Oracle Solaris Trusted Extensions Administrator's Procedures

Chapter 2 Trusted Extensions Administration Tools

This chapter describes the tools that are available in Solaris Trusted Extensions, the location of the tools, and the databases on which the tools operate.

Administration Tools for Trusted Extensions

Administration on a system that is configured with Trusted Extensions uses many of the same tools that are available in the Solaris OS. Trusted Extensions offers security-enhanced tools as well. Administration tools are available only to roles in a role workspace.

Within a role workspace, you can access commands, actions, applications, and scripts that are trusted. The following table summarizes these administrative tools.

Table 2–1 Trusted Extensions Administrative Tools

Tool 

Description 

For More Information 

/usr/sbin/txzonemgr

Provides a menu-based wizard for creating, installing, initializing, and booting zones. This script replaces the Trusted CDE actions that manage zones. 

The script also provides menu items for networking options, name services options, and for clienting the global zone to an existing LDAP server. txzonemgr uses the zenity command.

See Creating Labeled Zones in Oracle Solaris Trusted Extensions Configuration Guide

See also the zenity(1) man page.

In Trusted CDE, actions in the Trusted_Extensions folder in the Application Manager folder

Used to edit local files that the Solaris Management Console does not manage, such as /etc/system. Some actions run scripts, such as the Install Zone action.

See Trusted CDE Actions and How to Start CDE Administrative Actions in Trusted Extensions.

In Trusted CDE, Device Allocation Manager

In Solaris Trusted Extensions (JDS), Device Manager

Used to administer the label ranges of devices, and to allocate or deallocate devices. 

See Device Allocation Manager and Handling Devices in Trusted Extensions (Task Map).

Solaris Management Console 

Used to configure users, roles, rights, hosts, zones, and networks. This tool can update local files or LDAP databases. 

This tool can also launch the dtappsession legacy application.

For basic functionality, see Chapter 2, Working With the Solaris Management Console (Tasks), in System Administration Guide: Basic Administration. For information that is specific to Trusted Extensions, see Solaris Management Console Tools.

Solaris Management Console commands, such as smuser and smtnzonecfg

Is the command-line interface for the Solaris Management Console. 

For a list, see Table 2–4.

Label Builder 

Is also a user tool. Appears when a program requires you to choose a label. 

For an example, see How to Modify a User's Label Range in the Solaris Management Console.

Trusted Extensions commands 

Used to perform tasks that are not covered by Solaris Management Console tools or CDE actions. 

For the list of administrative commands, see Table 2–5.

txzonemgr Script

Starting in the Solaris 10 5/08 release, the txzonemgr script is used to configure labeled zones. This zenity(1) script displays a dialog box with the title Labeled Zone Manager. This GUI presents a dynamically-determined menu that displays only valid choices for the current configuration status of a labeled zone. For instance, if a zone is already labeled, the Label menu item is not displayed.

Trusted CDE Actions

The following tables list the CDE actions that roles in Trusted Extensions can run. These trusted CDE actions are available from the Trusted_Extensions folder. The Trusted_Extensions folder is available from the Application Manager folder on the CDE desktop.

Table 2–2 Administrative Actions in Trusted CDE, Their Purpose, and Associated Rights Profiles

Action Name 

Purpose of Action 

Default Rights Profile 

Add Allocatable Device

Creates devices by adding entries to device databases. See add_allocatable(1M).

Device Security 

Admin Editor

Edits the specified file. See How to Edit Administrative Files in Trusted Extensions.

Object Access Management 

Audit Classes

Edits the audit_class file. See audit_class(4).

Audit Control 

Audit Control

Edits the audit_control file. See audit_control(4).

Audit Control 

Audit Events

Edits the audit_event file. See audit_event(4).

Audit Control 

Audit Startup

Edits the audit_startup.sh script. See audit_startup(1M).

Audit Control 

Check Encodings

Runs the chk_encodings command on specified encodings file. See chk_encodings(1M).

Object Label Management 

Check TN Files

Runs the tnchkdb command on tnrhdb, tnrhtp, and tnzonecfg databases. See tnchkdb(1M).

Network Management 

Configure Selection Confirmation

Edits /usr/dt/config/sel_config file. See sel_config(4).

Object Label Management 

Create LDAP Client

Makes the global zone an LDAP client of an existing LDAP directory service.

