Labeled Printer Output ............................................................................................................. 194PostScript Printing of Security Information ........................................................................... 197Interoperability of Trusted Extensions With Trusted Solaris 8 Printing ............................ 199Trusted Extensions Print Interfaces (Reference) ................................................................... 200

    Managing Printing in Trusted Extensions (Task Map) ................................................................ 200Configuring Labeled Printing (Task Map) ..................................................................................... 201

    How to Configure a Multilevel Print Server and Its Printers ................................................ 201 How to Configure a Network Printer for Sun Ray Clients .................................................... 203 How to Configure Cascade Printing on a Labeled System .................................................... 206 How to Configure a Zone for Single-Label Printing .............................................................. 209 How to Enable a Trusted Extensions Client to Access a Printer .......................................... 210 How to Configure a Restricted Label Range for a Printer ..................................................... 212

    Reducing Printing Restrictions in Trusted Extensions (Task Map) ........................................... 213 How to Remove Labels From Printed Output ........................................................................ 214 How to Assign a Label to an Unlabeled Print Server ............................................................. 214 How to Remove Page Labels From All Print Jobs .................................................................. 215 How to Enable Specific Users to Suppress Page Labels ......................................................... 216 How to Suppress Banner and Trailer Pages for Specific Users ............................................. 216 How to Enable Users to Print PostScript Files in Trusted Extensions ................................. 217

    16 Devices in Trusted Extensions (Overview) ..................................................................................... 219Device Protection With Trusted Extensions Software ................................................................. 219

    Device Label Ranges .................................................................................................................. 220Effects of Label Range on a Device ........................................................................................... 220Device Access Policies ............................................................................................................... 221Device-Clean Scripts ................................................................................................................. 221

    Device Allocation Manager GUI ..................................................................................................... 221Enforcement of Device Security in Trusted Extensions ............................................................... 223Devices in Trusted Extensions (Reference) .................................................................................... 223

    17 Managing Devices for Trusted Extensions (Tasks) ....................................................................... 225Handling Devices in Trusted Extensions (Task Map) .................................................................. 225Using Devices in Trusted Extensions (Task Map) ........................................................................ 226Managing Devices in Trusted Extensions (Task Map) ................................................................. 226

    How to Configure a Device in Trusted Extensions ................................................................ 227

    Contents

    9

  • How to Revoke or Reclaim a Device in Trusted Extensions ................................................. 230 How to Protect Nonallocatable Devices in Trusted Extensions ........................................... 231 How to Configure a Serial Line for Logins .............................................................................. 232 How to Configure an Audio Player Program for Use in Trusted CDE ................................ 233 How to Prevent the File Manager From Displaying After Device Allocation .................... 233 How to Add a Device_Clean Script in Trusted Extensions ................................................... 234

    Customizing Device Authorizations in Trusted Extensions (Task Map) ................................... 235 How to Create New Device Authorizations ............................................................................ 235 How to Add Site-Specific Authorizations to a Device in Trusted Extensions .................... 238 How to Assign Device Authorizations .................................................................................... 238

    18 Trusted Extensions Auditing (Overview) .......................................................................................241Trusted Extensions and Auditing .................................................................................................... 241Audit Management by Role in Trusted Extensions ....................................................................... 242

    Role Setup for Audit Administration ....................................................................................... 242Audit Tasks in Trusted Extensions .......................................................................................... 242Audit Tasks of the Security Administrator ............................................................................. 243Audit Tasks of the System Administrator ............................................................................... 243

    Trusted Extensions Audit Reference ............................................................................................... 244Trusted Extensions Audit Classes ............................................................................................ 244Trusted Extensions Audit Events ............................................................................................. 245Trusted Extensions Audit Tokens ............................................................................................ 245Trusted Extensions Audit Policy Options ............................................................................... 250Extensions to Auditing Commands in Trusted Extensions .................................................. 250

    19 Software Management in Trusted Extensions (Tasks) ................................................................ 251Adding Software to Trusted Extensions ......................................................................................... 251

    Oracle Solaris Security Mechanisms for Software .................................................................. 252Evaluating Software for Security .............................................................................................. 253

    Trusted Processes in the Window System ...................................................................................... 254Adding Trusted CDE Actions ................................................................................................... 255

    Managing Software in Trusted Extensions (Tasks) ....................................................................... 256 How to Add a Software Package in Trusted Extensions ........................................................ 256 How to Install a Java Archive File in Trusted Extensions ...................................................... 257

    Contents

    Trusted Extensions Administrator's Procedures January 201310

  • A Quick Reference to Trusted Extensions Administration ............................................................. 259Administrative Interfaces in Trusted Extensions .......................................................................... 259Oracle Solaris Interfaces Extended by Trusted Extensions .......................................................... 260Tighter Security Defaults in Trusted Extensions ........................................................................... 261Limited Options in Trusted Extensions ......................................................................................... 262

    B List of Trusted Extensions Man Pages ............................................................................................ 263Trusted Extensions Man Pages in Alphabetical Order ................................................................. 263Oracle Solaris Man Pages That Are Modified by Trusted Extensions ......................................... 266

    Index ................................................................................................................................................... 269

    Contents

    11

  • 12

  • Figures

    FIGURE 11 Trusted Extensions Multilevel CDE Desktop ........................................................ 27FIGURE 21 Device Allocation Manager Icon in Trusted CDE ................................................. 37FIGURE 22 Device Allocation Manager GUI ............................................................................. 37FIGURE 23 Typical Trusted Extensions Toolbox in the Solaris Management Console ........ 39FIGURE 24 Computers and Networks Tool Set in the Solaris Management Console ........... 40FIGURE 25 Solaris Management Console Client Using an LDAP Server to Administer the

