C H A P T E R  3

Installing and Enabling Software

This chapter describes how to install and enable Logical Domains Manager 1.0.2 software and other software on a control domain on the supported servers. Refer to “Supported Servers” in the Logical Domains (LDoms) 1.0.2 Release Notes for a list of supported servers.

You can use what you need from this chapter depending on your platform. If you are using Logical Domains software on a new Sun UltraSPARC T2 platform, all the software should come preinstalled from the factory.


Upgrading the Solaris OS

This section contains information you need to know about saving and restoring the Logical Domains constraints database file or performing a live upgrade on the control domain.

Saving and Restoring the Logical Domains Constraints Database File

Whenever you upgrade the operating system on the control domain, you must save and restore the Logical Domains constraints database file that can be found in /var/opt/SUNWldm/ldom-db.xml.



Note - You must also save and restore the /var/opt/SUNWldm/ldom-db.xml file when you perform any other operation that is destructive to the control domain’s file data, such as a disk swap.



Using Live Upgrade on the Control Domain

If you are using live upgrade on the control domain, consider adding the following line to the /etc/lu/synclist file:


/var/opt/SUNWldm/ldom-db.xml     OVERWRITE

This causes the database to be copied automatically from the active boot environment to the new boot environment when switching boot environments. For more information about /etc/lu/synclist and synchronizing files between boot environments, refer to “Synchronizing Files Between Boot Environments” in the Solaris 10 8/07 Installation Guide: Solaris Live Upgrade and Upgrade Planning.


Upgrading to LDoms 1.0.2 Software

Existing LDoms 1.0.1 configurations work in LDoms 1.0.2 software, so you do not need to perform the following procedure if you are upgrading from LDoms 1.0.1 software to LDoms 1.0.2 software. However, you do need to use the following procedure if you want to use your existing LDoms 1.0 configurations with LDoms 1.0.2 software.

procedure icon  To Upgrade From LDoms 1.0 to LDoms 1.0.2 Software

Existing LDoms 1.0 configurations do not work in LDoms 1.0.2 software. The following procedure describes a method for saving and rebuilding a configuration using XML constraints files and the -i option to the ldm start-domain command. This method does not preserve actual bindings, only the constraints used to create those bindings. This means that, after this procedure, the domains will have the same virtual resources, but will not necessarily be bound to the same physical resources.

The basic process is to save the constraints information for each domain into an XML file, which can then be re-issued to the Logical Domains Manager after the upgrade to rebuild a desired configuration. This procedure works for guest domains, not the control domain. Although you can save the control (primary) domain’s constraints to an XML file, you cannot feed it back into the ldm start-domain -i command.

  1. Update to the latest version of the Solaris OS. For more information, see Step 2, To Install the Solaris 10 OS.

  2. For each domain, create an XML file containing the domain’s constraints.


    # ldm ls-constraints -x ldom > ldom.xml
    

  3. List all the logical domain configurations stored on the system controller.


    # ldm ls-config
    

  4. Remove each logical domain configuration stored on the system controller.


    # ldm rm-config config_name
    

  5. Disable the Logical Domains Manager daemon (ldmd).


    # svcadm disable ldmd
    

  6. Remove the Logical Domains Manager package (SUNWldm).


    # pkgrm SUNWldm
    

  7. Remove the Solaris Security Toolkit package (SUNWjass) if you are using that.


    # pkgrm SUNWjass
    

  8. Flash update the system firmware. For the entire procedure, see To Upgrade System Firmware or To Upgrade System Firmware Without an FTP Server.

  9. Download the LDoms 1.0.2 software package.

    See To Download the Logical Domains Manager, Solaris Security Toolkit, and Logical Domains MIB for procedures for downloading and installing the Logical domains Manager, the Solaris Security Toolkit, and the Logical Domains MIB.

  10. Reconfigure the primary domain manually. For instructions, see To Set Up the Control Domain.

  11. Run the following commands for each guest domain’s XML file you created in Step 2.


    # ldm create -i ldom.xml
    # ldm bind-domain ldom
    # ldm start-domain ldom
    


Freshly Installing Software on the Control Domain

The first domain that is created when the Logical Domains Manager software is installed is the control domain. That first domain is named primary, and you cannot change the name. The following major components are installed on the control domain.

The Solaris OS and the system firmware must be installed on your server before you install the Logical Domains Manager. After the Solaris OS, the system firmware, and the Logical Domains Manager have been installed, the original domain becomes the control domain.

procedure icon  To Install the Solaris 10 OS

Install the Solaris 10 OS if it has not already been installed. Refer to “Required and Recommended Software” in the Logical Domains (LDoms) 1.0.2 Release Notes to find the Solaris 10 OS that you should use for this version of the Logical Domains software. Refer to your Solaris 10 OS installation guide for complete instructions for installing the Solaris OS. You can tailor your installation to the needs of your system.



Note - For logical domains, you can install the Solaris OS only to an entire disk or a file exported as a block device.



  1. Install the Solaris 10 OS.

    Minimization is optional. The Solaris Security Toolkit has the following JumpStart minimization profile for Logical Domains software:

    /opt/SUNWjass/Profiles/minimal-ldm_control.profile

  2. Install the required patches if you are installing the Solaris 10 11/06 OS. Refer to “Required Solaris 10 11/06 OS Patches” in the Logical Domains (LDoms) 1.0.2 Release Notes for the list of required patches.



    Note - If you are installing an operating system in non-English languages in a guest domain, the terminal for the console must be in the locale required by the OS installer. For example, the Solaris OS installer requires EUC locales, while the Linux installer might need Unicode locales.



procedure icon  To Upgrade System Firmware

You can find system firmware for your platform at the SunSolve site:

http://sunsolve.sun.com

Refer to “Required System Firmware Patches” in the Logical Domains (LDoms) 1.0.2 Release Notes for required system firmware by supported servers.

This procedure describes how to upgrade system firmware using the flashupdate(1M) command on your system controller.

Refer to the administration guides or product notes for the supported servers for more information about installing and updating system firmware for these servers.

  1. Shut down and power off the host server from either management port connected to the system controller: serial or network.


    # shutdown -i5 -g0 -y
    

  2. Use the flashupdate(1M) command to upgrade the system firmware, depending on your server.


    sc> flashupdate -s IP-address -f path/Sun_System_Firmware-
    x_x_x_build_nn-server-name.bin
    username: your-userid
    password: your-password
    

    Where:

    • IP-address is the IP address of your FTP server.

    • path is the location in SunSolvesm or your own directory where you can obtain the system firmware image.

    • x_x_x is the version number of the System Firmware.

    • nn is the number of the build that applies to this release.

    • server-name is the name of your server. For example, the server-name for the Sun Fire T2000 server is Sun_Fire_T2000.

  3. Reset the system controller.


    sc> resetsc -y
    

  4. Power on and boot the host server.


    sc> poweron -c
    ok boot disk
    

procedure icon  To Upgrade System Firmware Without an FTP Server

If you do not have access to a local FTP server to upload firmware to the system controller, you can use the sysfwdownload utility, which is provided with your system firmware upgrade package on the SunSolve site:

http://sunsolve.sun.com

  1. Run the following commands within the Solaris OS.


    # cd firmware_location
    # sysfwdownload system_firmware_file
    

  2. Shut down the Solaris OS instance.


    # shutdown -i5 -g0 -y
    

  3. Power off and update the firmware on the system controller.


    sc> poweroff -fy
    sc> flashupdate -s 127.0.0.1
    

  4. Reset and power on the system controller.


    sc> resetsc -y
    sc> poweron
    

procedure icon  To Downgrade System Firmware

Once you have upgraded the system firmware for use with Logical Domains software, you can downgrade the firmware to the original non–Logical Domains firmware.


