Previous Contents DocHome Index Next |
iPlanet Trustbase Transaction Manager 2.2.1 Installation and Configuration Guide |
Chapter 10 Backup
The objectives of this chapter are to cover:
What data needs backup?
Archiving for Raw Data and Init Table
What data needs backup?
The database tables employed by the iPlanet Trustbase Transaction Manager fall into two groups:
Those that are to all intents and purposes read-only (e.g. configuration information)
This next section describes the function and composition of the tables used, so that the database administrator may more accurately devise an archiving strategy.Those that are used to store large volumes of frequently written data (e.g. raw log)
What data is Read-Only?
The following tables are largely used for static read-only data. These tables are not expected to grow to large sizes, so archiving should not be required, and all data can be kept online. However these tables should be backed up initially after configuration and after any subsequent certificate or configuration changes for backup and disaster recovery purposes.
Tables comprising the certificate store. All these tables are modified only when items are added to the store, which is an infrequent occurrence.
ATTRIBUTE_KEY_ATTRS
Identrus
Used to store the attributes associated with key pairs.ATTRIBUTE_NAME_ATTRS
Used to store the attributes associated with certificatesCERT_TABLE
Used to store X509 certificatesKEY_TABLE
Used to store cryptographic key pairsREVOCATION_ATTRS
Used to store the attributes associated with Certificate Revocation Lists (CRLs)REVOCATION_SERIAL_NUM
Used to index the serial numbers of certificates revoked in CRLsREVOCATION_TABLE
Used to store encoded X509 CRLs.SALT_TABLE
Holds the salt value for the password-based authentication used in the database. This table never exceeds one entry.
CERT_DATA
Other tables
All unique certificates from Identrus MessagingBILL_DATA
Billing Records for processed Identrus Messaging
AUTHORISATION
The initialisation files *.properties and proxi.ini that can be found in /opt/Trustbase/TTM/<machine-name>
Maps role names to service namesCERTIFICATEAUTHENTICATION
Maps certificate details to rolesCONFIG
Used to store configuration data for the system. Each system element has one row in this table, so the table will only grow when new system elements are added.ROLES
Stores information about rolesUSERNAMEPASSWORDAUTH
Maps username / password combinations to roles
When utilising an HSM such as nCipher, module keys. nCipher "Security World" allows module keys to be backed. Consult the KeySafe User Guide using the Administrator Card Set.
What Tables are used for frequently written data?
The following tables are written frequently and can be expected to grow rapidly. Therefore it will be necessary to archive data from these tables as storage limits are approached. These logs contain important information that mean it is imperative to avoid loss. A regular back-up process should be in force for the following tables:
Frequently Written Data
AUDITDATA
INIT_TABLE
Stores audit log dataRAW_DATA
Stores all the raw message data entering an leaving the system. This table is used for non-repudiation purposes, and is referenced by the INIT_TABLE described below. Due to this link, the archiving procedure for both these tables should follow that described above.
Stores information relating to the integrity of the raw log tables.
Archiving for Raw Data and Init Table
For Identrus, the log init_table and raw_data table are inter linked. A raw_data record holds actual message data along with a time stamp that is digitally signed. An init_table record points to the beginning of a set of raw_data records. There are two circumstances under which archiving may take place:
The TTM instance is not running. In this case, the data in both raw_data and init_table tables may be archived using the prevailing archive strategy. Note that both tables should be archived in order to ensure that verification of the archived data operated correctly. When the system is re-started, a new initialisation record will be created in the init_table, and raw_data entries will be cryptographically chained from this.
The script can be run as follows:The TTM instance is running. In this case, the raw log verification utility should be run, in order to provide a list of the log end-points. This will give output of the form:
$ cd <TrustbaseInstallDir>/TTM/Scripts
$ ./runcheckintegrityThe following output appears:
The following is an example <install_directory/TTM/Scripts/runcheckintegrity script:
. ./setcp
CLASSPATH=$TBASE_INSTALL:$CLASSPATH
cd $TBASE_INSTALL
exec java uk.co.jcp.tbaseimpl.log.raw.tools.VerUtilEach Session holds a collection of chains, each containing a start point and an end point. All data up to these end points may now be archived. Future runs of the raw log verification utility, when an archive has taken place, will report data written subsequently as "orphan" data, but will verify and report on the data. Output will be similar to that below:
$ ./runcheckintegrity The following output appears:
RecordIds are declared valid when the signature of this record matches with the certificates held in the local database. If the recorded end points tally with the start points of the orphan data, the integrity of the log may be inferred. Provided the RecordId of subsequent verifications is less (and stated as valid) than its predecessor then integrity can be assumed. If this is not the case then either the archiving procedure has been mismanaged or somebody has deleted or tampered with some records. Under such circumstances you will need to go back and check the integrity of the archives. The fact that the second verification illustrated above shows only 710 records compared with 810 records in the first verification means that 100 records were archived between the two verification checks. Indeed all records within chains whose startpoints were less than 10 were archived.
By default the tool will check the integrity of all records in the raw log. An individual session can be checked with the command line switch
-session <Session Id> For Example:
./runcheckintegrity -session 12344
What happens when certificates expire?
In the event of any certificate expiring, a complete new set of Transaction Co-ordinator certificates will need to be generated. Before you do this it is a good idea to archive the contents of the logs as this ensures the archived logs are only signed by one set of certificates. This can be done as part of the general backup.
Note Please refer to the section on Certificate Management. The procedure for obtaining new certificates is identical to the procedure that you used to obtain them the first time.
How to do Disaster Recovery?
In the event of hardware or disk failure it will be necessary to perform a disaster recovery. By ensuring the following contents are intact through restoration from backup, a iPlanet Trustbase Transaction Manager can continue its operation.
nCipher Users only. nCipher "Security World" needs to be restored according to the KeySafe User Guide using the Administrator Card Set and the nCipher backup data.
Reinstall iPlanet Trustbase Transaction Manager, Application Server and database.
Reinstate *.properties and proxi.ini found in /opt/Trustbase/TTM/<machine-name>
Reinstate database from the backup of tables created under the user specified in the SQL script in your Installation Guide. If necessary consult your Database Administrator.
Note Refer to the installation worksheet for information about the setup of iPlanet Trustbase Transaction Manager's application server and database.
Previous Contents DocHome Index Next
Copyright © 2001 Sun Microsystems, Inc. Some preexisting portions Copyright © 2001 Netscape Communications Corp. All rights reserved.
Last Updated April 18, 2001