Solaris ISP Server 2.0 Administration Guide

Solaris ISP Server Platform Software

Solaris ISP Server includes the following enhancements to the Solaris operating system:

Sun Internet Administrator Overview

Sun Internet Administrator provides secure central management for distributed ISP services. It gives ISPs the following benefits:

Sun Internet Administrator supports services in two architectures: three-tier and two-tier. Only the three-tier architecture receives all of the listed security benefits. Four types of application interfaces are supported:

Three-Tier Service Architecture

The recommended three-tier browser-based application architecture receives all Sun Internet Administrator security benefits.

Figure 1-5 Three-Tier ISP Service Architecture

Graphic

As shown in Figure 1-5, an administrator uses the following steps to access a service's administration functions:

  1. From a browser, the administrator accesses either http://<hostname>:50080/ispmc or https://<hostname>:50087/ispmc (the location of the main Sun Internet Administrator GUI page).

    The AWC is downloaded to the client browser, and the administrator chooses a service to manage.

  2. Sun Internet Administrator prompts the administrator for user name and password. The administrator need not use a UNIX account for access to the user interface; a directory services repository (Sun Directory Services) manages administrator information for Sun Internet Administrator. This connection should be secured by using secure HTTP.

    The selected service resolves to a URL, designating the services's ASCA. The server agent GUI is downloaded to the administrator's browser in response. At this step, control passes to the service's administration program.

  3. Subsequent access is directly between the client browser and the application's server agent on the AWS.

    The AWS authenticates the administrator against the directory services, and logs each administrator request via syslog. If the administrator has appropriate access, requests are passed to the ASCA. If not, access is denied and a log entry is made.

  4. The ASCA communicates with the ASRA via a protocol independent of Sun Internet Administrator (chosen by the developer of the service). Appropriate IP-level security measures should be taken to protect this connection and its traffic.

    The ASRA again authenticates and logs each administrator action.

To secure the communications for three-tier applications, we recommend using SSL or SunScreenTM SKIP on the client browser connection and SunScreen SKIP on all other intercomputer connections.

ASCA and ASRA modules for command-line and X-based programs are provided in Solaris ISP Server. Sun Internet Administrator uses them automatically when you register these applications.

Two-Tier Service Architecture

For some applications, especially existing services, a two-tier architecture for access via Sun Internet Administrator is more practical. These services can be managed from Sun Internet Administrator, but do not receive the security benefits of single sign-on and central logging (though they can do their own logging in syslog).

Figure 1-6 Two-Tier ISP Service Architecture

Graphic

As shown in Figure 1-6, an administrator uses the following steps to access a service's administration functions:

  1. From a browser, the administrator accesses either http://<hostname>:50080/ispmc or https://<hostname>:50087/ispmc (the location of the main Sun Internet Administrator GUI page).

    This step is the same as for the three-tier architecture. The AWC is downloaded to the client browser, where the administrator can choose a service to manage.

    The selected service resolves to a URL, designating the component's user interface.

  2. Subsequent access is directly between the client browser and the service's remote agent. Appropriate IP-level security measures should be taken to protect this connection and its traffic.

In a two-tier architecture, services are not able to take advantage of the single sign-on feature. If a two-tier web-based application uses Sun WebServer to support its user interface, it can configure the web server to provide the same service-level access protection as a three-tier application enjoys. See Chapter 7, Integrating Existing Service Applications for information on this configuration.

To secure the communications for a two-tier application, we recommend using SSL or SunScreen SKIP.

Restoring the Administration Web Server Configuration

Sun Internet Administrator uses an instance of Sun WebServer to support its web-based user interface. This web server is referred to as the administration web server (AWS). You can, reconfigure the AWS to suit your requirements, for example to use SSL for security reasons.

Refer to the Sun WebServer online help to reconfigure the AWS. In particular, see httpd.conf(4) and the Sun WebServer on line help for configuring SSL. The web server instance that is the AWS is called "aws" in the Sun WebServer user interface.

To ensure that you do not lose the default configuration, this section discusses the location of the default AWS configuration files and the method to restore the default settings.

Backups of the AWS default configuration files are located in /etc/opt/SUNWixamc/awsconf/default/*. The files in use are at /var/opt/SUNWixamc/awsconf. To restore the default settings:

cp /etc/opt/SUNWixamc/awsconf/default/*.* /var/opt/SUNWixamc/awsconf/.

Ensure that adm has read and write access to all files.


Note -

For the effective functioning of Sun Internet Administrator, do not change the default settings in aws.conf, site.conf, map.conf, realms.conf, and access.acl.


Host Configuration Software Overview

The Solaris ISP Server host configuration software provides the following functionality:

How Solaris ISP Server Installs

Because the typical UNIX server must run a variety of applications, the default Solaris installation assumes that most UNIX services are needed. ISPs focus more narrowly on providing specific services in a public environment. They have heavy performance and security requirements.

To configure Solaris to their needs, ISP administrators typically perform elaborate hardening tasks. They disable unneeded Solaris services and change file permissions to close security vulnerabilities. This process can take hours.