Downloading Logical Domains Manager and Solaris Security Toolkit

procedure icon  To Download the Logical Domains Manager, Solaris Security Toolkit, and Logical Domains MIB

  1. Download the tar file (LDoms_Manager-1_0_2.zip) containing the Logical Domains Manager package (SUNWldm), the Solaris Security Toolkit (SUNWjass) and installation script (install-ldm), and the Logical Domains Management Information Base package (SUNWldmib.v) from the Sun Software Download site. You can find the software from this web site:

    http://www.sun.com/ldoms

  2. Unzip the zip file.


    $ unzip LDoms_Manager-1_0_2.zip
    

    The directory structure for the downloaded software is similar to the following:


EXAMPLE 3-1   Directory Structure for Downloaded Logical Domains 1.0.2 Software 
LDoms_Manager-1_0_2/
     Install/
          install-ldm
     Legal/
          Ldoms_1.0.2_Entitlement.txt
          Ldoms_1.0.2_SLA_Entitlement.txt
     Product/
          SUNWjass/
          SUNWldm.v/
          SUNWldmib.v
     README


Installing Logical Domains Manager and Solaris Security Toolkit

There are three methods of installing Logical Domains Manager and Solaris Security Toolkit software:



Note - Remember that you need to manually install the LDoms MIB software package after you install the LDoms and Solaris Security Toolkit packages. It is not automatically installed with the other packages. Refer to the Logical Domains (LDoms) Management Information Base 1.0.2 Administration Guide for more information about installing and using the LDoms MIB.



Using the Installation Script to Install the Logical Domains Manager 1.0.2 and Solaris Security Toolkit 4.2 Software

If you use the install-ldm installation script, you have several choices to specify how you want the script to run. Each choice is described in the procedures that follow.

procedure icon  To Install Using the install-ldm Script With No Options

  •   Run the installation script with no options.

    The installation script is part of the SUNWldm package and is in the Install subdirectory.


    # Install/install-ldm
    

    1. If one or more packages are previously installed, you receive this message.


      # Install/install-ldm
      ERROR: One or more packages are already installed: SUNWldm SUNWjass.
      If packages SUNWldm.v and SUNWjass are factory pre-installed, run
      install-ldm -p to perform post-install actions.  Otherwise remove the
      package(s) and restart install-ldm.
      

      If you want to perform post-installation actions only, go to To Install Using the install-ldm Script With the -p Option.

    2. If the process is successful, you receive messages similar to the following examples.

    • Code Example 3-2 shows a successful run of the install-ldm script if you choose the following default security profile:

      a) Hardened Solaris configuration for LDoms (recommended)

    • Code Example 3-3 shows a successful run of the install-ldm script if you choose the following security profile:

      c) Your custom-defined Solaris security configuration profile

      The drivers that are displayed for you to choose are drivers ending with -secure.driver. If you write a customized driver that does not end with -secure.driver, you must specify your customized driver with the install-ldm -d option. (See To Install Using the install-ldm Script With the -d Option.)


EXAMPLE 3-2   Output From Hardened Solaris Configuration for LDoms 
# Install/install-ldm
Welcome to the LDoms installer.
 
You are about to install the domain manager package that will enable
you to create, destroy and control other domains on your system. Given
the capabilities of the domain manager, you can now change the security
configuration of this Solaris instance using the Solaris Security
Toolkit.
 
Select a security profile from this list:
 
a) Hardened Solaris configuration for LDoms (recommended)
b) Standard Solaris configuration
c) Your custom-defined Solaris security configuration profile
 
Enter a, b, or c [a]: a
The changes made by selecting this option can be undone through the
Solaris Security Toolkit’s undo feature. This can be done with the
‘/opt/SUNWjass/bin/jass-execute -u’ command.
 
Installing LDoms and Solaris Security Toolkit packages.
pkgadd -n -d "/var/tmp/install/Product/Logical_Domain_Manager" -a pkg_admin SUNWldm.v
Copyright 2006 Sun Microsystems, Inc.  All rights reserved.
Use is subject to license terms.
 