    Network ...................................................................................................................... 42FIGURE 26 Solaris Management Console Client Administering Individual Remote Systems

    on a Network .............................................................................................................. 42FIGURE 121 Typical Trusted Extensions Routes and Routing Table Entries ........................ 163FIGURE 151 Job's Label Printed at the Top and Bottom of a Body Page ................................. 195FIGURE 152 Typical Banner Page of a Labeled Print Job .......................................................... 196FIGURE 153 Differences on a Trailer Page .................................................................................. 196FIGURE 161 Device Allocation Manager Opened by a User .................................................... 222FIGURE 171 Serial Ports Tool in the Solaris Management Console ........................................ 232FIGURE 181 Typical Audit Record Structures on a Labeled System ....................................... 244FIGURE 182 labelToken Format ............................................................................................... 246FIGURE 183 Format for xcolormap, xcursor, xfont, xgc, xpixmap, and xwindowTokens .247FIGURE 184 xpropertyToken Format ....................................................................................... 249FIGURE 185 xselectToken Format ........................................................................................... 249

    13

  • 14

  • Tables

    TABLE 11 Examples of Label Relationships ............................................................................. 29TABLE 21 Trusted Extensions Administrative Tools .............................................................. 34TABLE 22 Administrative Actions in Trusted CDE, Their Purpose, and Associated Rights

    Profiles ........................................................................................................................ 35TABLE 23 Installation Actions in Trusted CDE, Their Purpose, and Associated Rights

    Profiles ........................................................................................................................ 36TABLE 24 User and Administrative Trusted Extensions Commands .................................. 44TABLE 25 User and Administrative Commands That Trusted Extensions Modifies ......... 45TABLE 41 Conditions for Moving Files to a New Label .......................................................... 62TABLE 42 Conditions for Moving Selections to a New Label ................................................. 62TABLE 61 Trusted Extensions Security Defaults in policy.conf File ................................. 78TABLE 62 Security Attributes That Are Assigned After User Creation ................................ 79TABLE 121 tnrhdbHost Address and Fallback Mechanism Entries ..................................... 158TABLE 151 Configurable Values in the tsol_separator.ps File ......................................... 197TABLE 181 X Server Audit Classes ............................................................................................ 244TABLE 182 Trusted Extensions Audit Tokens ......................................................................... 245TABLE 191 Constraints on CDE Actions in Trusted Extensions ........................................... 255

    15

  • 16

  • Preface

    The Trusted Extensions Administrator's Procedures guide provides procedures for configuringTrusted Extensions on the Oracle Solaris operating system (Oracle Solaris OS). This guide alsoprovides procedures for managing users, zones, devices, and hosts that are labeled with TrustedExtensions software.

    Note This Oracle Solaris release supports systems that use the SPARC and x86 families ofprocessor architectures. The supported systems appear in the Oracle Solaris OS: HardwareCompatibility Lists. This document cites any implementation differences between the platformtypes.

    In this document, these x86 related terms mean the following:

    x86 refers to the larger family of 64-bit and 32-bit x86 compatible products. x64 relates specifically to 64-bit x86 compatible CPUs. "32-bit x86" points out specific 32-bit information about x86 based systems.

    For supported systems, see the Oracle Solaris OS: Hardware Compatibility Lists.

    Who Should Use This GuideThis guide is for knowledgeable system administrators and security administrators who areconfiguring and administering Trusted Extensions software. The level of trust that is requiredby your site security policy, and your level of expertise, determines who can perform theconfiguration tasks.

    Administrators should be familiar with Oracle Solaris administration. In addition,administrators should understand the following:

    The security features of Trusted Extensions and your site security policy Basic concepts and procedures for using a host that is configured with Trusted Extensions,

    as described in the Trusted Extensions Users Guide How administrative tasks are divided among roles at your site

    17

    http://www.oracle.com/webfolder/technetwork/hcl/index.htmlhttp://www.oracle.com/pls/topic/lookup?ctx=E26505&id=TRSSUG

  • How the Trusted Extensions Guides Are OrganizedThe following table lists the topics that are covered in the Trusted Extensions guides and theaudience for each guide.

    Title of Guide Topics Audience

    Trusted Extensions Users Guide Describes the basic features of Trusted Extensions. This bookcontains a glossary.

    End users,administrators,developers

    Trusted Extensions Configuration Guide Starting with the Solaris 10 5/08 release, describes how to enableand initially configure Trusted Extensions. Replaces SolarisTrusted Extensions Installation and Configuration for the Solaris10 11/06 and Solaris 10 8/07 Releases.

    Administrators,developers

    Trusted Extensions AdministratorsProcedures

    Shows how to perform specific administration tasks. Administrators,developers

    Trusted Extensions Developers Guide Describes how to develop applications with Trusted Extensions. Developers,administrators

    Trusted Extensions Label Administration Provides information about how to specify label components inthe label encodings file.

    Administrators

    Compartmented Mode WorkstationLabeling: Encodings Format

    Describes the syntax used in the label encodings file. The syntaxenforces the various rules for well-formed labels for a system.

    Administrators

    Related System Administration GuidesThe following guides contain information that is useful when you prepare for and run TrustedExtensions software.

    Book Title Topics

    Oracle Solaris Administration: Basic Administration User accounts and groups, server and client support, shuttingdown and booting a system, managing services, and managingsoftware (packages and patches)

    System Administration Guide: Advanced Administration Terminals and modems, system resources (disk quotas,accounting, and crontabs), system processes, and troubleshootingSolaris software problems

    System Administration Guide: Devices and File Systems Removable media, disks and devices, file systems, and backing upand restoring data

    Preface

    Trusted Extensions Administrator's Procedures January 201318

    http://www.oracle.com/pls/topic/lookup?ctx=E26505&id=TRSSUGhttp://www.oracle.com/pls/topic/lookup?ctx=E26505_01&id=TRSOLCFGhttp://www.oracle.com/pls/topic/lookup?ctx=E26505&id=TRSOLADMPROChttp://www.oracle.com/pls/topic/lookup?ctx=E26505&id=TRSOLADMPROChttp://www.oracle.com/pls/topic/lookup?ctx=E26505&id=TRSOLDEVhttp://www.oracle.com/pls/topic/lookup?ctx=E26505_01&id=TRSOLLBLADMINhttp://www.oracle.com/pls/topic/lookup?ctx=E23823&id=WSLBLENCODEhttp://www.oracle.com/pls/topic/lookup?ctx=E23823&id=WSLBLENCODEhttp://www.oracle.com/pls/topic/lookup?ctx=E26505&id=SYSADV1http://www.oracle.com/pls/topic/lookup?ctx=E23823&id=SYSADV2http://www.oracle.com/pls/topic/lookup?ctx=E26505&id=SAGDFS

  • Book Title Topics

    Oracle Solaris Administration: IP Services TCP/IP network administration, IPv4 and IPv6 addressadministration, DHCP, IPsec, IKE, Solaris IP filter, Mobile IP, IPnetwork multipathing (IPMP), and IPQoS

    System Administration Guide: Naming and Directory Services(DNS, NIS, and LDAP)

    DNS, NIS, and LDAP naming and directory services, includingtransitioning from NIS to LDAP and transitioning from NIS+ toLDAP

    System Administration Guide: Network Services Web cache servers, time-related services, network file systems(NFS and Autofs), mail, SLP, and PPP

    System Administration Guide: Security Services Auditing, device management, file security, BART, Kerberosservices, PAM, Solaris Cryptographic Framework, privileges,RBAC, SASL, and Solaris Secure Shell

    System Administration Guide: Oracle Solaris Containers-ResourceManagement and Oracle Solaris Zones

    Resource management topics projects and tasks, extendedaccounting, resource controls, fair share scheduler (FSS), physicalmemory control using the resource capping daemon (rcapd), andresource pools; virtualization using Solaris Zones softwarepartitioning technology and lx branded zones

    Oracle Solaris ZFS Administration Guide ZFS storage pool and file system creation and management,snapshots, clones, backups, using access control lists (ACLs) toprotect ZFS files, using ZFS on a Solaris system with zonesinstalled, emulated volumes, and troubleshooting and datarecovery

    System Administration Guide: Printing Solaris printing topics and tasks, using services, tools, protocols,and technologies to set up and administer printing services andprinters

    Related ReferencesYour site security policy document Describes the security policy and security procedures atyour site

    Solaris Common Desktop Environment: Advanced User's and System Administrator's Guide Describes the Common Desktop Environment (CDE)

    The administrator guide for your currently installed operating system Describes how to backup system files

    Preface

    19

    http://www.oracle.com/pls/topic/lookup?ctx=E26505&id=SYSADV3http://www.oracle.com/pls/topic/lookup?ctx=E18752&id=SYSADV5http://www.oracle.com/pls/topic/lookup?ctx=E18752&id=SYSADV5http://www.oracle.com/pls/topic/lookup?ctx=E23823&id=SYSADV4http://www.oracle.com/pls/topic/lookup?ctx=E26505&id=SYSADV6http://www.oracle.com/pls/topic/lookup?ctx=E26505&id=SYSADRMhttp://www.oracle.com/pls/topic/lookup?ctx=E26505&id=SYSADRMhttp://www.oracle.com/pls/topic/lookup?ctx=E26505&id=ZFSADMINhttp://www.oracle.com/pls/topic/lookup?ctx=E23823&id=SYSADPRTSVCS

  • Related Third-Party Web Site ReferencesThird-party URLs are referenced in this document and provide additional, related information.

    Note Oracle is not responsible for the availability of third-party web sites that are mentioned inthis document. Oracle does not endorse and is not responsible or liable for any content,advertising, products, or other materials that are available on or through such sites or resources.Oracle will not be responsible or liable for any actual or alleged damage or loss caused or allegedto be caused by or in connection with the use of or reliance on any such content, goods, orservices that are available on or through such sites or resources.

    Access to Oracle SupportOracle customers have access to electronic support through My Oracle Support. Forinformation, visit http://www.oracle.com/pls/topic/lookup?ctx=acc&id=info or visithttp://www.oracle.com/pls/topic/lookup?ctx=acc&id=trs if you are hearing impaired.

    Typographic ConventionsThe following table describes the typographic conventions that are used in this book.

    TABLE P1 Typographic Conventions

    Typeface Description Example

    AaBbCc123 The names of commands, files, and directories,and onscreen computer output

    Edit your .login file.

    Use ls -a to list all files.

    machine_name% you have mail.

    AaBbCc123 What you type, contrasted with onscreencomputer output

    machine_name% su

    Password:

    aabbcc123 Placeholder: replace with a real name or value The command to remove a file is rmfilename.

    AaBbCc123 Book titles, new terms, and terms to beemphasized

    Read Chapter 6 in the User's Guide.

    A cache is a copy that is storedlocally.

    Do not save the file.

    Note: Some emphasized itemsappear bold online.

    Preface

    Trusted Extensions Administrator's Procedures January 201320

    http://www.oracle.com/pls/topic/lookup?ctx=acc&id=infohttp://www.oracle.com/pls/topic/lookup?ctx=acc&id=trs

  • Shell Prompts in Command ExamplesThe following table shows UNIX system prompts and superuser prompts for shells that areincluded in the Oracle Solaris OS. In command examples, the shell prompt indicates whetherthe command should be executed by a regular user or a user with privileges.

    TABLE P2 Shell Prompts

    Shell Prompt

    Bash shell, Korn shell, and Bourne shell $

    Bash shell, Korn shell, and Bourne shell for superuser #

    C shell machine_name%

    C shell for superuser machine_name#

    Preface

    21

  • 22

  • Trusted Extensions Administration Concepts

    This chapter introduces you to administering a system that is configured with TrustedExtensions software.

    Trusted Extensions Software and the Oracle Solaris OS on page 23 Basic Concepts of Trusted Extensions on page 26

    Trusted Extensions Software and the Oracle Solaris OSTrusted Extensions software adds labels to a system that is running the Solaris OperatingSystem (Oracle Solaris OS). Labels implement mandatory access control (MAC). MAC, alongwith discretionary access control (DAC), protects system subjects (processes) and objects(data). Trusted Extensions software provides interfaces to handle label configuration, labelassignment, and label policy.

    Similarities Between Trusted Extensions and theOracle Solaris OSTrusted Extensions software uses rights profiles, roles, auditing, privileges, and other securityfeatures of the Oracle Solaris OS. You can use Oracle Solaris Secure Shell (SSH), BART, theOracle Solaris cryptographic framework, IPsec, and IP Filter with Trusted Extensions.

    As in the Oracle Solaris OS, users can be limited to using applications that are necessary forperforming their jobs. Other users can be authorized to do more.

    As in the Oracle Solaris OS, capabilities that were formerly assigned to superuser areassigned to separate, discrete roles.

    As in the Oracle Solaris OS, privileges protect processes. Zones are also used to separateprocesses.

    As in the Oracle Solaris OS, events on the system can be audited.

    1C H A P T E R 1

    23

  • Trusted Extensions uses the system configuration files of the Oracle Solaris OS, such aspolicy.conf and exec_attr.

    Differences Between Trusted Extensions and theOracle Solaris OSTrusted Extensions software extends the Oracle Solaris OS. The following list provides anoverview. For a quick reference, see Appendix A, Quick Reference to Trusted ExtensionsAdministration.

    Trusted Extensions controls access to data with special security tags that are called labels.Labels provide mandatory access control (MAC). MAC protection is in addition to UNIX filepermissions, or discretionary access control (DAC). Labels are directly assigned to users,zones, devices, windows, and network endpoints. Labels are implicitly assigned to processes,files, and other system objects.MAC cannot be overridden by regular users. Trusted Extensions requires regular users tooperate in labeled zones. By default, no users or processes in labeled zones can overrideMAC.As in the Oracle Solaris OS, the ability to override security policy can be assigned to specificprocesses or users when MAC can be overridden. For example, users can be authorized tochange the label of a file. Such an action upgrades or downgrades the sensitivity of theinformation in that file.

    Trusted Extensions adds to existing configuration files and commands. For example,Trusted Extensions adds audit events, authorizations, privileges, and rights profiles.

    Some features that are optional on an Oracle Solaris system are required on a TrustedExtensions system. For example, zones and roles are required on a system that is configuredwith Trusted Extensions.

    Some features that are optional on an Oracle Solaris system are recommended on a TrustedExtensions system. For example, in Trusted Extensions the root user should be turned intothe root role.

    Trusted Extensions can change the default behavior of the Oracle Solaris OS. For example,on a system that is configured with Trusted Extensions, auditing is enabled by default. Inaddition, device allocation is required.

    Trusted Extensions can narrow the options that are available in the Oracle Solaris OS. Forexample, on a system that is configured with Trusted Extensions, the NIS+ naming service isnot supported. Also, in Trusted Extensions, all zones are labeled zones. Unlike the OracleSolaris OS, labeled zones must use the same pool of user IDs and group IDs. Additionally, inTrusted Extensions, labeled zones can share one IP address.

    Trusted Extensions provides trusted versions of two desktops. To work in a labeledenvironment, desktop users of Trusted Extensions must use one of these desktops:

    Trusted Extensions Software and the Oracle Solaris OS

    Trusted Extensions Administrator's Procedures January 201324

  • Solaris Trusted Extensions (CDE) Is the trusted version of Common DesktopEnvironment (CDE). The name can be shortened to Trusted CDE.

    Solaris Trusted Extensions (JDS) Is the trusted version of Java Desktop System,Release number. The name can be shortened to Trusted JDS.

    Trusted Extensions provides additional graphical user interfaces (GUIs) and command lineinterfaces (CLIs). For example, Trusted Extensions provides the Device Allocation Managerto administer devices. In addition, the updatehome command is used to place startup files inan regular user's home directory at every label.

    Trusted Extensions requires the use of particular GUIs for administration. For example, ona system that is configured with Trusted Extensions, the Solaris Management Console isused to administer users, roles, and the network. Similarly, in Trusted CDE, the AdminEditor is used to edit system files.

    Trusted Extensions limits what users can see. For example, a device that cannot be allocatedby a user cannot be seen by that user.

    Trusted Extensions limits users' desktop options. For example, users are allowed a limitedtime of workstation inactivity before the screen locks.

    Multiheaded Systems and the Trusted ExtensionsDesktopWhen the monitors of a multiheaded Trusted Extensions system are configured horizontally,the trusted stripe stretches across the monitors. When the monitors are configured vertically,the trusted stripe appears in the lowest monitor.

    When different workspaces are displayed on the monitors of a multiheaded system, TrustedCDE and Trusted JDS render the trusted stripe differently.

    On a Trusted JDS desktop, each monitor displays a trusted stripe. On a Trusted CDE desktop, one trusted stripe appears on the primary monitor.

    Caution If a second trusted stripe appears on a Trusted CDE multiheaded system, the stripeis not generated by the operating system. You might have an unauthorized program on yoursystem.

    Contact your security administrator immediately. To determine the correct trusted stripe,see How to Regain Control of the Desktop's Current Focus on page 70.

    Trusted Extensions Software and the Oracle Solaris OS

    Chapter 1 Trusted Extensions Administration Concepts 25

  • Basic Concepts of Trusted ExtensionsTrusted Extensions software adds labels to an Oracle Solaris system. Labeled desktops andtrusted applications, such as the Label Builder and the Device Allocation Manager, are alsoadded. The concepts in this section are necessary to understand Trusted Extensions, both forusers and administrators. Users are introduced to these concepts in the Trusted ExtensionsUsers Guide.

    Trusted Extensions ProtectionsTrusted Extensions software enhances the protection of the Oracle Solaris OS. The OracleSolaris OS protects access to the system with user accounts that require passwords. You canrequire that passwords be changed regularly, be of a certain length, and so on. Roles requireadditional passwords to perform administrative tasks. Additional authentication limits thedamage that can be done by an intruder who guesses the root password, because roles cannot beused as login accounts. Trusted Extensions software goes further by restricting users and rolesto an approved label range. This label range limits the information that users and roles canaccess.

    Trusted Extensions software displays the Trusted Path symbol, an unmistakable, tamper-proofemblem that appears at the left of the trusted stripe. In Trusted CDE, the stripe is at the bottomof the screen. In Trusted JDS, the stripe is at the top of the screen. The Trusted Path symbolindicates to users when they are using security-related parts of the system. If this symbol doesnot appear when the user is running a trusted application, that version of the application shouldbe checked immediately for authenticity. If the trusted stripe does not appear, the desktop is nottrustworthy. For a sample desktop display, see Figure 11.

    Basic Concepts of Trusted Extensions

    Trusted Extensions Administrator's Procedures January 201326

    http://www.oracle.com/pls/topic/lookup?ctx=E26505&id=TRSSUGhttp://www.oracle.com/pls/topic/lookup?ctx=E26505&id=TRSSUG

  • Most security-related software, that is, the Trusted Computing Base (TCB), runs in the globalzone. Regular users cannot enter the global zone or view its resources. Users are able to interactwith TCB software, as in when they change passwords. The Trusted Path symbol is displayedwhenever the user interacts with the TCB.

    Trusted Extensions and Access ControlTrusted Extensions software protects information and other resources through bothdiscretionary access control (DAC) and mandatory access control (MAC). DAC is thetraditional UNIX permission bits and access control lists that are set at the discretion of theowner. MAC is a mechanism that the system enforces automatically. MAC controls alltransactions by checking the labels of processes and data in the transaction.

    A user's label represents the sensitivity level at which the user is permitted to operate andchooses to operate. Typical labels are Secret, or Public. The label determines the informationthat the user is allowed to access. Both MAC and DAC can be overridden by special permissionsthat are in the Oracle Solaris OS. Privileges are special permissions that can be granted toprocesses. Authorizations are special permissions that can be granted to users and roles by anadministrator.

    FIGURE 11 Trusted Extensions Multilevel CDE Desktop

    Trusted Path menu

    Trusted symbol Workspace label

    Windowlabel stripe

    Front panel

    Window iconlabel stripe

    Trusted stripe

    Basic Concepts of Trusted Extensions

    Chapter 1 Trusted Extensions Administration Concepts 27

  • As an administrator, you need to train users on the proper procedures for securing their filesand directories, according to your site's security policy. Furthermore, you need to instruct anyusers who are allowed to upgrade or downgrade labels as to when doing so is appropriate.

    Roles and Trusted ExtensionsOn a system that is running Oracle Solaris software without Trusted Extensions, roles areoptional. On a system that is configured with Trusted Extensions, roles are required. Thesystem is administered by the System Administrator role and the Security Administrator role.In some cases, the root role is used.

    As in the Oracle Solaris OS, rights profiles are the basis of a role's capabilities. TrustedExtensions provides two rights profiles, Information Security and User Security. These twoprofiles define the Security Administrator role.

    The programs that are available to a role in Trusted Extensions have a special property, thetrusted path attribute. This attribute indicates that the program is part of the TCB. The trustedpath attribute is available when a program is launched from the global zone.

    For information about roles, see Part III, Roles, Rights Profiles, and Privileges, in SystemAdministration Guide: Security Services.

    Labels in Trusted Extensions SoftwareLabels and clearances are at the center of mandatory access control (MAC) in TrustedExtensions. They determine which users can access which programs, files, and directories.Labels and clearances consist of one classification component and zero or more compartmentcomponents. The classification component indicates a hierarchical level of security such as TOPSECRET or CONFIDENTIAL. The compartment component represents a group of users who mightneed access to a common body of information. Some typical types of compartments areprojects, departments, or physical locations. Labels are readable by authorized users, butinternally, labels are manipulated as numbers. The numbers and their readable versions aredefined in the label_encodings file.

    Trusted Extensions mediates all attempted security-related transactions. The softwarecompares the labels of the accessing entity, typically a process, and the entity being accessed,usually a filesystem object. The software then permits or disallows the transaction depending onwhich label is dominant. Labels are also used to determine access to other system resources,such as allocatable devices, networks, frame buffers, and other hosts.

    Basic Concepts of Trusted Extensions

    Trusted Extensions Administrator's Procedures January 201328

    http://www.oracle.com/pls/topic/lookup?ctx=E26505&id=SYSADV6prbactm-1http://www.oracle.com/pls/topic/lookup?ctx=E26505&id=SYSADV6prbactm-1

  • Dominance Relationships Between LabelsOne entity's label is said to dominate another label if the following two conditions are met:

    The classification component of the first entity's label is equal to or higher than the secondentity's classification. The security administrator assigns numbers to classifications in thelabel_encodings file. The software compares these numbers to determine dominance.

    The set of compartments in the first entity includes all of the second entity's compartments.

    Two labels are said to be equal if they have the same classification and the same set ofcompartments. If the labels are equal, they dominate each other and access is permitted.

    If one label has a higher classification or if it has the same classification and its compartmentsare a superset of the second label's compartments, or both, the first label is said to strictlydominate the second label.

    Two labels are said to be disjoint or noncomparable if neither label dominates the other label.

    The following table presents examples of label comparisons for dominance. In the example,NEED_TO_KNOW is a higher classification than INTERNAL. There are three compartments: Eng,Mkt, and Fin.

    TABLE 11 Examples of Label Relationships

    Label 1 Relationship Label 2

    NEED_TO_KNOW Eng Mkt (strictly) dominates INTERNAL Eng Mkt

    NEED_TO_KNOW Eng Mkt (strictly) dominates NEED_TO_KNOW Eng

    NEED_TO_KNOW Eng Mkt (strictly) dominates INTERNAL Eng

    NEED_TO_KNOW Eng Mkt dominates (equals) NEED_TO_KNOW Eng Mkt

    NEED_TO_KNOW Eng Mkt is disjoint with NEED_TO_KNOW Eng Fin

    NEED_TO_KNOW Eng Mkt is disjoint with NEED_TO_KNOW Fin

    NEED_TO_KNOW Eng Mkt is disjoint with INTERNAL Eng Mkt Fin

    Administrative Labels

    Trusted Extensions provides two special administrative labels that are used as labels orclearances: ADMIN_HIGH and ADMIN_LOW. These labels are used to protect system resources andare intended for administrators rather than regular users.

    ADMIN_HIGH is the highest label. ADMIN_HIGH dominates all other labels in the system and is usedto protect system data, such as administration databases or audit trails, from being read. Youmust be in the global zone to read data that is labeled ADMIN_HIGH.

    Basic Concepts of Trusted Extensions

    Chapter 1 Trusted Extensions Administration Concepts 29

  • ADMIN_LOW is the lowest label. ADMIN_LOW is dominated by all other labels in a system, includinglabels for regular users. Mandatory access control does not permit users to write data to fileswith labels lower than the user's label. Thus, a file at the label ADMIN_LOW can be read by regularusers, but cannot be modified. ADMIN_LOW is typically used to protect public executables that areshared, such as files in /usr/bin.

    Label Encodings FileAll label components for a system, that is, classifications, compartments, and the associatedrules, are stored in an ADMIN_HIGH file, the label_encodings file. This file is located in the/etc/security/tsol directory. The security administrator sets up the label_encodings filefor the site. A label encodings file contains:

    Component definitions Definitions of classifications, compartments, labels, andclearances, including rules for required combinations and constraints

    Accreditation range definitions Specification of the clearances and minimum labels thatdefine the sets of available labels for the entire system and for regular users

    Printing specifications Identification and handling information for print banners,trailers, headers, footers, and other security features on printer output

    Customizations Local definitions including label color codes, and other defaults

    For more information, see the label_encodings(4) man page. Detailed information can also befound in Trusted Extensions Label Administration and Compartmented Mode WorkstationLabeling: Encodings Format.

    Label RangesA label range is the set of potentially usable labels at which users can operate. Both users andresources both have label ranges. Resources that can be protected by label ranges include suchthings as allocatable devices, networks, interfaces, frame buffers, and commands or actions. Alabel range is defined by a clearance at the top of the range and a minimum label at the bottom.

    A range does not necessarily include all combinations of labels that fall between a maximumand minimum label. Rules in the label_encodings file can disqualify certain combinations. Alabel must be well-formed, that is, permitted by all applicable rules in the label encodings file, inorder to be included in a range.

    However, a clearance does not have to be well-formed. Suppose, for example, that alabel_encodings file prohibits any combination of compartments Eng, Mkt, and Fin in a label.INTERNAL Eng Mkt Fin would be a valid clearance but not a valid label. As a clearance, thiscombination would let a user access files that are labeled INTERNAL Eng, INTERNAL Mkt, andINTERNAL Fin.

    Basic Concepts of Trusted Extensions

    Trusted Extensions Administrator's Procedures January 201330

    http://www.oracle.com/pls/topic/lookup?ctx=E26505&id=REFMAN4label-encodings-4http://www.oracle.com/pls/topic/lookup?ctx=E26505_01&id=TRSOLLBLADMINhttp://www.oracle.com/pls/topic/lookup?ctx=E23823&id=WSLBLENCODEhttp://www.oracle.com/pls/topic/lookup?ctx=E23823&id=WSLBLENCODE

  • Account Label Range

    When you assign a clearance and a minimum label to a user, you define the upper and lowerboundaries of the account label range in which that user is permitted to operate. The followingequation describes the account label range, using to indicate dominated by or the same as:

    minimum label permitted label clearance

    Thus, the user is permitted to operate at any label that is dominated by the clearance as long asthat label dominates the minimum label. When a user's clearance or minimum label is notexpressly set, the defaults that are defined in the label_encodings file take effect.

    Users can be assigned a clearance and a minimum label that enable them to operate at morethan one label, or at a single label. When a user's clearance and minimum label are equal, theuser can operate at only one label.

    Session Range

    The session range is the set of labels that is available to a user during a Trusted Extensionssession. The session range must be within the user's account label range and the label range setfor the system. At login, if the user selects single-label session mode, the session range is limitedto that label. If the user selects multilabel session mode, then the label that the user selectsbecomes the session clearance. The session clearance defines the upper boundary of the sessionrange. The user's minimum label defines the lower bound. The user begins the session in aworkspace at the minimum label. During the session, the user can switch to a workspace at anylabel within the session range.

    What Labels Protect and Where Labels AppearLabels appear on the desktop and on output that is executed on the desktop, such as printeroutput.

    Applications Applications start processes. These processes run at the label of theworkspace where the application is started. An application in a labeled zone, as a file, islabeled at the label of the zone.

    Devices Data flowing through devices is controlled through device allocation and devicelabel ranges. To use a device, users must be within the label range of the device, and beauthorized to allocate the device.

    File system mount points Every mount point has a label. The label is viewable by usingthe getlabel command.

    Network interfaces IP addresses (hosts) have templates that describe their label range.Unlabeled hosts also have a default label.

    Basic Concepts of Trusted Extensions

    Chapter 1 Trusted Extensions Administration Concepts 31

  • Printers and printing Printers have label ranges. Labels are printed on body pages. Labels,handling information, and other security information is printed on the banner and trailerpages. To configure printing in Trusted Extensions, see Chapter 15, Managing LabeledPrinting (Tasks), and Labels on Printed Output in Trusted Extensions LabelAdministration.

    Processes Processes are labeled. Processes run at the label of the workspace where theprocess originates. The label of a process is visible by using the plabel command.

    Users Users are assigned a default label and a label range. The label of the user's workspaceindicates the label of the user's processes.

    Windows Labels are visible at the top of desktop windows. The label of the desktop is alsoindicated by color. The color appears on the desktop switch and above window title bars.When a window is moved to a differently labeled workspace, the window maintains itsoriginal label.

    Zones Every zone has a unique label. The files and directories that are owned by a zone areat the zone's label. For more information, see the getzonepath(1) man page.

    Basic Concepts of Trusted Extensions

    Trusted Extensions Administrator's Procedures January 201332

    http://www.oracle.com/pls/topic/lookup?ctx=E26505_01&id=TRSOLLBLADMINoverview-337http://www.oracle.com/pls/topic/lookup?ctx=E26505_01&id=TRSOLLBLADMINoverview-337http://www.oracle.com/pls/topic/lookup?ctx=E26505&id=REFMAN1getzonepath-1

  • Trusted Extensions Administration Tools

    This chapter describes the tools that are available in Trusted Extensions, the location of thetools, and the databases on which the tools operate.

    Administration Tools for Trusted Extensions on page 33 Trusted CDE Actions on page 35 Device Allocation Manager on page 36 Solaris Management Console Tools on page 38 Command Line Tools in Trusted Extensions on page 44 Remote Administration in Trusted Extensions on page 46

    Administration Tools for Trusted ExtensionsAdministration on a system that is configured with Trusted Extensions uses many of the sametools that are available in the Oracle Solaris OS. Trusted Extensions offers security-enhancedtools as well. Administration tools are available only to roles in a role workspace.

    Within a role workspace, you can access commands, actions, applications, and scripts that aretrusted. The following table summarizes these administrative tools.

    2C H A P T E R 2

    33

  • TABLE 21 Trusted Extensions Administrative Tools

    Tool Description For More Information

    /usr/sbin/txzonemgr Provides a menu-based wizard for creating,installing, initializing, and booting zones.This script replaces the Trusted CDEactions that manage zones.

    The script also provides menu items fornetworking options, name servicesoptions, and for clienting the global zone toan existing LDAP server. txzonemgr usesthe zenity command.

    See Creating Labeled Zones in TrustedExtensions Configuration Guide

    See also the zenity(1) man page.

    In Trusted CDE, actions in theTrusted_Extensions folder in theApplication Manager folder

    Used to edit local files that the SolarisManagement Console does not manage,such as /etc/system. Some actions runscripts, such as the Install Zone action.

    See Trusted CDE Actions on page 35 andHow to Start CDE Administrative Actionsin Trusted Extensions on page 53.

    In Trusted CDE, Device AllocationManager

    In Solaris Trusted Extensions (JDS),Device Manager

    Used to administer the label ranges ofdevices, and to allocate or deallocatedevices.

    See Device Allocation Manager onpage 36 and Handling Devices in TrustedExtensions (Task Map) on page 225.

    Solaris Management Console Used to configure users, roles, rights, hosts,zones, and networks. This tool can updatelocal files or LDAP databases.

    This tool can also launch thedtappsession legacy application.

    For basic functionality, see Chapter 2,Working With the Solaris ManagementConsole (Tasks), in Oracle SolarisAdministration: Basic Administration. Forinformation that is specific to TrustedExtensions, see Solaris ManagementConsole Tools on page 38.

    Solaris Management Console commands,such as smuser and smtnzonecfg

    Is the command-line interface for theSolaris Management Console.

    For a list, see Table 24.

    Label Builder Is also a user tool. Appears when a programrequires you to choose a label.

    For an example, see How to Modify aUser's Label Range in the SolarisManagement Console on page 89.

    Trusted Extensions commands Used to perform tasks that are not coveredby Solaris Management Console tools orCDE actions.

    For the list of administrative commands,see Table 25.

    Administration Tools for Trusted Extensions

    Trusted Extensions Administrator's Procedures January 201334

    http://www.oracle.com/pls/topic/lookup?ctx=E26505_01&id=TRSOLCFGtxconf-20http://www.oracle.com/pls/topic/lookup?ctx=E26505_01&id=TRSOLCFGtxconf-20http://www.oracle.com/pls/topic/lookup?ctx=E26505&id=SYSADV1smcover-1http://www.oracle.com/pls/topic/lookup?ctx=E26505&id=SYSADV1smcover-1http://www.oracle.com/pls/topic/lookup?ctx=E26505&id=SYSADV1smcover-1http://www.oracle.com/pls/topic/lookup?ctx=E26505&id=SYSADV1smcover-1

  • txzonemgr ScriptStarting in the Solaris 10 5/08 release, the txzonemgr script is used to configure labeled zones.This zenity(1) script displays a dialog box with the title Labeled Zone Manager. This GUIpresents a dynamically-determined menu that displays only valid choices for the currentconfiguration status of a labeled zone. For instance, if a zone is already labeled, the Label menuitem is not displayed.

    Trusted CDE ActionsThe following tables list the CDE actions that roles in Trusted Extensions can run. These trustedCDE actions are available from the Trusted_Extensions folder. The Trusted_Extensions folderis available from the Application Manager folder on the CDE desktop.

    TABLE 22 Administrative Actions in Trusted CDE, Their Purpose, and Associated Rights Profiles

    Action Name Purpose of Action Default Rights Profile

    Add Allocatable Device Creates devices by adding entries to device databases. Seeadd_allocatable(1M).

    Device Security

    Admin Editor Edits the specified file. See How to Edit Administrative Files inTrusted Extensions on page 54.

    Object Access Management

    Audit Classes Edits the audit_class file. See audit_class(4). Audit Control

    Audit Control Edits the audit_control file. See audit_control(4). Audit Control

    Audit Events Edits the audit_event file. See audit_event(4). Audit Control

    Audit Startup Edits the audit_startup.sh script. See audit_startup(1M). Audit Control

    Check Encodings Runs the chk_encodings command on specified encodings file.See chk_encodings(1M).

    Object Label Management

    Check TN Files Runs the tnchkdb command on tnrhdb, tnrhtp, and tnzonecfgdatabases. See tnchkdb(1M).

    Network Management

    Configure Selection

    Confirmation

    Edits /usr/dt/config/sel_config file. See sel_config(4). Object Label Management

    Create LDAP Client Makes the global zone an LDAP client of an existing LDAPdirectory service.

    Information Security

    Edit Encodings Edits the specified label_encodings file and runs thechk_encodings command. See chk_encodings(1M).

    Object Label Management

    Name Service Switch Edits the nsswitch.conf file. See nsswitch.conf(4). Network Management

    Set DNS Servers Edits the resolv.conf file. See resolv.conf(4). Network Management

    Trusted CDE Actions

    Chapter 2 Trusted Extensions Administration Tools 35

    http://www.oracle.com/pls/topic/lookup?ctx=E26505&id=REFMAN1Madd-allocatable-1mhttp://www.oracle.com/pls/topic/lookup?ctx=E26505&id=REFMAN4audit-class-4http://www.oracle.com/pls/topic/lookup?ctx=E26505&id=REFMAN4audit-control-4http://www.oracle.com/pls/topic/lookup?ctx=E26505&id=REFMAN4audit-event-4http://www.oracle.com/pls/topic/lookup?ctx=E26505&id=REFMAN1Maudit-startup-1mhttp://www.oracle.com/pls/topic/lookup?ctx=E26505&id=REFMAN1Mchk-encodings-1mhttp://www.oracle.com/pls/topic/lookup?ctx=E26505&id=REFMAN1Mtnchkdb-1mhttp://www.oracle.com/pls/topic/lookup?ctx=E26505&id=REFMAN4sel-config-4http://www.oracle.com/pls/topic/lookup?ctx=E26505&id=REFMAN1Mchk-encodings-1mhttp://www.oracle.com/pls/topic/lookup?ctx=E26505&id=REFMAN4nsswitch.conf-4http://www.oracle.com/pls/topic/lookup?ctx=E26505&id=REFMAN4resolv.conf-4

  • TABLE 22 Administrative Actions in Trusted CDE, Their Purpose, and Associated Rights Profiles (Continued)Action Name Purpose of Action Default Rights Profile

    Set Daily Message Edits the /etc/motd file. At login, the contents of this file displayin the Last Login dialog box.

    Network Management

    Set Default Routes Specifies default static routes. Network Management

    Share Filesystem Edits the dfstab file. Does not run the share command. Seedfstab(4).

    File System Management

    The following actions are used by the initial setup team during zone creation. Some of theseactions can be used for maintenance and troubleshooting.

    TABLE 23 Installation Actions in Trusted CDE, Their Purpose, and Associated Rights Profiles

    Action Name Purpose of Action Default Rights Profile

    Clone Zone Creates a labeled zone from a ZFS snapshot of an existing zone. Zone Management

    Copy Zone Creates a labeled zone from an existing zone. Zone Management

    Configure Zone Associates a label with a zone name. Zone Management

    Initialize Zone for LDAP Initializes the zone for booting as an LDAP client. Zone Management

    Install Zone Installs the system files that a labeled zone requires. Zone Management

    Restart Zone Restarts a zone that has already been booted. Zone Management

    Share Logical Interface Sets up one interface for the global zone and a separate interface for thelabeled zones to share.

    Network Management

    Share Physical Interface Sets up one interface that is shared by the global zone and the labeledzones.

    Network Management

    Shut Down Zone Shuts down an installed zone. Zone Management

    Start Zone Boots an installed zone and starts the services for that zone. Zone Management

    Zone Terminal Console Opens a console to view processes in an installed zone. Zone Management

    Device Allocation ManagerA device is either a physical peripheral that is connected to a computer or a software-simulateddevice called a pseudo-device. Because devices provide a means for the import and export ofdata to and from a system, devices must be controlled to properly protect the data. TrustedExtensions uses device allocation and device label ranges to control data flowing throughdevices.

    Device Allocation Manager

    Trusted Extensions Administrator's Procedures January 201336

    http://www.oracle.com/pls/topic/lookup?ctx=E26505&id=REFMAN4dfstab-4

  • Examples of devices that have label ranges are frame buffers, tape drives, diskette and CD-ROMdrives, printers, and USB devices.

    Users allocate devices through the Device Allocation Manager. The Device Allocation Managermounts the device, runs a clean script to prepare the device, and performs the allocation. Whenfinished, the user deallocates the device through the Device Allocation Manager, which runsanother clean script, and unmounts and deallocates the device.

    You can manage devices by using the Device Administration tool from the Device AllocationManager. Regular users cannot access the Device Administration tool.

    Note In Solaris Trusted Extensions (JDS), this GUI is named Device Manager, and the DeviceAdministration button is named Administration.

    For more information about device protection in Trusted Extensions, see Chapter 17,Managing Devices for Trusted Extensions (Tasks).

    FIGURE 21 Device Allocation Manager Icon in Trusted CDE

    Device Allocation

    FIGURE 22 Device Allocation Manager GUI

    Device Allocation Manager

    Chapter 2 Trusted Extensions Administration Tools 37

  • Solaris Management Console ToolsThe Solaris Management Console provides access to toolboxes of GUI-based administrationtools. These tools enable you to edit items in various configuration databases. In TrustedExtensions, the Solaris Management Console is the administrative interface for users, roles, andthe trusted network databases.

    Trusted Extensions extends the Solaris Management Console:

    Trusted Extensions modifies the Solaris Management Console Users tool set. For anintroduction to the tool set, see Chapter 2, Working With the Solaris Management Console(Tasks), in Oracle Solaris Administration: Basic Administration.

    Trusted Extensions adds the Security Templates tool and the Trusted Network Zones tool tothe Computers and Networks tool set.

    Solaris Management Console tools are collected into toolboxes according to scope and securitypolicy. To administer Trusted Extensions, Trusted Extensions provides toolboxes whosePolicy=TSOL. You can access tools according to scope, that is, according to naming service. Theavailable scopes are local host and LDAP.

    The Solaris Management Console is shown in the following figure. A Scope=Files TrustedExtensions toolbox is loaded, and the Users tool set is open.

    Solaris Management Console Tools

    Trusted Extensions Administrator's Procedures January 201338

    http://www.oracle.com/pls/topic/lookup?ctx=E26505&id=SYSADV1smcover-1http://www.oracle.com/pls/topic/lookup?ctx=E26505&id=SYSADV1smcover-1

  • Trusted Extensions Tools in the Solaris ManagementConsoleTrusted Extensions adds configurable security attributes to three tools:

    User Accounts tool Is the administrative interface to change a user's label, change a user'sview of labels, and to control account usage.

    Administrative Roles tool Is the administrative interface to change a role's label rangeand screen-locking behavior when idle.

    Rights tool Includes CDE actions that can be assigned to rights profiles. Security attributescan be assigned to these actions.

    FIGURE 23 Typical Trusted Extensions Toolbox in the Solaris Management Console

    Solaris Management Console Tools

    Chapter 2 Trusted Extensions Administration Tools 39

  • Trusted Extensions adds two tools to the Computers and Networks tool set:

    Security Templates tool Is the administrative interface for managing the label aspects ofhosts and networks. This tool modifies the tnrhtp and tnrhdb databases, enforces syntacticaccuracy, and updates the kernel with the changes.

    Trusted Network Zones tool Is the administrative interface for managing the label aspectsof zones. This tool modifies the tnzonecfg database, enforces syntactic accuracy, andupdates the kernel with the changes.

    Figure 24 shows the Files toolbox with the Users tool set highlighted. The Trusted Extensionstools appear below the Computers and Networks tool set.

    Security Templates ToolA security template describes a set of security attributes that can be assigned to a group of hosts.The Security Templa