Information Security 

Edit Encodings

Edits the specified label_encodings file and runs the chk_encodings command. See chk_encodings(1M).

Object Label Management 

Name Service Switch

Edits the nsswitch.conf file. See nsswitch.conf(4).

Network Management 

Set DNS Servers

Edits the resolv.conf file. See resolv.conf(4).

Network Management 

Set Daily Message

Edits the /etc/motd file. At login, the contents of this file display in the Last Login dialog box.

Network Management 

Set Default Routes

Specifies default static routes.

Network Management 

Share Filesystem

Edits the dfstab file. Does not run the share command. See dfstab(4).

File System Management 

The following actions are used by the initial setup team during zone creation. Some of these actions can be used for maintenance and troubleshooting.

Table 2–3 Installation Actions in Trusted CDE, Their Purpose, and Associated Rights Profiles

Action Name 

Purpose of Action 

Default Rights Profile 

Clone Zone

Creates a labeled zone from a ZFS snapshot of an existing zone.

Zone Management 

Copy Zone

Creates a labeled zone from an existing zone.

Zone Management 

Configure Zone

Associates a label with a zone name.

Zone Management 

Initialize Zone for LDAP

Initializes the zone for booting as an LDAP client.

Zone Management 

Install Zone

Installs the system files that a labeled zone requires.

Zone Management 

Restart Zone

Restarts a zone that has already been booted.

Zone Management 

Share Logical Interface

Sets up one interface for the global zone and a separate interface for the labeled zones to share.

Network Management 

Share Physical Interface

Sets up one interface that is shared by the global zone and the labeled zones.

Network Management 

Shut Down Zone

Shuts down an installed zone.

Zone Management 

Start Zone

Boots an installed zone and starts the services for that zone.

Zone Management 

Zone Terminal Console

Opens a console to view processes in an installed zone.

Zone Management 

Device Allocation Manager

A device is either a physical peripheral that is connected to a computer or a software-simulated device called a pseudo-device. Because devices provide a means for the import and export of data to and from a system, devices must be controlled to properly protect the data. Trusted Extensions uses device allocation and device label ranges to control data flowing through devices.

Examples of devices that have label ranges are frame buffers, tape drives, diskette and CD-ROM drives, printers, and USB devices.

Users allocate devices through the Device Allocation Manager. The Device Allocation Manager mounts the device, runs a clean script to prepare the device, and performs the allocation. When finished, the user deallocates the device through the Device Allocation Manager, which runs another clean script, and unmounts and deallocates the device.

Figure 2–1 Device Allocation Manager Icon in Trusted CDE

Shows the Device Allocation Manager icon.

You can manage devices by using the Device Administration tool from the Device Allocation Manager. Regular users cannot access the Device Administration tool.


Note –

In Solaris Trusted Extensions (JDS), this GUI is named Device Manager, and the Device Administration button is named Administration.


Figure 2–2 Device Allocation Manager GUI

Dialog box titled Device Allocation Manager shows the
devices that are available to a user, and the Device Administration button.

For more information about device protection in Trusted Extensions, see Chapter 17, Managing Devices for Trusted Extensions (Tasks).

Solaris Management Console Tools

The Solaris Management Console provides access to toolboxes of GUI-based administration tools. These tools enable you to edit items in various configuration databases. In Trusted Extensions, the Solaris Management Console is the administrative interface for users, roles, and the trusted network databases.

Trusted Extensions extends the Solaris Management Console:

Solaris Management Console tools are collected into toolboxes according to scope and security policy. To administer Trusted Extensions, Trusted Extensions provides toolboxes whose Policy=TSOL. You can access tools according to scope, that is, according to naming service. The available scopes are local host and LDAP.

The Solaris Management Console is shown in the following figure. A Scope=Files Trusted Extensions toolbox is loaded, and the Users tool set is open.

Figure 2–3 Typical Trusted Extensions Toolbox in the Solaris Management Console

The context describes the graphic.

Trusted Extensions Tools in the Solaris Management Console

Trusted Extensions adds configurable security attributes to three tools:

Trusted Extensions adds two tools to the Computers and Networks tool set:

Figure 2–4 shows the Files toolbox with the Users tool set highlighted. The Trusted Extensions tools appear below the Computers and Networks tool set.