Installation of <SUNWldm> was successful.
pkgadd -n -d "/var/tmp/install/Product/Solaris_Security_Toolkit" -a pkg_admin SUNWjass
Copyright 2005 Sun Microsystems, Inc.  All rights reserved.
Use is subject to license terms.
 
Installation of <SUNWjass> was successful. 
 
Verifying that all packages are fully installed.  OK.
Enabling services: svc:/ldoms/ldmd:default
Running Solaris Security Toolkit 4.2.0 driver ldm_control-secure.driver.
Please wait. . . 
/opt/SUNWjass/bin/jass-execute -q -d ldm_control-secure.driver
Executing driver, ldm_control-secure.driver
Solaris Security Toolkit hardening executed successfully; log file
/var/opt/SUNWjass/run/20070208142843/jass-install-log.txt.  It will not
take effect until the next reboot.  Before rebooting, make sure SSH or
the serial line is setup for use after the reboot.


EXAMPLE 3-3   Output From Choosing Customized Configuration Profile 
# Install/install-ldm
Welcome to the LDoms installer.
 
You are about to install the domain manager package that will enable
you to create, destroy and control other domains on your system. Given
the capabilities of the domain manager, you can now change the security
configuration of this Solaris instance using the Solaris Security
Toolkit.
 
Select a security profile from this list:
 
a) Hardened Solaris configuration for LDoms (recommended)
b) Standard Solaris configuration
c) Your custom-defined Solaris security configuration profile
 
Enter a, b, or c [a]: c
Choose a Solaris Security Toolkit .driver configuration profile from
this list
1) ldm_control-secure.driver
2) secure.driver
3) server-secure.driver
4) suncluster3x-secure.driver
5) sunfire_15k_sc-secure.driver
 
Enter a number 1 to 5: 2
The driver you selected may not perform all the LDoms-specific
operations specified in the LDoms Administration Guide.
Is this OK (yes/no)? [no] y
The changes made by selecting this option can be undone through the
Solaris Security Toolkit’s undo feature. This can be done with the
‘/opt/SUNWjass/bin/jass-execute -u’ command.
 
Installing LDoms and Solaris Security Toolkit packages.
pkgadd -n -d "/var/tmp/install/Product/Logical_Domain_Manager" -a pkg_admin SUNWldm.v
Copyright 2006 Sun Microsystems, Inc.  All rights reserved.
Use is subject to license terms.
 
Installation of <SUNWldm> was successful.
pkgadd -n -d "/var/tmp/install/Product/Solaris_Security_Toolkit" -a pkg_admin SUNWjass
Copyright 2005 Sun Microsystems, Inc.  All rights reserved.
Use is subject to license terms.
 
Installation of <SUNWjass> was successful. 
 
Verifying that all packages are fully installed.  OK.
Enabling services: svc:/ldoms/ldmd:default
Running Solaris Security Toolkit 4.2.0 driver secure.driver.
Please wait. . . 
/opt/SUNWjass/bin/jass-execute -q -d secure.driver
Executing driver, secure.driver
Solaris Security Toolkit hardening executed successfully; log file
/var/opt/SUNWjass/run/20070102142843/jass-install-log.txt.  It will not
take effect until the next reboot.  Before rebooting, make sure SSH or
the serial line is setup for use after the reboot.

procedure icon  To Install Using the install-ldm Script With the -d Option

  •   Run the installation script with the -d option to specify a Solaris Security Toolkit customized hardening driver; for example, server-secure-myname.driver.

    The installation script is part of the SUNWldm package and is in the Install subdirectory.


    # Install/install-ldm -d server-secure-myname.driver
    

    If the process is successful, you receive messages similar to that in Code Example 3-4.


EXAMPLE 3-4   Output From Successful Run of the install-ldm -d Script 
# Install/install-ldm -d server-secure.driver
The driver you selected may not perform all the LDoms-specific
operations specified in the LDoms Administration Guide.
Installing LDoms and Solaris Security Toolkit packages.
pkgadd -n -d "/var/tmp/install/Product/Logical_Domain_Manager" -a pkg_admin SUNWldm.v
Copyright 2006 Sun Microsystems, Inc.  All rights reserved.
Use is subject to license terms.
 
Installation of <SUNWldm> was successful.
pkgadd -n -d "/var/tmp/install/Product/Solaris_Security_Toolkit" -a pkg_admin SUNWjass
Copyright 2005 Sun Microsystems, Inc.  All rights reserved.
Use is subject to license terms.
 
Installation of <SUNWjass> was successful. 
 
Verifying that all packages are fully installed.  OK.
Enabling services: svc:/ldoms/ldmd:default
Running Solaris Security Toolkit 4.2.0 driver server-secure-myname.driver.
Please wait. . . 
/opt/SUNWjass/bin/jass-execute -q -d server-secure-myname.driver
Executing driver, server-secure-myname.driver
Solaris Security Toolkit hardening executed successfully; log file
/var/opt/SUNWjass/run/20061114143128/jass-install-log.txt.  It will not
take effect until the next reboot.  Before rebooting, make sure SSH or
the serial line is setup for use after the reboot.

procedure icon  To Install Using the install-ldm Script With the -d none Option

  •   Run the installation script with the -d none option to specify not to harden your system using a Solaris Security Toolkit driver.

    The installation script is part of the SUNWldm package and is in the Install subdirectory.


    # Install/install-ldm -d none
    

    If the process is successful, you receive messages similar to the example shown in Code Example 3-5.


EXAMPLE 3-5   Output From Successful Run of the install-ldm -d none Script 
# Install/install-ldm -d none
Installing LDoms and Solaris Security Toolkit packages.
pkgadd -n -d "/var/tmp/install/Product/Logical_Domain_Manager" -a pkg_admin SUNWldm.v
Copyright 2006 Sun Microsystems, Inc.  All rights reserved.
Use is subject to license terms.
 
Installation of <SUNWldm> was successful.
pkgadd -n -d "/var/tmp/install/Product/Solaris_Security_Toolkit" -a pkg_admin SUNWjass
Copyright 2005 Sun Microsystems, Inc.  All rights reserved.
Use is subject to license terms.
 
Installation of <SUNWjass> was successful. 
 
Verifying that all packages are fully installed.  OK.
Enabling services: svc:/ldoms/ldmd:default
Solaris Security Toolkit was not applied. Bypassing the use of the
Solaris Security Toolkit is not recommended and should only be
performed when alternative hardening steps are to be taken.

procedure icon  To Install Using the install-ldm Script With the -p Option

You might use this option if the SUNWldm and SUNWjass packages are preinstalled on your server and you want to perform the post-installation actions of enabling the Logical Domains Manager daemon (ldmd) and running the Solaris Security Toolkit.

  •   Run the installation script with the -p option to perform only the post-installation actions of enabling ldmd and running the Solaris Security Toolkit to harden your system.


    # Install/install-ldm -p
    Verifying that all packages are fully installed.  OK.
    Enabling services: svc:/ldoms/ldmd:default
    Running Solaris Security Toolkit 4.2.0 driver ldm_control-secure.driver.
    Please wait. . .
    /opt/SUNWjass/bin/jass-execute -q -d ldm_control-secure.driver
    Solaris Security Toolkit hardening executed successfully; log file
    var/opt/SUNWjass/run/20070515140944/jass-install-log.txt.  It will not
    take effect until the next reboot.  Before rebooting, make sure SSH or
    the serial line is setup for use after the reboot.
    

Using JumpStart to Install the Logical Domains Manager 1.0.2 and Solaris Security Toolkit 4.2 Software

Refer to JumpStart Technology: Effective Use in the Solaris Operating Environment for complete information about using JumpStart.



caution icon

Caution - Do not disconnect from the virtual console during a network installation.



procedure icon  To Set Up a JumpStart Server

  • If you have already set up a JumpStart server, proceed to To Install Using JumpStart Software of this administration guide.

  • If you have not already set up a JumpStart server, you must do so.

    Refer to the Solaris 10 11/06 Installation Guide: Custom JumpStart and Advanced Installation for complete information about this procedure. You can find this installation guide at:

    http://docs.sun.com/app/docs/doc/819-6397

  1. Refer to Chapter 3 “Preparing Custom JumpStart Installations (Tasks)” in the Solaris 10 11/06 Installation Guide: Custom JumpStart and Advanced Installation, and perform the following steps.

    1. Read the task map in “Task Map: Preparing Custom JumpStart Installations.”

    2. Set up networked systems with the procedures in “Creating a Profile Server for Network Systems.”

    3. Create the rules file with the procedure in “Creating the rules File.”

  2. Validate the rules file with the procedure in “Validating the rules File.”

    The Solaris Security Toolkit provides profiles and finish scripts. Refer to the Solaris Security Toolkit 4.2 Reference Manual for more information about profiles and finish scripts.

procedure icon  To Install Using JumpStart Software

  1. Change to the directory where you have downloaded the Solaris Security Toolkit package (SUNWjass).


    # cd /path-to-download
    

  2. Install SUNWjass so that it creates the JumpStart (jumpstart) directory structure.


    # pkgadd -R /jumpstart -d . SUNWjass
    

  3. Use your text editor to modify the /jumpstart/opt/SUNWjass/Sysidcfg/Solaris_10/sysidcfg file to reflect your network environment.

  4. Copy the /jumpstart/opt/SUNWjass/Drivers/user.init.SAMPLE file to the /jumpstart/opt/SUNWjass/Drivers/user.init file.


    # cp user.init.SAMPLE user.init
    

  5. Edit the user.init file to reflect your paths.

  6. To install the Solaris Security Toolkit package (SUNWjass) onto the target system during a JumpStart install, you must place the package in the JASS_PACKAGE_MOUNT directory defined in your user.init file. For example:


    # cp -r /path/to/LDoms_Manager-1_0_2/Product/SUNWjass /jumpstart/opt/SUNWjass/Packages
    

  7. To install the Logical Domains Manager package (SUNWldm.v) onto the target system during a JumpStart install, you must place the package from the download area in the JASS_PACKAGE_MOUNT directory defined in your user.init file. For example:


    # cp -r /path/to/LDoms_Manager-1_0_2/Product/SUNWldm.v /jumpstart/opt/SUNWjass/Packages
    

  8. If you experience problems with a multihomed JumpStart server, modify the two entries in the user.init file for JASS_PACKAGE_MOUNT and JASS_PATCH_MOUNT to the correct path to the JASS_HOME_DIR/Patches and JASS_HOME_DIR/Packages directories. Refer to the comments in the user.init.SAMPLE file for more information.

  9. Use the ldm_control-secure.driver as the basic driver for the Logical Domains Manager control domain.

    Refer to Chapter 4 in the Solaris Security Toolkit 4.2 Reference Manual for information about how to modify the driver for your use. The main driver in the Solaris Security Toolkit that is the counterpart to the ldm_control-secure.driver is the secure.driver.

  10. After completing the modifications to the ldm_control-secure.driver, make the correct entry in the rules file.

    • If you want to minimize the LDoms control domain, specify the minimal-ldm-control.profile in your rules file similar to the following.


      hostname imbulu - Profiles/minimal-ldm_control.profile Drivers/ldm_control-secure-abc.driver
      



      Note - Remember that you need to manually install the LDoms MIB software package after you install the LDoms and Solaris Security Toolkit packages. It is not automatically installed with the other packages. Refer to the Logical Domains (LDoms) Management Information Base 1.0.2 Administration Guide for more information about installing and using the LDoms MIB.



    • If you do not want to minimize the LDoms control domain, your entry should be similar to the following.


      hostname imbulu - Profiles/oem.profile Drivers/ldm_control-secure-abc.driver
      

  11. If you undo hardening during a JumpStart install, you must run the following SMF command to restart the Logical Domains Manager.


