Trusted Solaris Administration Overview

Security Families

Network administration in the Trusted Solaris environment is based on the concept of security families, that is, treating host machines with common protocols and identical security requirements the same way. For a host to be able to communicate with other hosts on a Trusted Solaris network, you must identify its host type, that is, its networking protocol, and assign it a template of security attributes.

Host Types in Networking

Trusted Solaris classifies host types according to the networking protocols as follows:


Note -

The TSIX, CIPSO, and RIPSO host types lie in the category of hosts running other trusted operating environments. The unlabeled host type is intended for those hosts that use the standard networking protocol and do not support security attributes.


Networking Security Attributes

The security attributes that can be specified in networking templates are:

Networking Templates

The purpose of the Trusted Solaris networking templates is to specify the security attribute values to be applied to hosts within a security family. Not all of the security attributes are appropriate to each host type. The following table indicates how security attributes are applied to which host types. The term default means that the attribute is supplied by default. Optional means that is your choice whether to use this default. Not allowed means that any entry will be ignored. Required with or without conditions means the attribute is mandatory.

Table 3-1 Security Attributes by Host Type

Host Types --> Security Attributes 

Trusted Solaris 

TSIX 

Unlabeled 

CIPSO 

RIPSO 

minimum label 

default 

default 

default 

default 

default 

maximum label 

default 

default 

default 

default 

default 

default label 

not allowed 

not allowed 

default 

not allowed 

default 

default clearance 

not allowed 

not allowed 

default 

default 

default 

 DOI

optional 

optional 

optional 

optional 

optional 

IP label 

optional 

optional 

optional 

optional 

optional 

forced privileges 

not allowed 

not allowed 

default 

default 

default 

allowed privileges 

default 

default 

not allowed 

not allowed 

not allowed 

RIPSO Send Class 

required if host or IP label is RIPSO 

not allowed 

required if host or IP label is RIPSO 

not allowed  

required 

RIPSO Send PAF 

required if host or IP label is RIPSO 

not allowed 

required if host or IP label is RIPSO 

not allowed 

required 

 RIPSO Return PAF

required if host or IP label is RIPSO 

not allowed 

required if host or IP label is RIPSO 

not allowed 

required 

Network Configuration Databases

There are three network configuration databases for establishing external communication:

These databases are loaded into the kernel and are used in accreditation checks as data is transmitted from one host to another. These databases are maintained using the Computers and Security Families dialog boxes in the SMC Computers and Networks tool and the SMC Interface Manager. Trusted Solaris can use a naming service for central management of the tnrhdb and tnrhtp databases; the tnidb database is maintained separately on each host.

Network host information is stored in the tnrhdb(4) database. It holds the IP addresses for all hosts permitted to communicate with workstations in the network and the templates (from the tnrhtp database) assigned to them. The tnrhdb database can also hold default values as part of a fallback mechanism. Substituting 0 in the rightmost byte(s) of the IP address serves as a wildcard for unlisted hosts with IP addresses that match the non-zero portion of the default. You can also set a fixed prefix length by adding a slash (/) followed by the number of fixed bits. See the following table for examples.

Table 3-2 tnrhdb Fallback Mechanisms Example

tnrhdb Entry 

Addresses Covered 

129.150.118.0:tsol 

addresses beginning with 129.150.118. 

129.150.0.0:tsol 

addresses beginning with 129.150. 

129.0.0.0:tsol 

addresses beginning with 129. 

0.0.0.0:tsol 

all addresses on network 

129.150.118.128/26:tsol 

addresses from 129.150.118.0 to 129.150.118.63 

Network template information is stored in the tnrhtp(4) database. In a homogeneous network, only one template is needed; in a heterogeneous network, you need a separate template for each type of host. The attributes in the templates provide attributes from incoming data. They also provide destination information for outgoing data and are use in accreditation checks for incoming packets.

The tnidb(4) database is local to each host. It contains the host's network interfaces with their accreditation ranges. Default values for labels, clearances, effective UIDs/GIDs, and forced privileges apply to communications to and from hosts running environments that do not support these attributes. Note that any default values set in tnrhtp override the values in tnidb. By default, the file is empty because default values are used for all interfaces.