Figure 2–4 Computers and Networks Tool Set in the Solaris Management Console

Window shows icons for the Computers and Networks tool.
The icons are for Computers, Security Templates, and the networks 127,10,
and 192.168.

Security Templates Tool

A security template describes a set of security attributes that can be assigned to a group of hosts. The Security Templates tool enables you to conveniently assign a specific combination of security attributes to a group of hosts. These attributes control how data is packaged, transmitted, and interpreted. Hosts that are assigned to a template have identical security settings.

The hosts are defined in the Computers tool. The security attributes of the hosts are assigned in the Security Templates tool. The Modify Template dialog box contains two tabs:

Trusted networking and security templates are explained in more detail in Chapter 12, Trusted Networking (Overview).

Trusted Network Zones Tool

The Trusted Network Zones tool identifies the zones on your system. Initially, the global zone is listed. When you add zones and their labels, the zone names display in the pane. Zone creation usually occurs during system configuration. Label assignment, multilevel port configuration, and label policy is configured in this tool. For details, see Chapter 10, Managing Zones in Trusted Extensions (Tasks).

Client-Server Communication With the Solaris Management Console

Typically, a Solaris Management Console client administers systems remotely. On a network that uses LDAP as a naming service, a Solaris Management Console client connects to the Solaris Management Console server that runs on the LDAP server. The following figure shows this configuration.

Figure 2–5 Solaris Management Console Client Using an LDAP Server to Administer the Network

Solaris Management Console client talking to an LDAP
server that is running a Solaris Management Console server.

Figure 2–6 shows a network that is not configured with an LDAP server. The administrator configured each remote system with a Solaris Management Console server.

Figure 2–6 Solaris Management Console Client Administering Individual Remote Systems on a Network

Solaris Management Console client talking to several
remote systems. Each system is running a Solaris Management Console server.

Solaris Management Console Documentation

The main source of documentation for the Solaris Management Console is its online help. Context-sensitive help is tied to the currently selected feature and is displayed in the information pane. Expanded help topics are available from the Help menu or by clicking links in the context-sensitive help. Further information is provided in Chapter 2, Working With the Solaris Management Console (Tasks), in System Administration Guide: Basic Administration. Also see Using the Solaris Management Tools With RBAC (Task Map) in System Administration Guide: Basic Administration.

Label Builder in Trusted Extensions

The label builder GUI enforces your choice of a valid label or clearance when a program requires you to assign a label. For example, a label builder appears during login (see Chapter 2, Logging In to Trusted Extensions (Tasks), in Oracle Solaris Trusted Extensions User’s Guide). The label builder also appears when you change the label of a workspace, or when you assign a label to a user, zone, or network interface in the Solaris Management Console. The following label builder appears when you assign a label range to a new device.

Label builder titled Device Allocation Set Minimum Label
shows the labels that can be chosen as the minimum label for a device.

In the label builder, component names in the Classification column correspond to the CLASSIFICATIONS section in the label_encodings file. The component names in the Sensitivity column correspond to the WORDS section in the label_encodings file.

Command Line Tools in Trusted Extensions

Commands that are unique to Trusted Extensions are contained in the Solaris Trusted Extensions Reference Manual. The Solaris commands that Trusted Extensions modifies are contained in the Solaris Reference Manual. The man command finds all the commands.

The following table lists commands that are unique to Trusted Extensions. The commands are listed in man page format.

Table 2–4 User and Administrative Trusted Extensions Commands

Man Page 

Trusted Extensions Modification 

For More Information 

add_allocatable(1M)

Enables a device to be allocated by adding the device to device allocation databases. By default, removable devices are allocatable. 

How to Configure a Device in Trusted Extensions

atohexlabel(1M)

Translates a label into hexadecimal format. 

How to Obtain the Hexadecimal Equivalent for a Label

chk_encodings(1M)

Checks the integrity of the label_encodings file.

How to Debug a label_encodings File in Oracle Solaris Trusted Extensions Label Administration

dtappsession(1)

Opens a remote Trusted CDE session by using the Application Manager. 

Chapter 8, Remote Administration in Trusted Extensions (Tasks)

getlabel(1)

Displays the label of the selected files or directories. 

How to Display the Labels of Mounted Files

getzonepath(1)

Displays the full pathname of a specific zone. 

Acquiring a Sensitivity Label in Oracle Solaris Trusted Extensions Developer’s Guide

hextoalabel(1M)

Translates a hexadecimal label into its readable equivalent. 

How to Obtain a Readable Label From Its Hexadecimal Form

plabel(1)

Displays the label of the current process. 

See the man page. 

remove_allocatable(1M)

Prevents allocation of a device by removing its entry from device allocation databases. 

How to Configure a Device in Trusted Extensions

setlabel(1)

Relabels the selected item. Requires the solaris.label.file.downgrade or solaris.label.file.upgrade authorization. These authorizations are in the Object Label Management rights profile.

For the equivalent GUI procedure, see How to Move Files Between Labels in Trusted CDE in Oracle Solaris Trusted Extensions User’s Guide.

smtnrhdb(1M)

Manages entries in the tnrhdb database locally or in a naming service database.

For equivalent procedures that use the Solaris Management Console, see Configuring Trusted Network Databases (Task Map).

smtnrhtp(1M)

Manages entries in the tnrhtp database locally or in a naming service database.

See the man page. 

smtnzonecfg(1M)

Manages entries in the local tnzonecfg database.

For an equivalent procedure that uses the Solaris Management Console, see How to Create a Multilevel Port for a Zone.

tnchkdb(1M)

Checks the integrity of the tnrhdb and tnrhtp databases.

How to Check the Syntax of Trusted Network Databases

tnctl(1M)

Caches network information in the kernel. 

How to Synchronize the Kernel Cache With Trusted Network Databases

tnd(1M)

Executes the trusted network daemon. 

How to Synchronize the Kernel Cache With Trusted Network Databases

tninfo(1M)

Displays kernel-level network information and statistics. 

How to Compare Trusted Network Database Information With the Kernel Cache.

updatehome(1M)

Updates .copy_files and .link_files for the current label.

How to Configure Startup Files for Users in Trusted Extensions

The following table lists Solaris commands that are modified or extended by Trusted Extensions. The commands are listed in man page format.

Table 2–5 User and Administrative Commands That Trusted Extensions Modifies

Man Page 

Purpose of Command 

For More Information 

allocate(1)

Adds options to clean the allocated device, and to allocate a device to a specific zone. In Trusted Extensions, regular users do not use this command. 

How to Allocate a Device in Trusted Extensions in Oracle Solaris Trusted Extensions User’s Guide

deallocate(1)

Adds options to clean the device, and to deallocate a device from a specific zone. In Trusted Extensions, regular users do not use this command. 

How to Allocate a Device in Trusted Extensions in Oracle Solaris Trusted Extensions User’s Guide

list_devices(1)

Adds the -a option to display device attributes, such as authorizations and labels. Adds the -d option to display the default attributes of an allocated device type. Adds the -z option to display available devices that can be allocated to a labeled zone.

See the man page. 

tar(1)

Adds the -T option to archive and extract files and directories that are labeled.

How to Back Up Files in Trusted Extensions and How to Restore Files in Trusted Extensions

auditconfig(1M)

Adds the windata_down and windata_up audit policy options.

How to Configure Audit Policy in System Administration Guide: Security Services

auditreduce(1M)

Adds the -l option to select audit records by label.

How to Select Audit Events From the Audit Trail in System Administration Guide: Security Services

automount(1M)

Modifies the names and contents of auto_home maps to account for zone names and zone visibility from higher labels.

Changes to the Automounter in Trusted Extensions

ifconfig(1M)

Adds the all-zones option to make an interface available to every zone on the system.

How to Verify That a Host's Interfaces Are Up

netstat(1M)

Adds the -R option to display extended security attributes for sockets and routing table entries.

How to Debug the Trusted Extensions Network

route(1M)

Adds the -secattr option to display the security attributes of the route: cipso, doi, max_sl, and min_sl.

How to Configure Routes With Security Attributes

Remote Administration in Trusted Extensions

You can remotely administer a system that is configured with Trusted Extensions by using the ssh command, the dtappsession program, or the Solaris Management Console. If site security policy permits, you can configure a Trusted Extensions host to enable login from a non-Trusted Extensions host, although this configuration is less secure. For more information, see Chapter 8, Remote Administration in Trusted Extensions (Tasks).