    # svcadm enable svc:/ldoms/ldmd:default
    

Installing Logical Domains Manager and Solaris Security Toolkit Software Manually

Perform the following procedures to install the Logical Domains Manager and Solaris Security Toolkit Software manually:

procedure icon  To Install the Logical Domains Manager (LDoms) 1.0.2 Software Manually

Download the Logical Domains Manager 1.0.2 software, the SUNWldm package, from the Sun Software Download site. See To Download the Logical Domains Manager, Solaris Security Toolkit, and Logical Domains MIB for specific instructions.

  1. Use the pkgadd(1M) command to install the SUNWldm.v package. Use the -G option to install the package in the global zone only and the -d option to specify the path to the directory that contains the SUNWldm.v package.


    # pkgadd -Gd . SUNWldm.v
    

  2. Answer y for yes to all questions in the interactive prompts.

  3. Use the pkginfo(1) command to verify that the SUNWldm package for Logical Domains Manager 1.0.2 software is installed.

    The revision (REV) information shown below is an example.


    # pkginfo -l SUNWldm | grep VERSION
    VERSION=1.0.2,REV=2007.08.23.10.20
    

procedure icon  (Optional) To Install the Solaris Security Toolkit 4.2 Software Manually

If you want to secure your system, download and install the SUNWjass package. The required patches (122608-03 and 125672-01) are included in the SUNWjass package. See To Download the Logical Domains Manager, Solaris Security Toolkit, and Logical Domains MIB for specific instructions about downloading the software.

See Chapter 2 in this document for more information about security considerations when using Logical Domains Manager software. For further reference, you can find Solaris Security Toolkit 4.2 documentation at:

http://docs.sun.com

  1. Use the pkgadd(1M) command to install the SUNWjass package.


    # pkgadd -d . SUNWjass
    

  2. Use the pkginfo(1) command to verify that the SUNWjass package for Solaris Security Toolkit 4.2 software is installed.


    # pkginfo -l SUNWjass | grep VERSION
    VERSION: 4.2.0
    

procedure icon  (Optional) To Harden the Control Domain Manually

Perform this procedure only if you have installed the Solaris Security Toolkit 4.2 package.



Note - When you use the Solaris Security Toolkit to harden the control domain, you disable many system services and place certain restrictions on network access. Refer to Related Documentation in this book to find Solaris Security Toolkit 4.2 documentation for more information.



  1. Harden using the ldm_control-secure.driver.


    # /opt/SUNWjass/bin/jass-execute -d ldm_control-secure.driver
    

    You can use other drivers to harden your system. You can also customize drivers to tune the security of your environment. Refer to the Solaris Security Toolkit 4.2 Reference Manual for more information about drivers and customizing them.

  2. Answer y for yes to all questions in the interactive prompts.

  3. Shut down and reboot your server for the hardening to take place.


    # /usr/sbin/shutdown -y -g0 -i6
    

procedure icon  To Validate Hardening

  •   Check whether the Logical Domains hardening driver (ldom_control-secure.driver) applied hardening correctly.

    If you want to check on another driver, substitute that driver’s name in this command example.


    # /opt/SUNWjass/bin/jass-execute -a ldom_control-secure.driver
    

procedure icon  To Undo Hardening

  1. Undo the configuration changes applied by the Solaris Security Toolkit.


    # /opt/SUNWjass/bin/jass-execute -u
    

    The Solaris Security Toolkit asks you which hardening runs you want to undo.

  2. Select the hardening runs you want to undo.

  3. Reboot the system so that the unhardened configuration takes place.


    # /usr/sbin/shutdown -y -g0 -i6
    



    Note - If you undo hardening that was performed during a JumpStart installation, you must run the following SMF commands to restart the Logical Domains Manager and the Virtual Network Terminal Server Daemon.




    # svcadm enable svc:/ldoms/ldmd:default
    


Enabling the Logical Domains Manager Daemon

The installation script install-ldm automatically enables the Logical Domains Manager Daemon (ldmd). If you have installed the Logical Domains Manager software manually, you must enable the Logical Domains Manager daemon, ldmd, which allows you to create, modify, and control the logical domains.

procedure icon  To Enable the Logical Domains Manager Daemon

  1. Use the svcadm(1M) command to enable the Logical Domains Manager daemon, ldmd.


    # svcadm enable ldmd
    

  2. Use the ldm list command to verify that the Logical Domains Manager is running.

    You receive a message similar to the following, which is for the factory-default configuration. Note that the primary domain is active, which means that the Logical Domains Manager is running.


    # /opt/SUNWldm/bin/ldm list
    NAME             STATE    FLAGS   CONS    VCPU  MEMORY   UTIL  UPTIME
    primary          active   ---c-   SP      32    3264M    0.3%  19d 9m
    


Creating Authorization and Profiles and Assigning Roles for User Accounts

You set up authorization and profiles and assign roles for user accounts using the Solaris OS Role-Based Access Control (RBAC) adapted for the Logical Domains Manager. Refer to the Solaris 10 System Administrator Collection for more information about RBAC.

Authorization for the Logical Domains Manager has two levels:

Following are the Logical Domains entries automatically added to the Solaris OS /etc/security/auth_attr file:

Managing User Authorizations

procedure icon  To Add an Authorization for a User

Use the following steps as necessary to add authorizations in the /etc/security/auth_attr file for Logical Domains Manager users. Because the superuser already has solaris.* authorization, the superuser already has permission for solaris.ldoms.* authorizations.

  1. Create a local user account for each user who needs authorization to use the ldm(1M) subcommands.



    Note - To add Logical Domains Manager authorization for a user, a local (non-LDAP) account must be created for that user. Refer to the Solaris 10 System Administrator Collection for details.



  2. Do one of the following depending on which ldm(1M) subcommands you want the user to be able to access.

    See TABLE 2-1 for a list of ldm(1M) commands and their user authorizations.

    • Add a read-only authorization for a user using the usermod(1M) command.


      # usermod -A solaris.ldoms.read username
      

    • Add a read and write authorization for a user using the usermod(1M) command.


      # usermod -A solaris.ldoms.write username
      

procedure icon  To Delete All Authorizations for a User

  •   Delete all authorizations for a local user account (the only possible option).


    # usermod -A ‘‘ username
    

Managing User Profiles

The SUNWldm package adds two system-defined RBAC profiles in the /etc/security/prof_attr file for use in authorizing access to the Logical Domains Manager by non-superusers. The two LDoms-specific profiles are:

One of the preceding profiles can be assigned to a user account using the following procedure.

procedure icon  To Add a Profile for a User

  •   Add an administrative profile for a local user account; for example, LDoms Management.


    # usermod -P “LDoms Management” username
    

procedure icon  To Delete All Profiles for a User

  •   Delete all profiles for a local user account (the only possible option).


    # usermod -P ‘‘ username
    

Assigning Roles to Users

The advantage of using this procedure is that only a user who has been assigned a specific role can assume the role. In assuming a role, a password is required if the role is given a password. This provides two layers of security. If a user has not been assigned a role, then the user cannot assume the role (by doing the su role_name command) even if the user has the correct password.

procedure icon  To Create a Role and Assign the Role to a User

  1. Create a role.


    # roleadd -A solaris.ldoms.read ldm_read
    

  2. Assign a password to the role.


    # passwd ldm_read
    

  3. Assign the role to a user; for example, user_1.


    # useradd -R ldm_read user_1
    

  4. Assign a password to the user (user_1).


    # passwd user_1
    

  5. Assign access only to the user_1 account to become the ldm_read account.


    # su user_1
    

  6. Type the user password when or if prompted.

  7. Verify the user ID and access to the ldm_read role.


    $ id
    uid=nn(user_1) gid=nn(<group name>)
    $ roles
    ldm_read
    

  8. Provide access to the user for ldm subcommands that have read authorization.


    # su ldm_read
    

  9. Type the user password when or if prompted.

  10. Type the id command to show the user.


    $ id
    uid=nn(ldm_read) gid=nn(<group name>)