The host configuration software in Solaris ISP Server automates this hardening process for the administrator. In addition to copying the necessary software packages to their proper locations, it hardens the underlying Solaris foundation, changing file owners and modes where appropriate as well as configuring Solaris security and logging mechanisms. The final step in this process is selectively disabling standard Solaris services (such as finger or rlogin) when they do not support the purpose of a given host machine. The administrator controls which services are disabled.

Solaris ISP Server host configuration can be performed interactively by using its graphical user interface, or repeatably and non-interactively using JumpStart.

Host Configuration Model

The configuration process works by building a scenario of the current state of the system, what software components are available to be installed, and what the user has selected for install or uninstall.

Figure 1-7 Solaris ISP Server Host Configuration Process

Graphic

The host configuration software can also be used to reconfigure a host after installation, adding and removing services as needed.

Repeatable Configuration

Interactive host configuration (using the graphical user interface) provides the option to save a configuration scenario (in the form of a binary and some associated files). By creating and saving a scenario, the ISP administrator can use it in a JumpStart finish script, forming a non-interactive, one-step installation. Such JumpStart installations are repeatable and can be used to configure multiple machines identically.

JumpStart is a part of the Solaris operating system that can perform customized, repeatable installations of Solaris both locally and remotely. See the Solaris Advanced Installation Guide for details on how to create a custom JumpStart installation. See the Solaris ISP Server Installation Guide and the hcjump(1M) man page for information on how to use a scenario file in a finish script for a custom JumpStart installation.

Log File Management and Intrusion Detection

The host configuration software includes a resident daemon, hclfmd, that performs log file management. This daemon runs as root. It starts at boot time and performs the following functions:

Security Hardening

This Solaris ISP Server component can be installed to ensure security for passwords and to safeguard file permissions to the file owner. The functionality of this unit is similar to the functionality of the script in ftp://ftp.wins.uva.nl/pub/solaris/fix-modes.tar.gz.

Sun Internet Services Monitor

The performance monitoring software allows an ISP to set up client machines that emulate a subscriber's experience with the ISP services. The performance monitoring applet can be set to connect to any combination of web, mail, news, and directory services and collect information on their performance from a subscriber's perspective. This data is collected on the monitoring server machine and viewable with a web browser.

Sun Internet Services Monitor is a two-tier application. It is manageable through Sun Internet Administrator, but does not receive the benefits of single sign-on or administrator authentication. See "Two-Tier Service Architecture" for more information on the two-tier architecture.

Sun Directory Services

This Lightweight Directory Access Protocol (LDAP) implementation provides a shared repository for user, administrator, and service configuration information. Features in this release of Sun Directory Services include:

Sun Directory Services is manageable from Sun Internet Administrator as an X-based application (three-tier).

Sun Directory Services allows one thousand entries in the directory before requiring a license. A license certificate for five thousand entries ships with Solaris ISP Server and must be redeemed and registered with the FlexLM license server before it takes effect. See the instructions in the Solaris ISP Server Installation Guide for details of redeeming and installing the license certificate. Additional licenses are available from your sales representative.

See Chapter 3, Using Directory Services and Chapter 6, Solaris ISP Server Directory Schema of this book for information about the role of Sun Directory Services in Solaris ISP Server.

FlexLM License Server

The FlexLM license server is used by Sun Directory Services to manage licenses of various sizes. If you already have a license server in your network (version 4.1), you can use it to serve Sun Directory Services licenses. Otherwise, install the software provided.

Sun Directory Services allows one thousand entries before requiring a license. This is sufficient to install and initialize the directory. A five thousand entry license is supplied with Solaris ISP Server. Follow the directions in the Solaris ISP Server Installation Guide for acquiring a license key and configuring the server.

ISP Directory Information API

This API provides C and Java programming language access to the directory services. The functions return information specific to the directory information tree (DIT) used by Solaris ISP Server.

LDAP Client Library

The LDAP client library is an implementation of the LDAP v3 standard. It provides support for client applications communicating with an LDAP server such as Sun Directory Services.

Sun Internet Mail Server Interoperability Support

This set of configuration files and scripts installs with the Sun Directory Services component. Once the directory and Sun Internet Mail Server are installed on their respective machines, a series of configuration steps aligns the two directory stores and sets up the Sun Internet Mail Server directory as a replicant (slave) of the main directory services. User information is shared across the two directories, but managed centrally from the master directory.

For complete information on configuring SIMS and the directory for interoperation, see the Solaris ISP Server 2.0 Installation Guide.

SunScreen SKIP

SunScreenTM SKIP is based on the Simple Key Management for Internet Protocols (SKIP) standard of key management for IP encryption. Characteristics of SunScreen SKIP include:

SunScreen SKIP provides 40-bit or 128-bit encryption, depending upon your local and United States export restrictions.

HotJava Browser

The HotJava browser is provided with Solaris ISP Server to support Sun Internet Administrator and other administration user interfaces in the product. It supports the following Internet standards and protocols:

Java Development Kit

The Java Development Kit (JDK) is provided with Solaris ISP Server to support the use of Java in the product. The Solaris JDK includes the following capabilities: