This section provides security-based troubleshooting information.
The Sun N1 System Manager Server uses strong encryption techniques to ensure secure communication between the management server and each managed server.
The keys used by the Sun N1 System Manager are stored under the /etc/opt/sun/cacao/security directory on each server where the servers are running Linux. These keys should be identical across all servers. For servers running the Solaris OS, these keys are stored under the /etc/opt/SUNWcacao/security directory.
Under normal operation, these keys can be left in their default configuration. You might have to regenerate security keys. For example, if there is a risk that the root password of the management server has been exposed or compromised, regenerate the security keys.
On the management server as root, stop the common agent container management daemon.
If the management server is running Linux:
# /opt/sun/cacao/bin/cacaoadm stop |
If the management server is running the Solaris OS:
# /opt/SUNWcacao/bin/cacaoadm stop |
Regenerate security keys using the create-keys subcommand.
If the management server is running Linux:
# /opt/sun/cacao/bin/cacaoadm create-keys --force |
If the management server is running the Solaris OS:
# /opt/SUNWcacao/bin/cacaoadm create-keys --force |
As root on the management server, restart the common agent container management daemon.
If the management server is running Linux:
# /opt/sun/cacao/bin/cacaoadm start |
If the management server is running the Solaris OS:
# /opt/SUNWcacao/bin/cacaoadm start |
The following list provides general security considerations that you should be aware of when you are using the N1 System Manager:
The JavaTM Web Console that is used to launch the N1 System Manager's browser interface uses self-signed certificates. These certificates should be treated with the appropriate level of trust by clients and users.
The terminal emulator applet that is used by the browser interface for the serial console feature does not provide a certificate-based authentication of the applet. The applet also requires that you enable SSHv1 for the management server. For certificate-based authentication or to avoid enabling SSHv1, use the serial console feature by running the connect command from the n1sh shell.
SSH fingerprints that are used to connect from the management server to the provisioning network interfaces on the provisionable servers are automatically acknowledged by the N1 System Manager software. This automation might make the provisionable servers vulnerable to “man-in-the middle” attacks.
The Web Console (Sun ILOM Web GUI) autologin feature for Sun Fire X4100 and Sun Fire X4200 servers exposes the server's service processor credentials to users who can view the web page source for the Login page. To avoid this security issue, disable the autologin feature by running the n1smconfig utility. See Configuring the N1 System Manager System in Sun N1 System Manager 1.1 Installation and Configuration Guide for details.