Home

USER MANUAL - InfoCenter

image

Contents

1. Following it is an signifying which option has been selected To change the option simply highlight the device and hit Enter the will cycle between each option Once you have set everything up hit Ok to continue There is a Back button in the next dialog box if you choose to come back here and make changes 3 2 5 NIC Static Configuration If you selected any static devices you will be brought to the dialog to configure static interfaces NOTE DHCP and PPPoE devices will be listed here but can not be edited If you wish to change these you will need to hit the Back button In this dialog box each network card will have four categories IP Address Gate way Netmask and Network If these terms are unfamiliar to you consult with your service provider IP Address An IP address is a unique number used to identify a computer on a network Generally you can purchase a block of IP addresses you are allowed to use on the Internet or are assigned one or more IP addresses from your service provider Enter the IP address you want to assign to the EnGarde machine Gateway To give a computer the ability to talk to computers on another network they must communicate through a gateway Enter this IP address here Netmask The netmask defines a network within the larger network called a sub net The netmask defines the subnet mask Enter the appropriate subnet mask for the network generally 255 255 255 0 Network The network
2. 00 Creating a Secure Virtual Host Editing a Virtual Host 0 2 200 Web Site Directory Structure 0 Set Up Name Virtual Hosts 0 0 Configure Web Site Log Analysis User Account Administration 0 FTP Configuration 00 Secure Shell Management 51 52 52 54 56 56 58 60 72 74 74 76 77 81 84 ii iii 4 5 4 6 4 7 44 4 MailServerManagement 87 44 5 DNS Management 92 4 4 6 DHCP Server Configuration 108 4 4 7 Windows File Sharing 111 44 8 Network Configuration 117 44 9 Broadband Connectivity 123 44 10 PrinterSetup e s sa motna aai Posi ee e a 126 4 4 11 Quota Setups 8 a wd bale a ek wk OE Ba 127 4 4 12 Change System Time 0 132 EnGarde Auditing System EAS 00 0 134 4 5 1 SystemGraphs 00 0 134 45 2 SOLVICES Ga eee be ek etal Bae eS S 135 45 3 Website Logs i a osa rasti dae de eek be a a Bl 136 45 4 SystemReports 00 136 4 5 5 Process Information 137 4 5 6 System Control aaa a 137 4 5 7 Edit Configuration aoaaa 138 SECUritY se Satie a aoa e bk Ch ata tae E a 140 4 6 1 Change WebTool Password 140 4 6 2 Change Administrator E Mail Address 141 4 6 3 Edit
3. 02 0002 ee eee 10 2 3 Security Planning and Policy 00 10 3 INSTALLING ENGARDE SECURE PROFESSIONAL 12 3 1 System Requirements 00 0 13 3 2 The EnGarde Secure Professional Installer 14 3 2 1 Partitioning 3 6558 ep eae ph ea Se ees 16 3 2 2 Package Selections 0 29 3 2 3 Networking 2 bso Oo Sle kd ea Park dee eels 31 3 2 4 NIC Options 2 5 0 6 4065 se Pee ee ee a a 32 3 3 3 4 3 5 3 2 5 3 2 6 3 2 7 3 2 8 3 2 9 3 2 10 3 2 11 3 2 12 Configuring the Client Machine Connecting to EnGarde The Initial Configuration Process 3 5 1 3 5 2 3 5 3 3 5 4 NIC Static Configuration oaoa Set the Default Gateway ooa Configure a Fully Qualified Domain Name FQDN DNS Configuration aoaaa Troubleshooting NICs aoaaa aaa New User Cre tion s iocs osa snoi ae a e eann Creating a System Boot Disk Installation Complete o oaa Password and Access Control o oo aaa Locale and Time Setup 0 Firewall and Service Configuration System Summary and Reboot THE GUARDIAN DIGITAL WEBTOOL 4 1 4 2 4 3 44 Connecting and Logging into the WebTool 4 1 1 4 3 1 4 3 2 4 3 3 4 3 4 4 3 5 4 3 6 System Management 44 1 4 4 2 4 4 3 LOSeIN GAN ee marere adine ie aero Le wie ek The Main WebTool Menu Screen Virtual Host Management Creating a Virtual Host
4. EnGarde Secure Professional 243 Section 8 2 Configuring Outlook for Secure IMAP and POP3 L lockbox guardiandigital com Properties 2 x General Servers Connection Advanced Mail Account servers For example Work or Microsoft Mail 4 Type the name by which you would like to refer to these lockbox quardiandigital com User Information Name Nick DeClario SS Organization o E mail address Jrick quardiandigtalcom Reply address fo IV Include this account when receiving mail or synchronizing You will now see a number of options in this screen We are only concerned with the options displayed below the Server Port Numbers section You will want to select the box below Incoming mail POP3 this will say IMAP if you selected IMAP as your server Once you click the box you will see 995 appear in the text field or 993 if you selected IMAP instead of POP3 earlier At this point you can click the OK button to finish 244 User Guide SECURE E MAIL Chapter 8 lockbox guardiandigital com Properties Your Outlook mail client is now configured to receive secure e mail via POP3 and IMAP NOTE You must allow users to access their mail from their machine by adding in their IP address in the System Access Control Section 4 6 5 on page 144 EnGarde Secure Professional 245 9 THE LINUX INTRUSION DETECTION SYSTEM LIDS 9 1 Introduction to LIDS With the rapid pace of development and op
5. You can define your mail server s in the Mail Server field Only one server can be defined at a time However you can have more than one mail server per domain with different levels of priority This provides failover If a particular mail server is unavailable DNS will automatically instruct it to use a different mail server The order in which the next server is chosen is known as the priority The lower number the priority the higher the precedence In other words a mail server configured with a priority of 10 will receive mail before one with a priority of 20 You must complete the Mail Server and Priority fields Once you are done click the Create button and the server you just entered in will be displayed at the bottom Edit Delete a Mail Server Once you have created a mail server it will be listed as shown below Name Priority Mail Server guardiandigitalcom 1 smtp guardiandigital com You can click on the name of the server to bring up the edit screen 106 User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 Edit Mail Server Record Below you can define what machine you want to recieve e mail for your domain Enter your domain in the Domain Name field and the machine name in the Mail Server field Mail Server ntp quardisndigital con Priority F Save Delete To edit the server simply make necessary changes and click Save Your changes will immediately take effect To delete the server you can click the Del
6. smtp guardiandigital com Domain Relay mail to acmedynani te com ontp coyote con Add New Existing Mail Routes Domain Relay mail to P Linuxsecurity com iguardisndigi tal com Delete Save Figure 1 3 8 8 Mail Routing NOTE Subdomains are automatically included in the route Select the Add New button and the new options you entered in will appear in the Existing Mail Routes Click the Save option to save or the Delete button to delete a mail route 4 4 5 DNS Management The DNS Management section will allow you to fully configure your EnGarde system s Domain Name System DNS settings You will be able to add and delete master and slave zones and have the ability to edit all global options The Domain Name System DNS is the software that is responsible for con verting hostnames into numbers that computers can understand For example the name www guardiandigital com corresponds to the host IP address 63 87 101 80 and vice versa The DNS server sometimes called a name server is the process that runs on EnGarde Secure Professional awaiting incoming name service requests For example if the DNS server is given an IP address of 63 87 101 80 it will look it up in a database of addresses and link it to it s domain name In this example 63 87 101 80 will resolve to www guardiandigital com DNS will also work the other way Giving it www guardiandigital com will result in 63 87 101 80 92 User Gu
7. EnGarde Secure Professional 69 Section 4 3 Virtual Host Management Enter Certificate and Key Upload a New Certificate and Key Current SSL Status Enabled Current SSL Fingerprint F5 CC 48 8E A7 BB 6E 9 A 3B 8B 30 54 4C DF 06 F2 Certificate Valid Dec 4 21 09 35 2000 GMT until Dec 4 21 09 35 2001 GMT Subject lockbox guardiandidgital com Guardian Digital Inc admin guardiandigital com Issuer lockbox guardiandidgital com Guardian Digital Inc admin guardiandigital com Upload SSL a Certficiate Browse Upload SSL Key Browse Save If you already have a certificate and a key or have sent a CSR to a CA and have received the signed certificate back then you would want to upload it here from your local machine This section will present you with your current SSL Certifi cate and give you the ability to upload a new certificate and key If you have a certificate and key in place then it shows you four things Fingerprint This is the unique ID of the certificate Valid This is the data range for which the certificate is valid Subject This is who the certificate is fore Issuer This is who has signed the certificate Clicking the Browse button will allow you to browse through the files on your local machine and select the certificate and key You can then click the Save button to save the certificate and key to the server WebMail Configuration If you chose to add Webmail capabilities to this virtual
8. Recipient christi Example 3 E Mail Username webmaster Recipient ryan Example 4 E Mail Username sales Recipient fred guardiandigital com Here four e mail addresses are defined The following table shows the destination of various e mail addresses according to the examples defined above Mail Sent To Final Recipient sales engardelinux com fred guardiandigital com We have now successfully configured our Mail Server A 4 Web Server The Web Server is the mechanism for serving websites There are two types of websites normal and secure Secure websites utilize SSL encryption to provide EnGarde Secure Professional 269 Section A 4 Web Server security for sensitive applications such as e commerce Normal websites are sim ply sites that do not utilize SSL Secure websites require two things a certificate and a key It can be thought of in the following context e the certificate is what verifies your identity authentication e the key is what provides the security encryption The certificate and key are also tightly tied into each other they are a matching pair The first time a user connects to a secure site their browser will store the cer tificate Every subsequent time the user connects to the site it verifies that the certificate is the same to ensure a secure connection This provides the encryption portion of the process For more information on certificates please refer to the full User Gu
9. Save Settings As Creates a new settings file and saves current settings to it Useful for creating a short name for a server or for having more than one set of settings for a specific server Create RSA Identity Creates an RSA identity to be used with authentication type rsa or rhostsrsa Two files are created one containing the private key default name identity and one containing only the public key de fault name identity pub The contents in the file with the extension pub must be copied to the file authorized_keys on the server typically found in ssh These RSA key files are identical to the ones used with the Unix version of SSH SCP File Transfer In this dialog you can choose files and or directories to trans fer to or from the SSH server Local file s dir s is a space separated list of files and or directories if a name contains a space enclose it in quotes like a file with spaces Normal regexp s can t be used for local files dirs however names can be given with ONE wild card in it e g foo or foo bar If absolute path names are not given the current directory is assumed defaults to MindTerm s home directory If the first file directory given contains an absolute path name this directory is used as current directory for the rest of the list e g the list tmp foo bar will expand to all files starting with FOO or ending with BAR in the directory tmp Re mote files s dir s
10. Error 404 File not found In this menu you can list the error number and tell Apache to load a specified Web page or display a specified message if this error is encountered Below are a list of common error codes and their meanings You can refer to the Apache documentation for a complete list of error codes 404 File Not Found Aliases and Redirects This section allows you to set up aliases and redirects A brief explanation of the differences between redirects and aliases is a CSR is a request for a signed certificate you can give to a Certificate Authority to sign given to avoid confusion An Alias allows documents to be stored in the local file system other than the defined document directory When a user accesses a document through this alias it will appear in their browser as if it was in the aliased directory keeping the actual directory hidden from the user This can be useful when you don t want a user to know where they really are or to have links and URL references that have a clean look For example if you have files stored in home httpd html1 updates december 2000 documentation you can alias the address to home httpd html documentation EnGarde Secure Professional 63 Section 4 3 Virtual Host Management allowing you to keep everything organized neatly on your server while keeping the URL short for the user For the example given above you would need to type in updates products december 2000 doc
11. The PPTP server has now been configured and restarted You are now ready to configure your Windows clients 7 2 Connecting From Windows 98 You can find many of the necessary system updates using Microsoft s Windows Update technology and the Internet Explorer Web browser from the Windows 98 client machine Listed below are the required packages for PPTP to successfully operate as well as a list of recommended packages They can be obtained by accessing http windowsupdate microsoft comusing Internet Explorer only The recommended packages are not necessary but on some older versions of Win dows 98 may be required and will also improve performance Windows Update Required Components e 128 bit Encryption Pack e Internet Explorer 5 5 or greater e Root Certificate update EnGarde Secure Professional 201 Section 7 2 Connecting From Windows 98 Microsoft frequently also issues Critical Update Packs through the Windows Update facility It is recommended that all critical updates are also installed as these often fix security vulnerabilities that may prevent system compromise Once these components have been successfully installed it is necessary to up date Microsoft Dial Up Networking DUN to at least version 1 4 by reading the following Microsoft document and following the instructions within http support microsoft com support kb articles Q285 1 89 ASP Windows 98 Setup Once the updates have been completed you are re
12. To allow outside users to access internal resource shares on your EnGarde Secure Professional server through a PPTP connection you must have both Local Master and Allow Domain Logins set to Yes in the System Management gt Windows File Sharing gt Global Configuration Local Master Yes G Allow Domain Logins Yes 2 NOTE For a full description of the WebTool PPTP interface refer to Section 4 4 7 on page 111 Next you must make certain that in Security gt PPTP Setup gt General Security you have the Local WINS Server set to the IP address of your EnGarde Secure Profes sional machine In our example we are using 192 168 1 82 as our EnGarde server Local WINS Server 192 168 1 82 While in the PPTP Setup section of the WebTool make certain you have a user account so that the remote user has access to login WORKGROUPInick HRSKA Create New User Finally you must restart PPTP for the new changes to take effect 200 User Guide VIRTUAL PRIVATE NETWORKING Chapter 7 Select System Status Monitor from the main WebTool menu Then select Ser vices Monitor from the System Status Monitor menu This will display a list of the available services Toggle the status of the service by clicking on Enable or Disable Please Select Mil E Service LPPTP Server Bd Currently Enabled Toggle At Boot Enabled Toggle NOTE For detailed information concerning use of the System Status Monitor refer to Section 4 5 on page 134
13. To define a trusted and untrusted host go to Security from the main WebTool menu Select Firewall Setup and then General Configuration 124 User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 Trusted Interface CEN Untrusted Interface You can select your ethernet devices from the pull down menu If you are con figuring broadband access you will want to make the DHCP or PPPoE device the untrusted device and the trusted device the device configured for your internal network When you have selected the devices click Save Configuration followed by the Restart Firewall option above it Firewall Status The firewall is currently Enabled Please note that this does not mean that you actually have firewall rules in place This only notes that firewalling is configured to be turned on off at this point in time To see what rules you Currently have in place type etc init d ipchains status as root from a shell prompt Disable Firewall Click here Restart Firewall Click here Once the firewall has been restarted it s a good precaution to confirm that DNS is running as expected From the main WebTool screen select the EnGarde Audit System EAS At this point select Services from the pull down menu click Change Applet A new pull down menu will appear Select DNS Server from this one Pease serorea E Service Currently Enabled Toggle At Boot Enabled Toggle If DNS is
14. An IP addres must be entered if a domain name is entered EnGarde will not be able to perform DNS lookups C Secondary Nameserver ME Save Configuration When changes are done click the Save Configuration button to save these changes Define Static Host Addresses When EnGarde is passed a domain name it will use a static host address file to search first and then DNS to determine the IP address By entering one or more Static Host Addresses here you will force the system to use this list first before searching DNS Network Configuration Below you can create edit or remove static host address records trom your system To add a new entry simply enter the address and hostname list in the bottom set of boxes To modify an entry simply change the existing boxes To remove an entry remove elther the IP address or the hostname list Ipdate Hosts You can only add one ata time After clicking Update Hosts a new entry field will be available for an additional address 122 User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 Restart Networking Clicking this link will restart the networking on the EnGarde box making effective any changes in the Network Configuration section Bring up down interfaces and make routing changes Restart Networking Seige NOTE The default 127 0 0 1 address must not be removed 4 4 9 Broadband Connectivity Broadband Internet access has become a common commodity in homes and small businesses
15. Generating a user key will allow your users to log in to your EnGarde system remotely via SSH First click on the Generate User Key button This will bring you to a new screen with a form to be filled out It first requires a user name You can type in the name or select it from a list by clicking the button 86 User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 An IP address is not required but recommended for increased security The IP address will tell EnGarde from where this user is authorized to connect If you do not enter in an IP address it will let this user connect from any IP address The description field allows you to enter in a short description This descrip tion will be displayed back to the user every time they attempt to connect to En Garde using an SSH client such as MindTerm For more information concerning MindTerm read Section 6 EnGarde Connectivity on page 179 Finally you need to enter a password Select any password that is at least 5 char acters Now click on the Generate key button You will now see a screen with the results of the SSH Key generation SSH Key Generation Complete Click Here to Download Private Rey Save this to your computer and name it something you will remember You now have the option to download your public key You will need to have a copy of your key to load into your SSH program to so you will be able to gain access to the machine Save the file in a secure location 4 4
16. NOTE This new certificate will not be used on the site until you upload it It is meant to be signed by a Certificate Authority 68 User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 Certificate Generation For lockbox guandiandigital com This form is to create a new certificate signing request CSR for lockbox guardiandigitel com A CSR is used to pass along to a certificate authority CA such as Verisign or Thawte to produce a signed certificate for this site For more information on getting a certificate signed please refer to the documentation If you do not have an existing certificate key pair check the Create New Certificate Key Pair box If you do have an existing certificate key pair then the CSR will be generated using the existing key When you get the signed certificate back from the CA you can simply drop it into place for use with the existing key Please note that by checking the Create New Certificate Key Pair box you will overwrite the existing certificate key pair if any Create New Certificate and Key J Create New Certificate Key Pair Authority Name vwy quardiandigitel com E Mail Address admin quardiandigital con Organization Guardian Digital Inc Department City Upper Saddle River State or Province New Jersey Country ug Generate CSR Once you have all the fields filled in you can click the Generate Certificate button and you will be presented with your certificate
17. Section 3 2 The EnGarde Secure Professional Installer you will be brought to the main network menu If you choose to not select all the available cards you will be returned to the previous menu where you can choose to select the remaining cards or continue on to the network configuration at this point 3 2 10 New User Creation Once the network configuration is complete you are given the opportunity to add anew user during the installation process This new user will be an administrative user they will be part of the admin group and an SSH key will be automatically created for the user NOTE The SSH key passphrase will match the users system password This can be changed later via the GD WebTool 38 User Guide INSTALLING ENGARDE SECURE PROFESSIONAL Chapter 3 If you chose to create a new user at this point you will need to enter in the users real name user name and a password Once all required fields have been entered hit Ok to create the account 3 2 11 Creating a System Boot Disk The final step in the installation process is to create a boot disk It is highly recommended that you do so If there are any problems with the system disks that can prevent the system from booting properly a boot disk will solve your problem The boot disk is to be used as a rescue tool only It contains a kernel with minimal security installed in it so that you can fix a damaged system EnGarde Secure Professional 39 Section 3
18. Two drives must be chosen from the RAID list as the main RAID partitions for a RAID 1 array and at least three drives if this is a RAID 5 array There is no limit to the number of spare disks Determine size of the new partition Once the drives have been selected the installer will determine the maximum size the partition can be with the selected drive configuration Test disk integrity The size of the partition is required in MB 24 User Guide INSTALLING ENGARDE SECURE PROFESSIONAL Chapter 3 Determine the mount point The last step is to select a mount point for the new RAID partition Mount Point Type in the mount point where dev mdi will be mounted Type the directory name where this partition will be located into the entry box beginning with a Enter only a for the main root partition Once the mount point is entered the main partition screen will be displayed Partitioning Device Mount Point Size MB xt devu md 7 1 ext Total Size MB Free Space MB A boot partition will automatically be created on dev mdo0 the first Software RAID partition The size will be 30MB and it will use the drive configuration that was selected for the partition that was just created In the partition list below the boot partition the partition that was just created will be displayed EnGarde Secure Professional 25 Section 3 2 The EnGarde Secure Professional Installer Creating a Swap Partition in So
19. When changes are done being made click Create Share to create this share Share Name Share Description Global Security Information Web lockbox web pages Private Individual Writable Create New Share After the share is created you will be brought back to the main menu As in Machine Management and WINS Configuration you have the ability to edit delete and create new shares at this point 4 4 8 Network Configuration Selecting the Network Configuration option from the System Management section will bring you to the Network Configuration main menu The first thing you will see at the top of this menu is the list of interfaces currently installed in your system Interface Setup Below is a listing of all configured interfaces Click on an interface to change its configuration New Virtual Address ethi Static Address New Virtual Address Define New Physical Interface You can edit active interfaces by clicking on the ethernet device link to the left of the interface or edit the virtual address of the device by clicking on its associated Virtual Address link to its right We will discuss more on editing the device later in this section First we want to create a device If you click on the Define New Physical Interface link you will be brought to a new screen the Interface Setup Creating a New Device Here you can choose to make your new interface use a static IP address that you define or use DHCP or PPPoE
20. and that the claimed sender is in fact the actual sender backup or archive Both of these terms are used as nouns and verbs The noun form refers to any copy of a set of files and the meta data associated with them on some form of removable media The verb form refers to any pro cess of creating such a set An extra copy of a set of files to non removable storage is sometimes referred to as a backup but this is more precisely referred to as replication or mirroring or in some cases version con trol bastion host A computer system that must be highly secured because it is vul nerable to attack usually because it is exposed to the Internet and is a main point of contact for users of internal networks It gets its name from the highly fortified projects on the outer walls of medieval castles Bastions overlook critical areas of defense usually having strong walls room for ex tra troops and the occasional useful tub of boiling hot oil for discouraging attackers broadcast The broadcast address is a special address that every host on the net work listens to in addition to its own unique address This address is the one that datagrams are sent to if every host on the network is meant to receive it Certain types of data like routing information and warning messages are transmitted to the broadcast address so that every host on the network can receive it simultaneously There are two commonly used standards for wha
21. the same settings as the first MindTerm window of this session i e all pa rameters command line or applet given to MindTerm at startup will have effect in each new terminal created Clone Terminal Ctr Shift O This will create a new MindTerm window with the exact same settings as the window it is created from If the window contains a connected session the new window will be automatically logged in to the same SSH server using the same authentication as was used in the original window Note that the new window will not have any open tunnels since the window from where it is created have the tunnels opened already preventing the new window from opening them EnGarde Secure Professional 189 Section 6 1 Connecting from Windows 9x ME NT 2000 Connect Ctrl Shift C This launches the Connect dialog From this dialog you may either select to connect to a host whose settings you have saved or you may create settings for a new host Note when selecting New Server a new dialog is shown which is identical to the one described in 3 8 1 SSH Connection Disconnect Ctr Shift D This forces the current session to be disconnected Note that this will cause all tunnels to be closed and the shell to be aban doned without logging out The preferred way to disconnect is to logout in the shell Load Settings Loads settings from a file extension MTP without connecting to the server Save Settings Ctrl Shift S Saves current settings
22. 4 Mail Server Management The Mail Server Management section will give you complete control over your mail server giving you the ability to add remove users and aliases and other mail options Mail Server Management Below you can configure various aspects of your mail server Setup various system wide options such as hostname and maximum Mail Server Configuration message size Domain Management Setup email to username mappings for your virtual domains Mail Routing Configure which domains you would like to route mail for EnGarde Secure Professional 87 Section 4 4 System Management On the main menu you will have four main options Mail Server Configuration Domain Management Mail Routing and Stop Mail Server Mail Server Configuration Here you have the option to set up various system wide options Send Outgoing Mail Via Deliver Directly Host o II Allow Incoming Mail Enabled v Disabled Enable Procmail Enabled Disabled Save Options Send outgoing mail via host The Deliver directly option will forward any out going mail not destined for users of your system directly to the given host If the mail server is behind a firewall or proxy server to the outside world you will need to tell the mail server where to forward non local mail You can enter in a hostname or IP address here Allow Incoming Mail By default Enabled the mail server can both send and receive mail If this is set to Disabled the
23. Address demandred 192 168 1 215 New Record 114 User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 Share Configuration Share Configuration will allow you to create new shares When creating a share you define the directory to be shared the name of the share who can access it what groups can access it or define it as public To create a new share click the Create New Share button on this menu Share Name Share Description Global Security Information There are currently no shares defined Create New Share There are three main options that will define who can access your share Hosts to Allow Public Share and Writeable Hosts to Allow is a space separated list of IP s or networks that are permitted to connect to this share This does not define who can access the actual information it just specifies whether or not a network connection will be established To allow all addresses simply leave this box blank Once a machine is allowed to connect Public Share specifies weather or not they are allowed to browse the share read only If Public Share is set to yes then all users will be allowed to read the contents of the share If this is set to no then only Authorized Users or Authorized Groups will be allowed to browse the share Finally Writeable specifies whether or not to grant worldwide read write access to the share If this is set to yes then all users who connect will have read write access If this
24. Appendix B 3 on page 273 Drive Type The only input required from the user in automatic partition mode is to choose if you wish to install EnGarde Secure Professional on a SCSI disk or on an IDE disk one 16 User Guide INSTALLING ENGARDE SECURE PROFESSIONAL Chapter 3 If the installer is unable to load support for your SCSI controller you will be presented with a list from which to choose Note If SCSI Disk is chosen your SCSI adapter must have a boot prom otherwise EnGarde Secure Professional will fail to boot after install Drive Partition Warning Once you have made your selection a warning box will appear informing you that all data on the drive will be lost EnGarde will install on the first drive found on the specified bus you selected For example if you chose IDE then dev hda will be used and if you chose SCSI then dev sda will be used EnGarde Secure Professional is a server operating system and is designed to be the only system on the machine For this reason all information on the primary in stallation disk will be destroyed other drives in the system will remain untouched If you wish to use additional disks in your system you must change to manual mode for partitioning After OK is selected partitioning will proceed EnGarde Secure Professional 17 Section 3 2 The EnGarde Secure Professional Installer EnGarde Secure Professional v1 5 Partitioning disk Manual Partitioning Manual partitio
25. General Certificate Information Here we will just briefly cover some basic certificate information you may need to know to get your certificates properly working A new certificate is only valid for 365 days or 1 year After this period you must get a new certificate If you have a signed certificate you have the option to renew that certificate which usually requires a fee E 1 1 Getting a Certificate Signed The two most common certificate companies are Verisign and Thawte To get a certificate signed generate a CSR as described in Certificate Management found in Section 4 3 and follow their directions to send it to the appropriate CA They will then request proof of your right to use the certified organization name Articles of incorporation proof of your registration of the domain name you will be using from the InterNIC whois database to obtain your domain name details go to http rs internic net And finally a letter of authorization from an agent of your company or organiza tion Once everything is authorized they will send you back a signed certificate Please read their Web sites http www verisign com http www thawte com for detailed information on submitting a certificate to be signed or go directly to their registration pages http digitalid verisign com server enrollintro htm http www thawte com certs server request html Section E 2 Accepting an Unsigned Certificate If you get a certificate sig
26. Internet Firewalls O Reilly amp Associates Inc 2000 305 Index access control 45 47 alerts 141 142 Aliases 63 apache 61 backup system 161 broadband 123 certificate CSR generation 68 generation 66 management 66 change password 169 client machine 42 connecting 43 default login 43 network configuration 42 connectivity 179 unix 196 windows 180 daily summary 141 DHCP 123 configuration 108 define ranges 108 view leases 110 directory structure 72 DNS 92 address record 102 client 121 default A record 102 Domain Name 94 global options 99 install time 36 306 master server 96 107 master servers 97 Network 94 primary server 96 107 secondary server 96 slave server 96 zone create new master 93 create new slave 96 type 94 e mail 87 configuration 49 88 domain creation 89 domain management 88 edit domain 90 Netscape 227 Outlook 234 routing 91 secure 145 226 IMAP 226 227 234 POP3 226 234 setup 145 EnGarde Connectivity 179 firewall 48 151 configuration 49 general configuration 152 modules 152 options 153 port forwarding 153 status 153 FQDN 297 install 35 FTP configuration 81 GD Update 55 GDNS install local media 175 GDSN 173 configuration 174 installation agent 177 running 174 update agent 176 group configure 79 edit 80 new 79 hostname 121 IE 43 52 IMAP 146 secure 146 imap 145 instal
27. LIDS It is sug gested you run this command every time you make a change to the LIDS config uration To turn LIDS protection back on after administration simply issue sbin lidsadm S LIDS EnGarde Secure Professional 249 Section 9 2 Using LIDS or to enable it globally sbin lidsadm S LIDS_GLOBAL Your system is now protected again by LIDS When enabling disabling and reload ing the configuration information with lidsadm you will be prompted for a pass word every time You will see the following message SWITCH WARNING Only system administrators should enable disable LIDS Disabling LIDS can open your Lockbox to possible at tacks Make sure you read the LIDS section in your in cluded manual before manually changing options in LIDS Incorrect configurations can have drastic effects enter password At this point you can enter in your password 9 2 1 Using the lidsadm Utility The lidsadm utility is a small program you will use to administer your LIDS con figuration It stores all configuration information in etc lids lids conf If you are using the GD WebTool for administering LIDS you do not need to use lidsadm Some basic lidsadm options are as follows sbin lidsadm A Add a new entry sbin lidsadm D Delete an entry sbin lidsadm Z Delete all entries sbin lidsadm U Update all entries sbin lidsadm L List current entries requires LIDS to be turned off sbin lidsadm P Creates a new pass
28. PM You can bring up a status screen and other options be double clicking on the icon in the task bar You are now ready to access other shares and other network resources 7 4 Connecting From Windows 2000 Windows 2000 was designed with the PPTP protocol built in and no updates or patches are required specifically for PPTP 216 User Guide VIRTUAL PRIVATE NETWORKING Chapter 7 NOTE It is always recommended you have the latest service packs released by Mi crosoft installed to reduce possible problems To setup a PPTP connection to your EnGarde Secure Professional PPTP server start by clicking the Start button From there select Settings gt Network and Dial up Connections gt Make New Connection This will start the Network Connection Wizard Click Next to start the PPTP con figuration process EnGarde Secure Professional 217 Section 7 4 Connecting From Windows 2000 Network Connection Wizard Welcome to the Network Connection Wizard Using this wizard you can create a connection to other computers and networks enabling applications such as e mail Web browsing file sharing and printing To continue click Next The first configuration option here is to choose which type of connection you will be making We want to setup a VPN Virtual Private Networking connection So select the Connect to a private network through the Internet option Click the Next button to continue 218 User Guide VIRTUAL PR
29. PPTP protocol to create virtual private net works This protocol is used by Microsoft clients to create a VPN or a secure private communications channel between two computers In the PPTP Setup you can configure PPTP options and define new users NOTE This module will only appear if you purchased the Professional Workgroup Suite and chose to install the PPTP package PPTP Setup PPTP is the Point to Point Tunneling Protocol This protocol is used by Microsoft clients to create a VPN or a tunnel between two computers Below you can set up general PPTP options and define users General Configuration Define what IPs and encryption types to use Edit Users Setup usernameipassword pairs PPTP Setup Help View the help page for this module General Configuration In this section are the general configuration options that apply to all connections such as the local IP address to use the address ranges to issue to remote clients and what address the daemon should listen for connections on can be configured EnGarde Secure Professional 157 Section 4 6 Security General Options Verbose Debugging Messages Disabled 3 Local IP Address 192 168 1 1 Remote IP Range 141 155 183 1 254 Address to Listen On 192 168 1 19 ke Local WINS Server 192 168 1 19 Encryption Options 40 bit Encryption Enabled 3 128 bit Encryption Enabled 2 Stateless Encryption Enabled 3 Save Configuration Verbose Debugging Messages If this opti
30. SEEREEAEREENDEREEREERERAOREOHEERERH ERROR ORE SHEENERAEERORAORDEA DERE ER HORS Save 4 6 4 WebTool Access Control This section allows you to control what IP addresses have access to the GD WebTool You should allow as minimum as possible You can enter the IP ad dresses in a list entering a new line after each entry WebTool Access Control The WebTool can be configured to deny or allow access only from certain IP addresses You control access based upon e Hostnames for example mymachine guardiandigital com e IP Addresses for example 192 168 10 80 o IP Networks for example 192 168 10 0 You should limit access to trusted addresses otherwise anyone who guesses your password will have complete control of your system Enter one IP address or hostname on each line then click on the Save WebTool Access Control button Allow from all addresses 192 168 10 80 a A i 192 168 1 3 Only allow from listed addresses 192 168 10 d Y Deny from listed addresses Save WebTool Access Control Choosing the Allow from all addresses option can place your system at the greatest security risk 4 6 5 System Access Control This works similar to the WebTool Access Control section except these rules apply system wide 144 User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 System Access Control Below you can define which addresses you wish to allow secure shell access to If a host is not explicitly g
31. Secure IMAP and POP3 Microsoft Outlook 2000 is capable of both IMAP and POP3 and supports both protocols in secure mode Below is a set of instructions for configuring Outlook 2000 for secure IMAP and POP3 NOTE Outlook 2000 is required Previous version of Outlook do not support these features and will not work NOTE You must allow users to access their mail from their machine by adding in their IP address in the System Access Control Section 4 6 5 on page 144 Begin by starting up Outlook Once Outlook is loaded you can create a new e mail profile by selecting the Jools menu and from there select Options NOTE If this is the first time you are using Outlook it will automatically start in the Internet Connection Wizard section to create an e mail profile If this is the case skip down in this section to the Internet Connection Wizard and start from there res Tools Actions Help gt EB Address Book Ctrl4 Shift B c x a Empty Deleted Items Folder a Accounts Customize 1 Options At this point you will be presented with the Options screen From here select the Mail Delivery tab and click the Accounts button from within there 234 User Guide SECURE E MAIL Chapter 8 You will now see the Internet Accounts dialog Our objective is to create a new e mail profile first with basic information Then edit the profile to allow for secure POP3 or IMAP So here we want to add the profile so click the
32. This is the assigned password you also received when regis tering to be used along with your Account Number 5 1 2 Install from Local Media The Install from Local Media section will allow packages to be installed from CD ROM media supplied by Guardian Digital If you purchased the Professional Workgroup Suite you would install from here To install packages from a CD insert the CD into the CD ROM drive located in the EnGarde Secure Professional server From the main Guardian Digital Secure Network menu select the Install from Local Media link This will prompt EnGarde EnGarde Secure Professional 175 Section 5 1 Running Guardian Digital Secure Network to mount the CD ROM and evaluate its contents This may take a few moments as EnGarde gathers information about the packages Once all the information is gathered you will be presented with a list of packages descriptions and an option to install them This will only display packages that are not installed on the system PPTPd Point to Point Tunnelling Protocol ers out connections to pptp chents to beearne virtual members of the IP pool owned by the pptp server In effect these clients become virtual members of the local subnet regardiess of what their real IP addressis A tunnel is built between the pptp server and client and packets from the subnet are wrapped and passed between server and client similar to other client server protocols This package supports MS Chap v2 MPPE and
33. This works by allowing a Windows client to mount a pre defined directory or share on their own system Through the WebTool you can define these shares who has access to them and what type of access is assigned NOTE This module will only appear if you purchased the Professional Workgroup Suite and chose to install the Windows File Sharing package Windows File Sharing Below you can configure your Windows File Sharing setup Edit Global Configuration Edit options that effect every connection Machine Management Define what machines are allowed to logon to this domain WINS Configuration Manipulate host entries in your WINS table Share Configuration View edit and delete your public shares Windows File Sharing Help View the help page for this module This section is broken down into Global Configuration Machine Management WINS Configuration and Share Configuration which are discussed below Global Configuration The Global Configuration section allows you to control system wide settings for Windows File Sharing Here you can configure such options as the workgroup name machine descriptions passwords and other items which are discussed in detail below When setting up Windows File Sharing computers that will be sharing files with each other will be assigned to a workgroup or a domain A workgroup is used as a way for coworkers to quickly find each other s comput ers on a network and share files and printers between
34. User Guide VIRTUAL PRIVATE NETWORKING Chapter 7 Destination Address What is the name or address of the destination Finally assign a name to label this connection You can also choose to have it create a link to this connection on your desktop Click the Finish button to create this connection EnGarde Secure Professional 221 Section 7 4 Connecting From Windows 2000 Network Connection Wizard Completing the Network Connection Wizard Type the name you want to use for this connection EnGarde VPN To create this connection and save it in the we age and Dial up Connections folder click nish To edit this connection in the Network and Dial up Connections folder select it click File and then click Properties Add a shortcut to my desktop T a e After creating the new connection Windows 2000 will automatically display a dialog box to establish the connection We do not want this done just yet as a couple other settings need to be confirmed The following icon is created on your desktop if you chose to have the Connection Wizard create it Right click on the icon and select Properties ae H EnGarde YPN If you chose not to create the icon select Start gt Settings gt Network and Dial up Connections gt Your new connection right click on it and select Properties from there The Properties dialog will be displayed In this new dialog select the Networking tab Make ce
35. aliases This will allow you to alias a new document root Enter the directory you want the user to see in the From field and where it will actually be pointing to in the To field URL redirects This will allow you to map one URL on to another Simply enter in the original URL and where you would like it to point to The source and destination must both point to valid URLs Directory Indexing Directory Indexing For lockbox guard igital com Directory index files index html index htm I Save EnGarde Secure Professional 65 Section 4 3 Virtual Host Management This section defines the initial page when the Web browser client requests a URL without specifying an explicit filename For example if you type in www guardi andigital com it is really loading www guardiandigital com inde x html If the Web server doesn t find an index file it will return a directory listing Generally index html or index htm is used You can specify more than one Certificate Management There are two types of certificates self signed certificates and signed certifi cates A signed certificate is issued by a Certificate Authority CA such as Verisign or Thawte A self signed certificate is simply a certificate that has not been issued by a CA This provides the authentication part of the process because the certificate has been signed by an external authority All of the certificate management can be done in the WebTool You
36. applications Microsoft Internet Explorer Windows 95 Windows 98 Windows Millennium Windows NT and Windows 2000 are either registered trademarks or trademarks of Microsoft Corporation in the United States and other countries MindTerm is a trademark of MindBright Technology in the United States and or other countries Netscape and Netscape Navigator are registered trademarks of Netscape Communications Corporation in the United States and other countries RSA Public Key Cryptosystem and MDS are registered trademarks of RSA Data Security Inc Tripwire is a trademark of Tripwire Security Inc in the United States and or other countries All other trademarks and trade names are the property of their respective owners Linux is a registered trademark of Linus Torvalds Printed in the United States of America Written by Nicholas DeClario Edited by Dave Wreski With contributions from Ryan W Maple Pete O Hara and Benjamin Thomas Written using ATEX User Manual v107GD 0403 EnGarde Secure Professional User Manual Copyright 2000 2003 Guardian Digital Inc Contents 1 INTRODUCTION 1 Led Features pareden 0a 240n See AoA eh hk db hee 2 1 2 List of Chapters and Appendices 5 1 3 Product Activation x ex e sgoe teie ea 00000 eee eee 7 1 4 Obtaining Technical Support 00 8 2 GENERAL SECURITY 9 2 1 Why Do We Need Security 0 0 00 0 10 2 2 How Secure is Secure
37. appropriate drive Partitioning Device Mount Point Size MB Filesystem devehda5S 4 858 ext3 Hard Drive List Total Size MB Free Sp ce MB Maxtor 91821U2 hda 1G 150 Maxtor 8210803 Chdb 299 299 ST348816A hdd 299 Creating a Software RAID Partition EnGarde Secure Linux allows the creation of Software RAID partitions A Re dundant Array of Inexpensive Disks RAID allows redundancy and performance over multiple hard disks RAID is usually done by a physical hardware controller or controlled by software If a hardware RAID controller is found in the EnGarde system Software RAID will not be an available option at installation time RAID has multiple configurations referred to as levels EnGarde supports RAID levels 1 and 5 RAID 1 A RAID 1 array consists of two hard disks and no limit on spares This RAID level is sometimes referred to as mirroring It makes a mirror image of the first drive on the remaining drives If the first drive fails a backup is used The size of a RAID 1 partition is limited to the size of the smallest partition in the array 22 User Guide INSTALLING ENGARDE SECURE PROFESSIONAL Chapter 3 RAID 5 A RAID 5 array consists of at least three disks and no limit on spares RAID 1 offers larger partition sizes than RAID 5 with increased read per formance but slightly reduced write performance over RAID 1 RAID 5 stores parity information across all disks for redundancy making it possible to rec
38. be checked for internal consistency and for consistency with other criteria The EnGarde Auditing System provides an audit trail that enables administrators to reconstruct later who did what in case it is suspected there may be a system anomoly The EnGarde Auditing System EAS allows recent system logs Web logs and graphs of network and system events to be viewed Additionally the system can be shut down or restarted from here as well har ge pplets Please Select To select different options click on the pull down menu select the option by click ing on it and click the Change Applets button 4 5 1 System Graphs The System Graphs section will display several graphs of different system statis tics By clicking on a graph a daily weekly monthly and yearly breakdown will be displayed Information such as ethernet usage memory usage CPU usage and CPU temper ature are displayed in these graphs Below is a sample graph of ethernet usage 134 User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 Ethernet ethO Inbound Traffic vs Outbound Traffic in 8 4 KB s Max 105 0 KB s Avg 67 0 KB s Cur Out 723 0 KB s Max 72 0 KB s Avg 0 0 KB s Cur z 8 8 k amp 6 6k i 4 4k 2 2 k 10 12 14 16 16 20 22 0 6 10 12 14 16 4 5 2 Services The Services section allows you to choose from the different services on your server from a pull down menu Service After selecting a service from t
39. be found in Section 4 4 5 Edit Master Zone on page 101 Zone type Forward Names to Addresses 2 Reverse Addresses to Names Domain name Network quardiandigital con Master servers Allow queries from Allow Any ckbox quardiandigital con 1 Listed n OSO a a Create The options on this screen are the same as setting up a master server Find the detailed information in the previous section However there is one new category Master Servers Master servers In the master servers section you can list all the master servers that this slave server will obtain its DNS information from At least one master server is required in this section NOTE You are required to list your slave server as a name server on your master server You can find information on doing this in the Name Server Section on page 104 To finish creating a new slave zone you will need to define a mail route to backup Defining a mail route must be done from the master server You will need either the Fully Qualified Domain Name FQDN or IP address of the slave server that will be handling the mail route Information on configuring this on your master server can be found on page 106 EnGarde Secure Professional 97 Section 4 4 System Management A New DNS Management Screen Once you have completed the zone creation form click the Create button You will be returned back to the main screen Now you will have a list of opti
40. but you have not yet defined what these quotas are to be so you will see No users groups currently have quotas defined message To define a new user quota select the New User Quota link as for groups as well New Group Quota link Quota Setup Below you can define the filesystems you want to enable quotas for Mount Point Partition User Quotas Group Quotas woot Jev Mde treaties ened tnt Edit Jdev nde eed bed satie Edit Nar Jdev Mde eeedbot eeedbet Edit Mome Jev hafe Enabled Enabled Edit a eee Usersigroups with a grey highlight are currently over adh os stealer mee e Usersigroups with a red highlight are currently over their quota No users groups currently have quotas defined New User Quota New Group Quota When selecting the New User Quota link you will be brought to the following menu Here you assign a quota on a per user basis 128 User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 Type User User Name nick z Create Quota User Name Here you can type in the users name or select it from the menu by clicking Soft Limit This is a set limit that when reached the user will be informed that they are exceeding there quota but will still allow files to be written Hard Limit If the user ignores their soft limit and continues to use disk space they will be denied permission to write anything once they reach this hard limit Once changes are finished being made hit the Cr
41. complete online presence including DNS Web and e mail services EnGarde Secure Professional signifi cantly reduces support costs due to its simplicity of use and robust security fea tures EnGarde Secure Professional is a standards based solution rich in security and Internet commerce features EnGarde provides a comprehensive suite of appli cations necessary to create thousands of virtual Web sites manage e mail and DNS for an entire organization manage SSL certificates and connect high speed Cable connection all using the integrated SSL secure Web based administration capabilities This manual also includes documentation for the EnGarde Workgroup Suite an accompanying product that was designed to provide file and print sharing capabil ities virtual private networking for remote office workers WebMail file and user quota abilities as well as Windows Domain Controller support The Guardian Digital WebTool provides EnGarde administrators with the most sophisticated Open Source Web based management system available It offers se cure graphical report and administration capabilities providing the complete abil ity to create hundreds of virtual Web sites quickly and easily as well as associated e mail and DNS domain information Section 1 1 Features 1 1 Features The EnGarde Secure Professional integrated software solution offers unsurpassed levels of security ease of use intrusion detection and alert capabilities integra
42. configure specific Apache settings for the specified host EnGarde Secure Professional 61 Section 4 3 Virtual Host Management Document Options For lockhox guardiandigital com Directory options Default Y Selected below Server side includes and execs GYes No Server side includes OYes No pra yer o Generate directory indexes OYes ONo L ms Aaoi Server side includes and execs This will give you the ability to turn on server side includes and allow CGI scripts to be executed within them Server side includes are modules or programs that run on the server CGI and Perl scripts are both server side includes because they run on the server while Java and JavaScript are executed on the client Server side includes This works the same as the above option except it turns off the ability to execute CGI scripts Generate directory indexes With this option enabled Apache will create a file index when a directory is specified from the Web browser It will create a clean list of files with modification dates and file types Error Handling Error Handling For loc kbox inside gua Eo URC 4i a quardiandigital com error 404 htal Save 62 User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 Error handling is what the Web server does in the event a request is made resulting in an error For example if you try to go to a page that doesn t exist on a server you will see the all too common
43. connections to instead connect to the specified port 1023 in this situation If you are having difficulty connecting at this point check the DNS settings on your local PC or enter in the IP address instead of the hostname Once the connection is made you will be presented with a new certificate Guardian Digital issues the certificate for the GD WebTool Since the certificate is not is sued by a certificate authority you will be prompted to accept the certificate In structions on how to do this and more information concerning certificates can be found in Appendix E Certificates on page 289 Once you enter secure mode in your browser you will notice a lock that will turn yellow In Internet Explorer and Netscape Navigator you will see this lock dis played along the bottom of the browser window Netscape will also display a closed lock at the top of the browser This lock will also turn yellow when in secure SSL mode If you click on the lock you will be provided with more infor mation about your current secure connection 4 1 1 Logging in Once the connection has been established the GD WebTool will prompt you for a login name and password 52 User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 Login to the GD WebTool Please enter a valid username and password You will be logged out after 15 minutes of inactivity Username admin Password eee wee Login Use the login name and password you specified durin
44. down menu NOTE If you have only one network card you should set these to Disabled 152 User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 Firewall Status The Firewall Status section will show you the current running status of the fire wall either enabled or disabled and allow you to shutdown turn on or restart the firewall You can toggle the firewall on and off by clicking the click here link next to Dis able Firewall Clicking the click here link to the right of Restart Firewall will restart the firewall Configuration Options The Configuration Options allows you to tell the EnGarde Secure Professional server which network interface is your Trusted Interface and which one is your Untrusted Interface Generally the external interface is the Untrusted Interface and the internal inter face is the Trusted Interface NOTE This section will not appear if only one network interface is present in the system Configure Port Forwarding Port forwarding is a method for forwarding requests for service to a server that would otherwise not be reachable from the external network This enables an organization with a single publically accessible IP address to potentially forward services such as HTTP and SMTP to servers located within their internal network The diagram in Figure 4 on page 155 describes a typical scenario where an En Garde Secure Professional server is configured to forward SMTP requests to an organization s i
45. enable LIDS e A wrong password is entered in three times in a row to reload the LIDS configuration What this means is that either a user with root access accidently entered in the password wrong three times in a row or an unauthorized user has attempted to gain access If you only use the GD WebTool to administer your EnGarde system you should rarely see this message In the event of this e mail you are welcome to contact Guardian Digital for further assistance Read Section 1 4 on page 8 on how to contact Guardian Digital 4 6 3 Edit Login Banner This allows you to alter the login banner the user sees when they connect to the system or login from the console Just type in plaintext and hit save when fin ished We recommend putting in a warning disclaimer about illegally accessing the system It may be necessary to consult your security or legal department EnGarde Secure Professional 143 Section 4 6 Security Edit Login Banner This changes the banner that is displayed when a user attempts to login to the machines console JEtEAA EASE ARP e deed ee A SER SEE EEE EESEE SESE SERS EE EEEEEEEEEELSEASEAS EASE REED A Unauthorized or improper use of this system may result in administrative disciplinary action and civil and criminal penalties By continuing to use this system you indicate your swareness of and consent to these terms and conditions of use LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this varnin
46. few options You will have to choose the directory you wish to install MindTerm into The default is c Program Files mindterm We suggest leaving the default You can then select the installer to create an icon on your desktop for MindTerm and or an icon in your Start Menu These are both turned on by default Once you have made your selection select Install which will confirm your se lections If you are satisfied with your settings select Ok and MindTerm will start installing You will see all the MindTerm files scrolling in the window as they are installed When the installation is done a message box will appear say ing MindTerm installation successful You can close this box and now use MindTerm If you selected the option to install the icon on your desktop you will see it there If you also had the installer create the Start Menu icon you will find Start Menu gt Programs gt MindTerm gt MindTerm and Readme The readme is detailed information about MindTerm and how to use it We will be covering a general usage of MindTerm in the next section 180 User Guide ENGARDE CONNECTIVITY Chapter 6 NOTE MindTerm is distributed free There are other programs for Windows such as TeraTerm and Secure CRT that will also work with EnGarde 6 1 2 Running MindTerm MindTerm uses a public private key cryptography system to connect to EnGarde A public key is a key the user is assigned that can be given out to anyone At the same time they a
47. first need to be logged into the system Read the section above on logging in with MindTerm You will then have the ability to SCP by selecting File gt SCP File Transfer EnGarde Secure Professional 187 Section 6 1 Connecting from Windows 9x ME NT 2000 key fil 3 Last login Bon Nov 27 21 25 44 2000 from devel quardiandigital com admin lockbox edmin j Selecting the SCP File Transfer option will bring you to the following screen 188 User Guide ENGARDE CONNECTIVITY Chapter 6 This interface works similiar to other FTP clients available for the Windows plat form You can select files be clicking on the filename multiple files can be se lected Buttons to create delete and rename directories To transfer a file select the arrow facing the machine you want the files transfered to When doing this you will see a status screen showing the transfer MindT emm File Transfe Souce lockboxinside al 1 2 1 tgz Destination localhost mindtermbir v1 21 zip Cunent rnindterabin v121 2ip 224 8KB 61 0kB sec Once this status screen reports Done the files are completely transfered 6 1 4 MENUS The easiest way to learn how MindTerm works and what features it provides is to look through this brief walk through of all menus in MindTerm Given within parentheses is the keyboard short cut for each menu item where one exists File Menu New Terminal Ctrl Shift N This will create a new MindTerm window with
48. for a detailed explinat Any changes made here will take effect immediately Settm Value Allow Anonymous Logins Disable Allow Local Logins Enable 3 Chroot All Local Users Disable Enable User Uploads Disable 2 Allow Anonymous Uploads Disable 3 Allow Anonymous MKDIR Disable 3 Create Permissions Users Owner Readable Create Permissions Anonymous Owner Readable FTP Banner Internal FTP on Lockbox Interface to Listen On 192 168 1 196 ve Max Rate for Anonymous Users 50 kisec Max Rate for Local Users kisec Wi Save Changes Save Changes Allow Anonymous Logins Enabling this feature will allow anonymous user lo gins All anonymous users will be chroot ed to home ftpsecure Allow Local Logins This will allow local users to FTP into the machine assum ing they are not on the blacklist A local user is defined as being a user that has an account on the EnGarde machine Chroot All Local Users This will chroot all local users to their home directory When a local user logs into via FTP they will be placed in their home direc tory Enable User Uploads Enabling this will allow local users to upload files By default local users can only download files chroot is a program that will put the user in a pseudo filesystem sort of like a jail This will prevent the user from being capable of accessing the rest of the system but still have functionality 82 User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 All
49. is the network portion of the IP address as determined by the network mask For example a network mask of 255 255 255 0 and an IP address of 192 168 1 1 would denote the network address as 192 168 1 0 This specifies the network that your server will live on When this dialog first appears default values will be inserted Change these to your networks settings EnGarde Secure Professional 33 Section 3 2 eth IP Address Gateway ethi Gateway eth2 IP Address Gateway IP Address The EnGarde Secure Professional Installer Advanced Micro Devices 79c976 PCnet LANCE EAC RS CRC Netmask 2507537 ae EVS RCE Netork EYSSI CE ee Advanced Micro Devices 79c976 PCnet LANCE Netmask Network Advanced Micro Devices 79c976 PCnet LANCE 192 168 186 162 _ Netmask EEEE IES GELENE Netork JEZBBU UR e The following screen shot is an example after all the NIC information is entered into the system t eth IP Address Gateway ethi Gateway eth2 IP Address Gateway TERE RTC Network 192 168 188 8 IP Address Advanced Micro Devices 79c978 PCnet LANCE 2 168 168 108 Netmask ZEEE Advanced Micro Devices 79c978 PCnet LANCE Netmask IN Network Advanced Micro Devices 79c978 PCnet LANCE CCRC Netmask ARENE LEVA OEE TS Network IEVAS OST NOTE 34 If you plan on using PPPoE two interfaces are r
50. limit Each item is broken down below Resource Limit Mantenance Domain Any Type Hard Ga item Maximum File Size KB Value 2500 Type This type allows you to choose between a Soft and Hard limit A soft limit informs the user that they have exceeded their quota while a hard limit cuts the user off preventing them from using any more resources Item This is a pull down list of items that describe how this limit will behave e Maximum core size Kb This limits the size of a core file A core file is a file that a program will write to the system when that program crashes The developer can then take this core file and use it for de bugging the program If the system is not used for developement it should be set to 200 130 User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 e Maximum file size Kb This is the maximum size a single file is allowed to be This option is desireable for enforcing e mail mailbox limits e Maximum Logins This controls the maximum number of simulta neous logins e Maximum Number of Open Files This limits the total number of open files on the system An open file is any file with its flag set to open e Maximum Number of Processes This will limit the total number of current running processes on the system e Maximum RSS Size Kb This specified the total amount of physi cal memory used not counting pages swapped out Value This is the numerical value associated with
51. machine will not be able to receive mail but will still be able to send mail Enable Procmail procmail is a mail preprocessor When a message comes into the machine it is passed to procmail which then looks for a file called procmailrc in the recipients home directory This file can contain filters to file the message into mailboxes Procmail is enabled by default If you would like it disabled you can do so here Domain Management The Domain Management section allows you to create a new mail domain ex plained below and to edit an already created domain Creating a new domain is 88 User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 quite simple Below the Domain Management menu you will see the Create New Domain menu Here you have two options Domain and Postmaster Both fields are required Create New Domain Below you can add a domain you wish to recieve mail for The Postmaster is the the person who recieves all undeliverable mail Some example values are rwm dave or ryan guardiandigital com Domain Postmaster guardiandigital com Fhick quardiandi Add New Domain Domain The domain is simply the name of the domain you wish to receive mail for For example if you wish for the mail server to receive mail for guardiandigital com then you would enter guardiandigi tal com into this field Postmaster If a user sends an e mail to a non existent account it will be for warded to this user It s an
52. out click the Create Printer button and you will see the main screen with your printer listed Printer Name Device TestPrinter idevilpO Edit Define New Printer You are now set up to print 126 User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 4 4 11 Quota Setup Quotas are a defined set of rules that limits system resources allocated to each user or a group of users Resources such as filespace system processes memory etc can all be limited Below you can set up system quotas Filesystem Quotas Define enforced filesystems and user group quotas Resource Limits Configure various resource limits such as file sizes and memory usage Quota Setup Help View the help page for this module Filesystem Quotas Filesystem quotas allow you to define how much disk space a particular user or group can use on a given filesystem When you enter this page you will be shown a listing of each filesystem currently set up The User Quotas and Group Quotas will be set to Enabled quotas are being enforced or Disabled quotas are not being enforced In the first section of the filesystem quotas you will see Define Filesystem Quo tas Here you will see all of your mounted partitions By default all quotas are disabled Since filesystems quotas are disabled you will not see anything listed in the Existing Filesystem Quotas section Below you can define the filesystems you want to enable quotas for Mount Point Partition User Q
53. read write by the owner and read only by users in the specified group and all users There are many more options too many to list here chmod can use EnGarde Secure Professional 277 Section C 2 Basic Bash Commands C 2 3 Editing a File You basically have two options for file editing from the console Vi and Pico Vi has the most difficult learning curve but is the most powerful editor Pico is much easier to learn All the commands are laid out in front of you Pico however can have some strange effects on files and is not nearly as powerful as the other two editors EnGarde comes with Vi and Pico installed on it To load the Vi editor simply type vi fileToEdit To start the Pico editor type pico fileToEdit If you don t enter a filename it will start by editing a blank document We recommend using Vi if you will be doing most of your editing from the con sole If you don t have experience with vi you ll want to use one of the many resources as it s use may not be immediately obvious 278 User Guide GENERAL LINUX Appendix C C 3 File System Structure The EnGarde Linux system is designed with the file system standards in mind Here is a brief breakdown of the directories and there descriptions taken from Filesystem Hierarchy Standard ver2 1 the root directory bin Essential command binaries boot Static files of the boot loader dev Device files etc Host specific syst
54. running properly the status will be Enabled Additionally the DNS service should be Enabed in the At Boot section as well More information concerning the usage of the EnGarde Audit System can be found in Section 4 5 on page 134 EnGarde Secure Professional 125 Section 4 4 System Management 4 4 10 Printer Setup EnGarde Secure Professional allows you to set up your parallel port or USB printer directly through the WebTool After you have successfully defined the printer connected to your EnGarde server in this section it will be necessary to install the printer driver supplied by the printer manufacturer on each workstation that wishes to use the printer To add a new printer start by clicking the Define New Printer link Printer Name Device There are no printer currently defined Define New Printer After clicking on the link you will be brought to the Printer Setup screen Here you will need to fill out two options Printer Name and Printing Device The Printer Name is just a label to give the printer This name will also be used for the network printer name Spaces and special characters are not permitted here After the Printer Name you must select the Printing Device You may choose between a USB and Parallel printer from the pull down menu p LAT you can create a new printer a Printer Name Jreet Printer Printing Device Parallel Printer Create Printer Once all the fields have been filled
55. the CD ROM is already in the drive just hit Ok to continue otherwise insert the CD ROM and press Ok It is EnGarde Secure Professional 15 Section 3 2 The EnGarde Secure Professional Installer not necessary to close the door it will close itself when you press Ok NOTE Although the CD will boot from a SCSI CD ROM drive if configured to do so it will not install from a SCSI CD ROM drive An ATAPI CD ROM drive is required for installation 3 2 1 Partitioning The next portion of the installation process is to partition the system s hard drive s The EnGarde Installer provides two methods of partitioning Automatic and Man ual methods For difficulty understanding any of the terms used in this section please see the Glossary located on page 295 Installation Mote Automatic itioning will create everything for you but will only use the first system disk With manual partitioning you can use multiple disks and define how they are use Do you wish to use automatic partitioning Automatic partitioning will completely partition your system for you with min imal user interaction Manual partitioning allows you complete control over the partitions on the system Both modes are outlined in detail below Automatic Partitioning Automatic partitioning will create the necessary partitions for you and create a filesystem on each partition as well as a swap partition For detailed information on how the drive is partitioned refer to
56. the administrator If you will be administrating this from outside you will need to open the port For more information about firewalls there are many books and on line documen tation Refer to your firewall documentation for specific instructions on how to permit these services through your firewall Additionally here are a few refer ences e Zwicky Cooper amp Chapman Building Internet Firewalls June 2000 Copy right O Reilly amp Associates Inc 2000 e Mark Grennan mark grennan com Firewall and Proxy Server HOWTO Feb 26 2000 Copyright Mark Grennan 2000 284 User Guide FIREWALLS AND PROXY SERVERS Appendix D D 2 Disabling Proxy Settings in Your Browser You will need to disable proxy and firewall settings in your browser in order to access the inital configuration tool on EnGarde Directions are given below for both Netscape Navigator and Internet Explorer D 2 1 Netscape Navigator To disable the proxy settings in Netscape Navigator you will need to be at the main Netscape Navigator window Click the Edit menu button and then select Preferences from the pull down menu Eile Edit View Go Communicator Etrit Birke TIE A Ctrl amp Find in Page Ctrl F Fig iaetr EHS Search Internet You will then be brought to the Preferences menu By clicking on the Advanced option in the menu tree on the left will bring up the Proxy Settings EnGarde Secure Professional 285 Se
57. the possible security hazard here If someone managed to gain root access the entire system could be put into the crackers control Here is a number of security enhancements LIDS has to protect the system from this threat Every single file can be protected Giving each file its own set of read write or append rules that even the root user must obey For example if you set your log files to append only no one could go in and delete any trace of themselves on the system You can set the login binary as read only and it can not be replaced Even if there was a possible way to overwrite the file LIDS would know it s not the same file because it indexes the files by their inodes not their file names Files can also be completely hidden from view and only be accessible by specific programs For example if you want to protect your Apache SSL server key from everyone including root you can hide the file so to every user including root it doesn t exist but at the same time it allows Apache to have full access to the file so it can get the information it needs from it LIDS can also protect processes from being killed by the root user This could be used to protect your database server your Web server your mail server etc from being taken off line by an intruder You can have full control of the Linux kernel capabilities The current Linux capabilities control what a process can and can t do Changing these capabilities gives yo
58. them A domain also contains a collection of computers in a group They can also browse each other s files and printers but are required to be authenticated before becom ing a member of the domain This enables the EnGarde Secure Professional server to provide this authentication to the domain members EnGarde Secure Professional 111 Section 4 4 System Management Configuration Varlable Value Workgroup Domain NetBIOS Name Ss Machine Description EENES Local Master a Allow Domain Logins Share Printers Inertaces es Set Administrator Password n Verity Administrator Password Ss Save Configuration Workgroup Domain If your machine is in a workgroup then this is the name of the workgroup it should be in If your machine is accepting Domain Logins then this is the name of its domain NetBIOS Hostname This is the name the machine will be given when other ma chines browse the network Machine Description This is an informative line that will be displayed when people query for information on this machine Local Master This will set your EnGarde machine to attempt to become the local master browser on your subnet Allow Domain Logins If your EnGarde Secure Professional server is config ured as a primary domain controller this will allow other computers to login to the domain of the EnGarde machine Share Printers If this option is set to yes then all of the printers found in the Printer Setup menus i
59. to correctly deliver electronic mail Multiple e mail 266 User Guide QUICK START GUIDE Appendix A servers may be defined for the same domain each with a differing priority Servers defined with a lower number have a higher priority and mail will be delivered to these hosts first Example Because we are creating a new domain engardelinux com we must create a new forward zone for it Before EnGarde can be configured to provide DNS for this domain it must have been listed among the list of authoritative name servers for this domain gt From the System Management menu select DNS Management The next step will be to create a new master zone Click on the Create a New Master Zone link Leave the Forward Names to Addresses button checked since that is the type of zone to be created Keep the default value of Master server The rest the input looks like Domain name engardelinux com Email Address administrator engardelinux com Leave the Allow transfers from set to Allow None and the Allow queries from set to Allow Any For more information on these fields please refer to the full manual Click on the Create button to see the new zone in the zone listing To add the records for our example click on the engardelinux com link Address Records Hostname www engardelinux com Address 192 168 1 71 Hostname mail engardelinux com Address 192 168 1 71 Name Alias Records EnGarde Secure Professional 267 S
60. user or group to the Allow sections all other users that are not listed will be denied e If you add a user to the Allow Users section but the group the user belongs to is in the Deny Groups section the user will be denied access EnGarde Secure Professional 85 Section 4 4 System Management e The deny rules take precedence over the allow rules e You may deny a user but allow the group the user belongs to Most configurations will be safe allowing the admin group access This will auto matically deny everyone else who is not part of the admin group After you have finished making your changes click the Write Configuration button for the changes to be saved SSH Key Management The Key Management section allows you to create new SSH keys for your users Generate a user key Generate User Key Welcome to the Secure Shell key generation area This page will e Generate a public private key pair e Place the public key in user ssh authorized_keys e Make you download the private key to your computer After clicking on Generate Key you will be prompted to save the private key to your computer After you do this you will be able to ssh into the machine as user Username using the key and the provided passphrase Seyword Value Username nick d IP Address Optional 192 168 1 15 Description nick fron devel quardiandigital con Passphrase tatarernes Passphrase again crseaeened Generate Key
61. will be compared Backup to Query MySQL Databases Comparison Method Backup to File Comparison Level Full Backup Companson Date October 16 2001 Really Compare EnGarde Secure Professional 167 Section 4 7 System Backup Once you hit Really Compare the process will begin Upon completion you will see a summary screen similar to when you create a successful backup listing all the changed files 168 User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 4 8 Secure Manager As discussed earlier the administrator has the ability to change a users password from the WebTool To increase security the WebTool does not allow any user but the administrator access to those sections of the WebTool To allow a user to change their own password themselves a separate URL is provided By going to https myserver com 1022 NOTE The address is very similar to the regular WebTool but notice the port you are connecting to The port 1023 is used for the WebTool while 1022 is the user password utility as in the example above If the default Guardian Digital certificate still remains on the system the user will be prompted to accept it Instructions on accepting a certificate can be found in Appendix E on page 289 Once the user successfully logs in to the system using their own login name and password they will be given the options to either change their password or their secure shell SSH key User Authentication Management Bebw you can
62. will be starting with a clean configuration file The original configuration shipped on your box is stored in usr bin lids_default_config and can be executed to revert LIDS back to it s original configuration Updating all the file entries works a little differently The configuration files are linked to LIDS by their inode number not their filename If a file gets deleted and replaced later it may not be protected by lids because of the inode change By issuing lidsadm U lidsadm will go through your configuration and check every file making changes as necessary This should be ran if you upgrade a package too since it s more than likely one or more of the files will be overwritten and the inode will change 252 User Guide THE LINUX INTRUSION DETECTION SYSTEM LIDS Chapter 9 9 2 5 Password Creation LIDS uses a user defined password it stores in encrypted form Ripe MD 160 in etc lids lids pw To create a new password simply type lidsadm P It will prompt you twice for your new password and then change the password This will obviously only work if LIDS is turned off Once you have done this every time you need to reload the configuration and turn LIDS on or off you will have to enter your password in plaintext 9 2 6 Viewing LIDS Status You can use lidsadm r to view the current running status of LIDS This can be useful for writing scripts that need to know if LIDS is turned on or not 9 2 7 Viewing the Curren
63. 0 User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 Edit a Slave Server Zone Options Master servers 7 gt 192 168 1 1 T_e Allow transfers from Allow queries from Allow None Allow Any Listed Listed hone n Sii ee gt S A Save Delete In this section you have the ability to make changes and delete a slave server You should be familiar with these options since they were used to create the slave server and in the Global Options section Refer to those sections for more detailed information Edit a Master Zone Zone Options guartiandigital com Type Records e Records Address 0 Name Alias 0 Name Server 1 Mail Server 0 Edit Zone Parameters Edit Zone Options Delete Zone Click this button to delete this zone from your DNS server Matching reverse ee address records in other zones hosted by this server will also be deleted EnGarde Secure Professional 101 Section 4 4 System Management Add Address Record The Address section will allow you to define address records In the given address L e smtp guardiandigital com you can define specific servers The menu is broken down into two sections Add Address Record and a table of the current records listed by IP address followed by the hostname Take note that these records are only valid for the defined zone Add Address Record Below you can define an adelress record Enter the fully qualified domain name in the
64. 1 10 here End Address This is the last IP in the range you wish to allocate If you want to allocate the range 192 168 1 10 through 192 168 1 20 you would enter 192 168 1 20 here When you are done filling out all the entry boxes click the Create Range button Existing Address Ranges 5 mask 192 168 1 0 255 255 255 0 192 168 1 64 to 192 168 1 127 Edit Define New Range After the new range is created you will be brought back to the previous screen You will now see your newly defined range listed here You have the ability to edit this range by selecting the Edit link associated with the range you wish to edit The edit screen is almost identical to the range creation screen with the addition of a delete button to delete the entire range View Current Leases Whenever a client requests an address via DHCP the server assigns them the address and defined a lease When the lease expires the IP is then placed back into the pool of available addresses Bi N e 192 168 1 60 200109128 14 17 24 2001 09129 02 17 24 00 20 81 02 69 9b 192 168 1 61 2001 09 22 18 36 00 2001 0923 00 36 00 00 01 02 94 45 Sb 192 168 1 62 2001 10 10 15 50 26 2001 1011 03 90 26 00 20 61 02 69 9 192 168 1 63 2001 0910 14 05 42 20010811 02 05 42 00 01 03 be 46 03 110 User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 4 4 7 Windows File Sharing Windows File Sharing allows you to configure your server to host files to Windows based clients
65. 128 bit eneryption instali this group of packages Ves No erent an an Sr server which can be used to provide network services to sometimes called Lan Manager clents including various versions of MS Windows 05 2 and other Linux machines Samba uses NetBIOS over TCP IP NetBT protocols and does NOT need the NetBEUK Microsoft Faw NetBIOS frame protocol Instali this group of packages Yes No install Packages Select which packages to install by clicking the Yes button located next to it When all selections have been made click the Install Packages button After clicking the Install Packages button the packages will begin to install This will take a few moments and your browser will wait for it to complete Do not hit stop back or reload in your browser during this process or the packages will not install correctly When the packages have finished being installed a screen displaying the packages that were installed will appear Next to each package will be a link to another portion of the WebTool that is used to configure that package if available Using this link will open a new browser window 5 1 3 Run the Update Agent The Update Agent will contact Guardian Digital servers and over a secure connec tion determine which packages can be updated When a list has been determined the screen will display a list of all packages that are newer than what is currently on your EnGarde Secure Professional system 176 U
66. 2 The EnGarde Secure Professional Installer To create the disk insert a blank disk and hit Ok When the disk has been created the following screen will appear 3 2 12 Installation Complete When this last dialog box appears the installation has completed Remove all CD s and floppies from the systems drives and when you click Ok the system will reboot Once the system is finished rebooting you can proceed to the initial configuration 40 User Guide INSTALLING ENGARDE SECURE PROFESSIONAL Chapter 3 EnGarde Secure Professional 41 Section 3 3 Configuring the Client Machine 3 3 Configuring the Client Machine A client machine is required to configure EnGarde You will need a crossover cable to make the connection from your PC to the EnGarde machine or you can put them both on a hub The only drawbacks are while the system is on a hub it is vulnerable from other machines connected to that hub and the default network settings could interfere with other machines connected to that hub To configure you client PC you must first start by disconnecting your client PC from the network You can simply do this by unplugging its network connection Then change your PC s network settings Don t forget to write down your old settings to change back to when you are finished setting up EnGarde Change your client PC s network settings to the following IP Address 192 168 10 110 Subnet 255 20025 5 50 Broadcast 192 168 10 255
67. 203 Section 7 2 Connecting From Windows 98 Type a name for the computer you are dialing Select a device SPF Microsot VEN Adapter z Lorngure oe oe The next step is to enter in the IP address of the EnGarde Secure Professional machine Pr Type the name or address of the VPN server Host name or IP Address 192 168 184 te E cen 204 User Guide VIRTUAL PRIVATE NETWORKING Chapter 7 This is the last step of the creation process and the wizard will ask you to confirm everything If everything is set up properly click the Finish button and the process is complete Make New Lonnectior EnGarde Secure Professional 205 Section 7 2 Connecting From Windows 98 Once the connection is defined it will be added into the Dial Up Networking folder You will see it listed with the name you gave it below Jial Up Networking wizard to help you nectinn NOTE By dragging the My Connection icon to the desktop a link will be created to make it easier to access Before attempting to establish a connection a couple settings must be confirmed and possibly changed first Go into the properties of the new PPTP configuration you just created by right clicking on it and selecting Properties gt 206 User Guide VIRTUAL PRIVATE NETWORKING Chapter 7 The following screen will appear Make sure your screen has the same options configured as this one Disregard the default TCP IP sett
68. 36 firewall 151 general configuration 152 modules 152 options 153 port forwarding 153 status 153 login 52 main menu 54 network configuration 117 create virtual address 119 309 310 DNS client configuration 121 edit interface 119 hostname 121 new device 117 routing configuration 120 static host address 122 networking restart 123 password 140 PPtP file and print sharing 200 printing 126 quotas 127 filesystem 127 group limits 131 resource limit 129 system wide limit 130 user limits 131 Security 140 system time 132 Tripwire 148 administrator 149 maintenance 149 reports 150 schedule 150 update database 150 usage 54 Virtual Host creation 56 edit 60 management 56 secure creation 58 Webmail setup 59 VPN 157 198 configuration 157 edit user 159 Windows 2000 216 Windows 98 201 Windows NT 3 5 209 Webmail certificate 70 webmail setup 59 Windows File Sharing 111 global configuration 111 machine management 113 share configuration 115 WINS configuration 114 Webtool EAS services 135 Windows 180 Windows File Sharing 111 global configuration 111 machien management 113 share configuration 115 WINS configuration 114
69. 4 System Management or special characters and can be no more than 16 characters in length For example Val Nick Deiari Yes lt 16 characters and no spaces Nicholas DeClario gt 16 characters and spaces Real name The users real name This will be the real name of the user You can enter in their full name Using the example above Nick DeClario would be valid Password Enter in a password for the user This password will be asked if the user logs into the console or needs to retrieve their e mail Access Enabling this will allow a user to only access their e mail via a secure IMAP or POP3 client This will prevent the user from physically logging into the machine Windows Password Entering a password in this field will grant the user Win dows File Sharing access This password will be used for logging in to shares and domains Now we must set up the user in a group Read the Groups and Users section in Appendix C 5 on page 281 for more information on user groups Primary Group You either can create a new group for this user or use an existing group Secondary Group If you want this user to additionally be part of another group you can choose that group here We are now ready to create the user Press the Create button You will be brought back to the main System Management page indicating the user has been created successfully NOTE When creating a new user that user is automatically given their own private group F
70. 6 User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 New Certificate and Ke Authority Name Lockbox quardiandigital com E Mail Address adnin guardiandigital com Department Organization Guardian Digital Inc City Upper Saddle River State or Province Nev Jersey Country ug Generate Certificate Here you will see a screen similar to the certificate generation screen when creat ing a virtual host All the fields are required Upon completion of this form you a self signed certificate and key pair will be created for the site A description of each field is given below Authority Name The authority name is the name the server the certificate will be used on For example www guardiandigital com or as in the example above lockbox guardiandigital com E Mail Address The e mail address for the contact in control of this certificate should be entered here An example would be ca guardiandigital com or as in the example above admin lockbox guardiandigita 1 com Department Here you can enter in the name of the department this certificate will be used in An example would be E Commerce Organization This is the name of the organization who owns the certificate In the example above Guardian Digital Inc is used City This field requires you enter the name of the city in which the organization resides You must enter in the full name of the city In the example above Upper Saddle River used State or Providence Here you will ne
71. 8 0 7 3 Connecting From Windows NT 3 5 0 7 4 Connecting From Windows 2000 SECURE E MAIL 8 1 Configuring Netscape Mail for Secure IMAP 8 2 Configuring Outlook for Secure IMAP and POP3 173 174 174 175 176 177 179 180 180 181 187 189 196 196 iv 9 THE LINUX INTRUSION DETECTION SYSTEM LIDS 9 1 Introduction to LIDS 0 0 92 Usine EDS ae kA Be Goh Se be eee EE ASE SES 9 2 1 9 2 2 9 2 3 9 2 4 9 2 5 9 2 6 9 2 7 Using the lidsadm Utility 2 00 0 Adding an Entry 2 00004 Deleting an Entry 2 4 Deleting and Updating AllEntries Password Creation 000 Viewing LIDS Status 00 Viewing the Current LIDS Configuration 9 3 Protecting Your Files 2 00 9 3 1 An Example Protecting a Freshly Installed Package 9 4 Kernel Capabilities s e ais p ep e a a e a E a y 9 4 1 Capability Names and Descriptions A QUICK START GUIDE A l Network Interfaces 2 2 20 0 a A2 DNS Server re 2404 ek Bed ee deh Dee ee ew ee Bs A3 Mal Server o eea oaae at Grew My Po Ro ee See aks AA Web Server ac 6 ce ok d Ade bee bare ee ke hes B ADVANCED INSTALLER ISSUES B 1 Bootdisk creation 0 00000 eee eee B 1 1 Creation on a Linux based system B 1 2 Creation on a D
72. A s path to binary o path to protected_file j WRITE We also want to give the binary the capability to chown which has been disabled earlier by LIDS lidsadm A s path to binary t o CAP_CHOWN j INHERIT When changing a files capabilities we use INHERIT or NO_INHERIT instead of the READ APPEND commands Using INHERIT gives the file access to the capability while the NO_INHERIT turns off the files abilities to use the given capability In a later section capabilities are explained in more detail In the next session an example of a package being protected is given EnGarde Secure Professional 251 Section 9 2 Using LIDS NOTE Don t forget to do a lidsadm S RELOAD_CONF after changes were made so they take effect when you reload LIDS 9 2 3 Deleting an Entry Deleting an entry is an extremely simple task and there is no need to go into great detail If there is a file you no longer want to be protected or wish to change protection on you need to delete the entry from the LIDS config Simply issue the following command to accomplish this task lidsadm D s file o file and the file will be removed from the configuration You can now enter new attributes for the file if you like 9 2 4 Deleting and Updating All Entries Lidsadm gives you the ability to delete and update all the file entries in your con figuration Issuing lidsadm Z will delete every entry in your LIDS configuration and you
73. A added a new o object but this time linked it to a s subject So now the user data is completely protected and is not hindering the usage of the my_package application Finally we need to protect the binary from being deleted So we can simply set it as read only We can use the same command that we used for the config file lidsadm A o sbin my_package_binary j READ When initially securing the system the entire sbin directory was protected To add sbin my_package_binary separately you can do what was done above or you can update all the items in the LIDS config Doing this will add the sbin my_package_binary to the config lidsadm U We are now left with one last problem The my_package_binary needs setuid and setgid permissions to run properly By default the setuid and setgid capabilities are disabled by LIDS more concerning capabilities will be explained in the following sections Using lidsadm you can assign capabilities to a specific file The lidsadm command is similar to adding a file lidsadm A s sbin my_package_binary t o CAP_SETUID j INHERI lidsadm A s sbin my_package_binary t 0o CAP_SETGID j INHERI Now the sbin my_package_binary will inherit the setuid and setgid capa bilities in the kernel giving it permission to use The t flag is used to tell lidsadm the object is special or not a file in this case To make certain everything in your LIDS configuration is set properl
74. APPEND This command is almost the same as above except we set the log file to APPEND Next we want to protect the user data We want to be able to read and write to the user data but we don t want root to have the ability to view the data since it could be private information This is also a secure method of protecting sensitive data from an intruder if they gain root access First we have to deny everybody access from the user data There could be a slight problem if the user data directory contains dozens maybe hundreds of files This could be quite cumbersome typing in each file name into lidsadm Well the lidsadm program allows you to protect a directory and everything under it So now lets protect the directory lidsadm A o var lib my_package j DENY Now everyone is denied access to that directory and everything in it In fact if you get a directory listing of var lib the my_package directory will not even be visible So now it s safe Too safe now actually You have to give your my_package binary access to the data for it to run properly To give the binary and only the binary access to the data we can issue this command lidsadm A s sbin my_package_binary o var lib my_package j IGNORI Gl Once that is issued it gives sbin my_package_binary full access to ev erything in the var lib my_package directory In the example above we EnGarde Secure Professional 255 Section 9 3 Protecting Your Files
75. ARCH Overrides all DAC restrictions regarding read and search on files and directories including ACL restrictions if _POSTX_ACL is defined Excluding DAC access covered by CAP_LINUX_IMMUTABLE CAP_FOWNER Overrides all restrictions concerning allowed operations on files where the file owner ID must be equal to the user ID except where CAP_F SE TID is applicable It doesn t override MAC and DAC restrictions CAP_FSETID Overrides the following restrictions that the effective user ID shall match the file owner ID when setting the S_ISUID and S_ISGID bits on that file that the effective group ID or one of the supplementary group IDs shall match the file owner ID when setting the S_ISGID bit on that file that the S_ISUID and S_ISGID bits are cleared on successful return from chown 2 not implemented CAP_KILL Overrides the restriction that the real or effective user ID of a pro cess sending a signal must match the real or effective user ID of the process receiving the signal CAP_SETGID e Allows setgid 2 manipulation e Allows setgroups 2 e Allows forged gids on socket credentials passing CAP_SETUID e Allows set uid 2 manipulation including fsuid e Allows forged pids on socket credentials passing CATP_SETPCAP Transfer any capability in your permitted set to any pid remove any capability in EnGarde Secure Professional 259 Section 9 4 Kernel Capabilities your permitted set from any pid CAP_LINUX_
76. Add button EnGarde Secure Professional 235 Section 8 2 Configuring Outlook for Secure IMAP and POP3 Internet Accounts 2 x All Mail Directory Service Account Connection Remove Eropernes Setas Default Import Erpat You will now be prompted with a small pull down type menu You have two options in here Mail and Directory Service Since we are creating a new e mail profile select the Mail option Mail Directory Service fi Emaye Now you will see the Internet Connection Wizard start The Internet Connection Wizard will go through a step by step process to create the basic account Once the basic account is created we will have to edit the account to accept secure e mail transfers The first step in the Internet Connection Wizard is to enter your full name This is the name that will be automatically displayed when someone receives e mail from you Once you have entered your name in click the Next button to continue 236 User Guide SECURE E MAIL Chapter 8 Internet Connection Wizard Now you will be prompted for your e mail address This has most likely been assigned to you by your system administrator Once you have entered in your e mail address click the Next button to continue EnGarde Secure Professional 237 Section 8 2 Configuring Outlook for Secure IMAP and POP3 Internet Connection Wizard You will now be presented with a few opt
77. Carling M Degler Stephen and Dennis James Linux System Administra tion New Riders Publishing 2000 Mark Grennan Firewall and Proxy Server HOWTO Feb 26 2000 http www linuxdoc org HOWTO Firewall HOWTO html Copyright Mark Grennan 2000 Garfinkle Simson and Spafford Gene Practical Unix amp Internet Security 2nd Edition O Reilly amp Associates Inc 1996 Hunt Craig TCP IP Network Administration O Reilly amp Associates Inc 1993 Laurie Ben amp Lauri Peter Apache The Definitive Guide Second Edition O Reilly amp Associates Inc 1999 Welsh Matt and Kaufman Lar Running Linux Second Edition O Reilly amp Associated Inc 1996 Dave Wreski and Kevin Fenzi Linux Security How to http www linuxsecurity com docs HOWTO Security HOWTO 2000 Wreski Dave It s a Bad Bad Bad world But Understanding the ABC s of Linux Security Can Make It Better Linux Magazine October 1999 Vol 1 Num 6 pg 31 Wreski Dave System Security Linux Magazine October 2000 Vol 2 Issue 10 pg 34 Yarger Randy Jay Reese George amp King Tim MySQL amp mSQL O Reilly amp Associates Inc 1999 Zwicky Cooper amp Chapman Building Internet Firewalls June 2000 Copy right O Reilly amp Associates Inc 2000 13 Ziegler Robert L Linux Firewalls New Riders Publishing 2000 14 Zwicky Elizabeth D Cooper Simon amp Chapman D Brent Building
78. D etault Outgoing Mail Server Outgoing mail SMTP server flockbox quardiandistalcom Outgoing mail server user name nick Use Secure Socket LayerSSL or TLS for outgoing messages Never C If Possible C Always Local mail directory E Program Files Netscape Users default mat Choose LK caret tee After closing the Mail Server Properties dialog you will see your mail server in the window labeled Incoming Mail Servers Finally you will have to enter in the server name for your outgoing e mail Enter in the outgoing server name given to you by your system administrator in the Outgoing mail SMTP server field and enter your user name in the Outgoing mail server user name field Once you have completed entering in the information click the OK button The Preferences dialog will close and you will see the server name appear in your mail listing where your Inbox is located 232 User Guide SECURE E MAIL Chapter 8 GetMsg NewMsg Hepy Reply Al i Be Local Mail Unsent Messages Ej Drafts Templates G Sent You are now ready to receive mail from your EnGarde Linux system with Netscape Mail using secure IMAP NOTE You must allow users to access their mail from their machine by adding in their IP address in the System Access Control Section 4 6 5 on page 144 EnGarde Secure Professional 233 Section 8 2 Configuring Outlook for Secure IMAP and POP3 8 2 Configuring Outlook for
79. EnGarde Secure Professional USER MANUAL EnGarde Secure Professional 1 5 suUaroian MIGITAL Pioneering Open Source Security COPYRIGHT AND PATENT INFORMATION Copyright 2000 2003 Guardian Digital Inc All rights reserved This material may be distributed only subject to the terms and conditions set forth in the Open Publication License V1 0 or later the latest version is presently available at http www opencontent org openpub Distribution of substantively modified versions of this document is prohibited without the explicit permission of the copyright holder Distribution of the work or derivative of the work in any standard paper book form for commercial purposes is prohibited unless prior permission is obtained from the copyright holder Rather than list the names and entities that own the trademarks or insert a trademark symbol with each mention of the trademarked name the publisher states that it is using the names for editorial purposes only and to the benefit of the trademark owner with no intention of infringing upon that trademark Information in this manual is subject to change without notice Companies names and data used in examples herein are fictitious unless otherwise noted Guardian Digital EnGarde Secure Professional Linux Lockbox and Guardian Digital WebTool are trademarks of Guardian Digital Inc in the United States and other countries This product is covered by one or more pending patent
80. EnGarde Secure Professional 177 Section 5 1 Running Guardian Digital Secure Network Guardian Digital Secure Network Below is a listing of candidate packages tor installation Please select the ones you wish to install and dick the Install Packages button kernelupdate A per Severity Security Update Advisory Jadvisories balestra zlib 1 htrml Severity This will display the severity of the package Advisory This is a link to the text advisory Clicking on this will open the advisory in a new window Available Version This is the latest available version Dependencies If all dependencies for this package are met resolved will be printed here 178 User Guide 6 ENGARDE CONNECTIVITY So far the only way we spoke of to connect to your EnGarde system was via the GD WebTool utility To gain remote access you have another secure alternative We provide SSH connectivity to EnGarde Since telnet is extremely insecure it is not provided with EnGarde Secure Professional SSH uses 1024 bit encryption to protect your connection Secure Shell SSH is a program for logging into a remote machine as well as for executing commands on a remote machine It is intended to replace rlogin and rsh and provide secure encrypted communications between two untrusted hosts over an insecure network SSH connects and logs into the specified hostname The user must prove his her identity to the remote machine using one of several m
81. Garde Secure Professional 151 Section 4 6 Security General Configuration In this section you are asked to define the Trusted Interface and the Untrusted Interface Generally the Trusted interface is the one that is connected to your internal network and the Untrusted interface is the one that is connected directly to the Internet tg eer n ading modules will be loaded at systern startup EAn Er TE Teea tT masqer protocols such as FTP IAC and PPTP For a full list of such protocol please click on the help link belo Load Modules at Boot Please Select 3 ey oe pe eo ALTE T notes that firewalling is configured to be turned onvoff at this point in time To see what rules pou currently have in place type teinit dipehains status as root from a shell prompt Disable Firewall Click here Restart Firewall Click here Configuration Option Trusted Interface eth 192 168 1 196 a Untrusted Interface eth 209 10 240 72 3 Save Configuration The firewall rules that are in effect block all incoming Windows Networking DHCP and syslog communication from the outside as well as translate external requests for services by internal workstations using Network Address Translation Firewall Modules The Firewall Modules are a collection of IP masquerading modules to allow pro tocols such as FTP IRC PPTP and a few others to be transferred through the firewall You can enable these modules by selecting Enabled from the pull
82. Garde Secure Professional 45 Section 3 5 The Initial Configuration Process Enter Root Verify Root 7 ererrre _ terreneve WebTool Password Enter WebTool 7 Verify WebTool ererrtet tras i r ave WeN KNEW WER WebToal Access Control 192 168 100 0 P 192 168 1 151 These addresses can be any of the form Fruoted Moot tet 1 IP Networks eu 192 168 1 0 2 IP Addresses eg 192 168 1 10 7 Save and Proceed The root Password The root password will only be used to login to the system from the console Enter in a password that is at least six characters Mixing numbers letters and avoiding whole words is recommended A few examples would be to take a word like lockbox and break it up with some letters and numbers You can use the following characters as well So you can end up with something along the lines of lock S box Which will be almost impossible to guess even more difficult to crack You have to enter the password a second time to verify they match The WebTool Password The Guardian Digital WebTool password will be used every time you login to the WebTool We suggest making this password different from the root password but still follow the password suggestions offered above 46 User Guide INSTALLING ENGARDE SECURE PROFESSIONAL Chapter 3 Access Control In this area you will have to supply a list of hosts that are allowed to access the Guardian Digital WebTool on your EnGarde syste
83. Hostname field and the IP address you wish to assign to it in the Address field Hostname amtp guardiandigital com Create Default A Record Address 192 168 1 5q To create a new Forward Address Record you simply need to fill in the two re quired fields described below Hostname The hostname is the Fully Qualified Domain Name FQDN for the specified machine Address In the address entry field you will need to enter in the IP address of the machine for this record Create Default A Record Check this box to make this new address record the default A record Once you have filled in all the fields you can click on the Create button to create the new forward address Once the page refreshes you will see it listed at the bottom of the page Name Address smtp guardiandigital com 192 168 1 50 102 User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 Edit Delete a Record Once a record has been created and you see it listed below the Add Address Record menu you will have the ability to edit the record by clicking on the name of it This will bring you to a new screen that is similar to the Add Address Record screen Below you can define an address record Enter the fully qualified domain name in the Hostname feld and the IP address you wish to assign to itin the Address field Hostname smtp quardiandigital con Address 492 168 1 50 Save Delete To edit the name server simply make your changes di
84. IMMUTABLE Allow modification of S_IMMUTABLE and CAP S_APPEND file attributes NET_BIND_SERVICE Allows binding to TCP UDP sockets below 1024 CAP_NET BROADCAST Allow read write of device specific registers CAP_NET_ADMIN Allow broadcasting listen to multicast Allow interface configuration Allow administration of IP firewall masquerading and accounting Allow setting debug option on sockets Allow modification of routing tables Allow setting arbitrary process process group ownership on sockets Allow binding to any address for transparent proxying Allow setting TOS type of service Allow setting promiscuous mode Allow clearing driver statistics Allow multicasting CAP_NET_ RAW Allow use of RAW sockets Allow use of PACKET sockets CAP_IPC_LOCK 260 User Guide THE LINUX INTRUSION DETECTION SYSTEM LIDS Chapter 9 e Allow locking of shared memory segments e Allow mlock and mlockall which doesn t really have anything to do with IPC CAP_IPC_OWNER Override IPC ownership checks CAP SYS MODULE Insert and remove kernel modules CAP_SYS_ RAWIO e Allow ioperm iopl and dev port access e Allow dev mem and dev kmem access e Allow raw block devices dev sh d access CAP SYS CHROOT Allow use of chroot CAP_SYS_PTRACE Allow ptrace of any process CAP_SYS_PACCT Allow configuration of process accounting CAP_SYS_ADMIN Allow configuration of the secure attention key e Allow admini
85. IVATE NETWORKING Chapter 7 Network Connection Wizard Network Connection Type You can choose the type of network connection you want to create based on d your network configuration and your networking needs 6 Diakup to private network Connect using my phone line modem or ISON Dial up to the Intemet Connect to the Internet using my phone line modem or ISDN Connect to a private network through the Internet Create a Virtual Private Network VPN connection or tunnel through the Internet Accept incoming connections Let other computers connect to mine by phone line the Internet or direct cable Connect directly to another computer Connect using my serial parallel or infrared port ctu Tie _ toe If you need to connect to an ISP or use a dial up connection of some type to get on the Internet the PPTP configuration can be set up to automatically dial your Internet connection for you before trying to establish a connection to the PPTP server To configure it to do this choose your connection from the list box otherwise choose the first option Click the Next button to continue EnGarde Secure Professional 219 Section 7 4 Connecting From Windows 2000 Network Windows can make sure the public network is connected first This next dialog box requires only that you enter in the IP address of the EnGarde PPTP server to make your connection Click the Next button to continue 220
86. Login Banner saaa 143 4 6 4 WebTool Access Control noaa 144 4 6 5 System Access Control aoaaa 144 4 6 6 Secure E Mail Client Setup 145 4 6 7 Tripwire Maintenance aoaaa 147 4 6 8 Firewall Setup 000 151 4 6 9 Virtual Private Networking aoaaa 157 System Backup e w tence ias eae E e 161 4 7 1 System Backup Configuration 161 4 1 2 Perform Tape Directory Maintenance 164 4 7 3 Create a New Backup oona 165 4 7 4 Restore a Backup 0 4 7 5 View Changes Since Backup 4 8 SecureManager 2 0 2 000 4 8 1 Change System Password onoo 4 8 2 Secure Shell Key Management GUARDIAN DIGITAL SECURE NETWORK 5 1 Running Guardian Digital Secure Network 5 1 1 General Configuration ooa oaa 5 1 2 Install from Local Media 5 1 3 Run the Update Agent 00 5 1 4 Run the Installation Agent 00 ENGARDE CONNECTIVITY 6 1 Connecting from Windows 9x ME NT 2000 6 1 1 Installing MindTerm aaaea 6 1 2 Running MindTerm aaaea aae 6 1 3 Secure Copy SCP 00 0 6 14 MENUS S 600 i eadi daen ee Ge a A oe hoe dee 6 2 Connecting from Unix aasa a e 6 2 1 UsingOpenSSH va aa e a a a E a E NR VIRTUAL PRIVATE NETWORKING 7 1 Configuring EnGarde for PPTP File and Print Sharing 7 2 Connecting From Windows 9
87. NGARDE SECURE PROFESSIONAL Chapter 3 Once you have selected which packages you wish to install you can press the Ok button to continue and the packages will begin to install NOTE If you plan on using PPPoE you must select both the DNS and Firewall packages Additional information concerning PPPoE DHCP and broadband usage can be found in Sections 4 4 8 and 4 4 9 As each package is installed you will see a dialog box indicating which is being installed 3 2 3 Networking Once the EnGarde Installer has finished installing all of the selected packages the networking configuration will begin The network configuration process will allow you to configure multiple network cards with static IP DHCP and or PPPoE configurations and set up host and do main names and your DNS configuration EnGarde Secure Professional 31 Section 3 2 The EnGarde Secure Professional Installer Following this dialog box the EnGarde Installer will attempt to auto detect all the network cards in the system If any network cards fail to initialize properly a dialog box will appear This is discussed in detail at the end of this section 3 2 4 NIC Options The first part of the network configuration is determine how to configure each ethernet device found in the system Advanced Micro eth This dialog box will display in a list each ethernet device found in the system 32 User Guide INSTALLING ENGARDE SECURE PROFESSIONAL Chapter 3
88. NOTE It is important to note that when port forwarding from the external interface of your EnGarde Secure Professional server to a server located on the internal network DNS services may need to be configured differently Most organizations configure one domain that is accessed by the public and corresponds to the public IP address assigned to the external interface of the EnGarde Secure Professional server Internal users accessing the internal server then use a different domain since the server is local to them and corresponds to a local IP address not reachable by Internet users This avoids the problem that arises as a result of users attempting to reach the service that is forwarded by the EnGarde Secure Professional server back to the server that is already local to them Once everything has been filled out select Define Rule You will be brought back to the main screen and it will display the new rule that was just created Protocol Local Host Port Remost Host Port tep 209 10 240 72 ssh 192 168 100 100 ssh Edit Define New Rule At this point you can create more rules or edit existing rules by selecting Edit next to the associated rule The Edit Rule menu is the same as the Create Rule menu except with a button to delete the rule Delete the rule by simply clicking the Delete Rule button 156 User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 4 6 9 Virtual Private Networking EnGarde Secure Professional uses the
89. Ne Guardian Digital inc Guardian Digital Inc ca quardiandigital com ca quardiandigital com Fingerprint 7F 13 9C 81 09 72SA0E 9C 36 06 32 6C 59 70 60 valid Noy 27 21 36 31 2000 GMT until Now 27 21 36 31 2001 GMT Edit Certificate Interface I Save ate Issuer pe Guardian Digital inc Guardian Digital ine ca quardiandigital com ca quardiandigital com Fingerprint 7F13 9C 81 09 72 SA0E SC 36 06 32 60 59 70 60 Valid Nov 27 21 36 31 2000 GMT until Now 27 21 36 31 2001 GMT Edit Certificate Interface Secure IMAP and POP3 Both the Secure IMAP and Secure POP3 interfaces allow you to configure which network interface s you want each service to listen on By leaving the entry box blank the service will listen on all network interfaces To select a specific network interface you can type in the IP address of the network interface or click the gt button for a list of available interfaces Edit Certificate Both services come with their own default certificate issued by Guardian Digital You change this certificate as you wish through the Edit Certificate interface 146 User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 Secure Email Client Setu Below you can edit the certificate for SIMAP Edit SIMAP Certificate Authority Name I E Mail Address Jca guardiandigital com Organization Iguardian Digital Inc Department City Upper Saddle River State or Province New Jersey Country bs Upd
90. Network 192 168 10 0 Once you have changed your settings and the changes have taken effect you must make sure all your proxy settings are disabled To disable your proxy settings in both Netscape Navigator and Internet Explorer please read Appendix D Firewalls and Proxy Servers on page 283 Once all changes have been made to the proxy settings you will be ready to connect to EnGarde NOTE Changing network settings may only be necessary if you selected the default network settings If you configured EnGarde to work with your current net work changes may both be needed If you have difficulty connecting after making the changes above on a Windows client you may have to disable the Logon to Windows NT Domain option in your network configuration You can do this by selecting Networking from the Control Panel then selecting properties for Client for Microsoft Network and unchecking the Logon to Windows NT Domain check box You can now hit the OK button to finish You may be asked to reboot your Windows system 42 User Guide INSTALLING ENGARDE SECURE PROFESSIONAL Chapter 3 3 4 Connecting to EnGarde At this point you have your client PC s network configuration set up to work with EnGarde and you have it physically connected to your PC via a cross over cable or both machines are connected on the same hub You are now ready to connect to your EnGarde Start by powering up the EnGarde system Next load up the browser on your PC Either Inte
91. OS based system B 2 Rescue mode sree 6 02 BG we ee eee Phe ln Oe B 3 Automatic partition scheme 0 C GENERAL LINUX Coli Introduction lt 1 ek aa Oe EE Sete DS ee eee Bee C 1 1 Root Access on Your EnGarde System C 2 Basic Bash Commands 000 00004 246 246 249 250 251 252 252 253 253 253 254 254 258 258 264 265 266 268 269 272 272 272 272 272 273 275 C 2 1 Moving Around the System C 2 2 File Manipulation 00 C23 Editinga File on 408 eh ae Re ee ee Bas C 3 File System Structure 2 2 2 ee C 4 Services and Daemons 0 C 5 Groupsand Users e ps ais mane aA ea RA A pie E FIREWALLS AND PROXY SERVERS D 1 Configuring a Firewall or Proxy Server D 2 Disabling Proxy Settings in Your Browser D 2 1 Netscape Navigator aoaaa D 2 2 Internet Explorer aoaaa CERTIFICATES E 1 General Certificate Information E 1 1 Getting a Certificate Signed aoaaa aaa E 1 2 Certificates IP and Virtual Host Issues 2 E 2 Accepting an Unsigned Certificate 00 GLOSSARY REFERENCES vi 283 289 295 304 1 INTRODUCTION WELCOME TO ENGARDE SECURE PROFESSIONAL Guardian Digital EnGarde Secure Professional Linux is a comprehensive software solution that provides all the tools necessary to build a
92. P address by hand leave the field blank for it to listen on all interfaces or use the button to select the interfaces from a menu NOTE A forward server is still a primary or slave server don t get confused here All outside queries will be given to it first EnGarde Secure Professional 99 Section 4 4 System Management Default Zone Settings Allow transfers from This sets the servers that are allowed to perform zone transfers from the DNS server When a slave server requests updated infor mation from the master server the master server will transfer it to the slave server if authorized This procedure is known as a zone transfer No servers are authorized by default If you are uncertain of what to enter in here leave the default set and contact your network administrator Allow queries from This sets from which IPs your DNS server will accept DNS queries By default the DNS server will accept queries from all IP addresses If you are uncertain about what should be entered in here leave the default on Existing DNS Zones The other section on the main DNS page below the Global Server Options is Existing DNS Zones This will display the reverse and forward addresses of a domain If you click on the address you will be brought to the corresponding options page to have the ability to make changes The reverse address page and the forward address page both have different options We will discuss both pages below 10
93. RC4 encryption compression for the key 40bit encryption will be used if the client does not support 128bit encryption or if 128bit encryption is disabled It is recommended this option remains enabled 128 bit Encryption This specifies whether the PPTP daemon should use 128 bit RC4 encryption compression for the key This will use 128bit encryption as opposed to 40bit encryption if the client supports it Stateless Encryption This specifies whether the PPTP daemon should use state less encryption It is highly recommended you have this feature enabled Stateless encryption will randomly change the key during the session which in turn greatly increases security Without this enabled the same key is used for the entire session Edit User Here you can define edit and delete PPTP users This interface will list all the users once they have been created To create a new user click on the Create New User link Create New User At the Create New User screen you assign the user a user name and password When you are done click Create User and you will be returned to the main menu EnGarde Secure Professional 159 Section 4 6 Security 4 aa you can create a new m user Usemame WORRGROUP nick Password 91 KA7 Create User Username This is the username required to establish the VPN It may be necessary to specify the users workgroup in some cases and certain Windows configurations The syntax for this is workgroup
94. System Interface Secure Shell A secure shell is a telnet type connection made to a remote host This connection is protected with SSL 3DES 128bit encryption Secure shell is also known for short as SSH It is pronounced S S H Secure Socket Layer Is a protocol designed by Netscape Communications that provides encrypted communications for private documents via the Internet SSL works by use of a public private key system for exchanging session keys shared libraries Shared libraries are object files that are dynamically linked to executable binary programs Under Linux shared libraries can be stored in a number of directories usually listed in etc 1d so conf Shared libraries typically include files under usr 1ib If the shared libraries are deleted or become damaged or of the etc 1d so cache file is corrupted then programs that rely on them will fail to execute Almost all normal programs on a system rely on glibc signal Under Unix and Linux the signal is the most fundamental and common form of interprocess communications IPC It is also the basis for event driven programming under these systems Each Unix implementation de fines a set of signals that area associated with various asynchronous events such as a terminal sending an interrupt request SIGINT or a change in window size SIGWINCH SIMAP A version of IMAP that is tunneled through SSL for increased security For a description of IMAP see Internet Access Me
95. _binary o CAP_SETGID j INHERIT t End my_package rpm configuration You can even add this to your etc rc3 d etc rc d rc3 d for RedHat systems so the LIDS configuration is freshened on every boot up Just make sure it s done before the kernel is sealed lidsadm I More information about sealing the kernel is explained in later sections If this package is ever removed you will have to delete the entries Using the script method above delete out all the entries then lidsadm Z and run all the scripts again Otherwise you can issue a lidsadm D for each file entry you have For files with multiple entries you only need enter it in once Lidsadm will delete all entries for that file EnGarde Secure Professional 257 Section 9 4 Kernel Capabilities 9 4 Kernel Capabilities When a process is created it is given a set of capabilities from the kernel These capabilities tell the process what it can and can not do LIDS gives you the ability to alter these capabilities in the kernel You can set the capabilities to apply to all processes or only specific processes We saw how to apply capabilities to only specific processes previously in the Adding an Entry section and in the above example The default capabilities set that LIDS used is defined in the etc lids lids cap file This file contains a list of the capabilities by name with a number and a or symbol before it A enables the listed capability following it an
96. a mindters SSH Server Alias Connecting to Lockbox RindTera home C WINDOWS Jeva mindterm Connected to server naming 33H 1 5 OpensSH_2 2 0pl key file Admin Key password Jj If you do not have the above screen then you most likely received an error A couple of common errors are Unknown Host You will receive this error if the name or IP address of the host was not found or is not responding Check what you entered in the SSH Options screen above Server refused our key You will receive this error if the key you are using does not correspond to the key on the server This can be caused if the key on the server has changed you are pointing MindTerm to the wrong key or your key is invalid Double check your settings in the SSH Options If you are certain you are passing the correct key then a new key may have to be generated Contact your system administrator if this is the case At the password prompt displayed above enter in your password that was assigned to you by your system administrator If you entered in the password correctly you will now be logged into the system EnGarde Secure Professional 185 Section 6 1 Connecting from Windows 9x ME NT 2000 x imn loc k insidie guardandigital com home admin Ol xi Fie Edt Settings VT Options Tunnels Help Copyright c 1998 2000 by Mindbright Technology AB Stockhola Sweden Initializing random generator please wait done This is a demo version
97. administrative address that receives all undeliv erable mail Creating a Domain To make changes to a domain you have created you can simply click on the domain name listed under the Domain Management menu This will present you with the following screen Mail Server Management Domain Management Please click on a domain to configure it guardiandigitalcom linuxsecurity com Below you can add a domain you wish to recieve mail for The Postmaster is the the person who recieves all undeliverable mail Some example values are rwm dave or ryan guardiandigital com acmedynamite conl iadmin coyote co Fa New Domain EnGarde Secure Professional 89 Section 4 4 System Management To create the virtual domain start by entering the domain name into the Domain field followed by the postmaster s address for this domain in the Postmaster field Clicking Add New Domain will create this domain Editing a Domain Once a domain is created you will see it listed under Domain Management Click ing on the domain name itself will allow you to edit its attributes and add users to this domain 90 User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 Mail Server Management Below you can add a new e mail user E Mall Username is the username you wish to create will become user inside guardiandigital com Recipient is the person you want to recieve the message E Mail Username Recipient Edit Inside guardia
98. ady to set up the connection to your EnGarde Secure Professional PPTP server To set up PPTP in Windows 98 start by clicking on My Computer on your desktop The PPTP protocol in Windows 98 uses the Dial Up Networking interface Create a new connection in Dial Up Networking by clicking on the Dial Up Network ing icon Hep oe E Ao Up Cu oe z 3 Floppy A C D EJ My Computer amp m S F Printers Conto Panel DialUp Networking a 8 Scheduled Web Folders Select an item to view its description Select the Make New Connection icon to start the connection wizard application 202 User Guide VIRTUAL PRIVATE NETWORKING Chapter 7 This folder contains information about your dial up networking connections and a wizard to help you make anew There are two options on this first screen The first is labeled a name for the computer This is just a label that will be associated with this new configuration After the PPTP connection configuration is created it will be displayed as an icon with the label you give it below it The My Connection default name can be changed to something more descriptive such as Corporate Network The second option here is a pull down menu box Since we are setting up a Virtual Private Network VPN you will want to select Microsoft VPN Adapter When all your changes are set hit Next to proceed EnGarde Secure Professional
99. ail and serving web pages A 1 Network Interfaces Before any interfaces are created you will need to know the following e Each SSL based website requires its own IP address If more SSL based websites are to be served then a new interface must be created on another IP address for each website e There can be many normal websites on the same IP address given a Name Virtual Host defined in the Web server See the Section 4 3 Virtual Host Management on page 56 in the User Guide for more information on Name Virtual Hosts Example In the WebTool click on System Management and then click on Network Config uration There will already be an interface defined as IP Address Hostname Edit 192 166 1 70 myserver mydomain com Add a New Interface We want to set up a separate IP address for www engardelinux com since we will be creating a Secure Web Server on it Click on Add a New Interface to do this We are now prompted for our information at which point we enter IP Address 192 168 1 71 Netmask 255 255 255 0 EnGarde Secure Professional 265 Section A 2 DNS Server After clicking the Create button the Persistent Interfaces screen will look like IP Address Hostname Edit 192 168 1 70 myserver mydomain com Edit 192 168 171 lt Not Yet Defined gt Add a New Interface We have now successfully configured our network interface A 2 DNS Server The DNS Server is the mechanism that provides name to IP addre
100. ain to function properly Below you can define namservers for your domain Enter your domain in the Domain Name field and the name of the name server in the Name Server field Name Server lockbox quardiandigital conf Create To add the name server simply type it into the Name Server field and click on the Create button to submit the changes Edit Delete a Name Server Once you create a new name server you will see it listed below Name Name Server guardiandigital com lockbox guardiandigital com You can click on the name to edit the record Edit Name Server Record Below you can define namservers for your domain Enter your domain in the Domain Name field and the name of the name server in the Name Server field Name Server Jlockbox gquardiandigital com Save Delete To make changes to the record simply edit the field and click the Save button To delete the record click the Delete button EnGarde Secure Professional 105 Section 4 4 System Management Mail Server Here you have the ability to set up a mail server for the domain You can set up more than one server and set the priority level of the server More detail on doing this will be provided below Add Mail Server Record Below you can define what machine you want to recieve e mail for your domain Enter your domain in the Domain Name field and the machine name in the Mail Server field Mail Server smtp guardiandigital com Priority q Create
101. ame or when custom rgb is selected an rgb value bg Foreground color name or when custom rgb is selected an rgb value cc Cursor color name or when custom rgb is selected an rgb value Terminal Misc Ctrl Shift M This dialog contains some extra settings for the terminal The parameters set in this dialog are names as given in paragraph 5 sl Number of lines to save in scroll back buffer sb Position of scrollbar or disable scrollbar sd String containing delimiter characters that are used when click selecting words i e which characters functions as word delimiters bs Indicates whether backspace or delete should be sent when backspace key is pressed de Indicates whether backspace or delete should be sent when delete key is pressed Local Command Shell Starts the local command shell from which one can view and set all parameters of MindTerm The command shell is really only useful if you don t have menus e g when running without a GUI but for completeness it is available here Note the command shell is only available if enabled with command line option c or applet parameter cmdsh Auto Save Settings Enables disables automatic saving of settings when disabled you must explicitly save settings to file when needed When enabled set tings are saved whenever you disconnect from a server or when you exit 194 User Guide ENGARDE CONNECTIVITY Chapter 6 MindTerm Note that when both auto save and auto load is ena
102. anfeay Define Machine Once the machine NetBIOS name has been added it will appear on the main Ma chine Management menu From here you can edit the entry by clicking on it You can also delete the entry from within the edit screen or add an additional machine name from that main menu EnGarde Secure Professional 113 Section 4 4 System Management lanfear WINS Configuration WINS stands for Windows Internet Domain Service It serves the purpose of translating NetBIOS names into IP addresses If you have the machine set up as a master browser then it will act as a WINS server and will answer any incoming WINS queries NOTE WINS is suitable for environments with no DNS configuration To add a new entry click the New Record link Machine Name IP Address There are currently no hosts defined New Record To add static WINS entries to the WINS table you need to enter NetBIOS name and corresponding IP address in this section Windows File Sharing Below you can define anew NetBIOS name to IP address mapping Machine Name demandred IP Address 192 168 1 219 Create Record After selecting Create Record you will return to the main menu and your entry will appear To edit this entry simply click on it You will be returned to a menu similar to the creation menu with the addition of a Delete Record button To delete the entry press this button Selecting Save Record will update any changes you made Machine Name IP
103. are given EXACTLY as they would be with the standard Unix scp client i e regexps can be used The directory assumed on the 190 User Guide ENGARDE CONNECTIVITY Chapter 6 remote side is the user s home directory i e just like with the standard unix scp client To change direction of the copy operation press the Change Direction but ton the direction is indicated with the strings source and destination after the respective side If directories are to be traversed enable Recursive copy To make the copy operation use as little bandwidth CPU as possible set it to be Low priority Press Start Copy to start the copy operation This will launch a small win dow with progress and statistics of the copy operation A copy operation can be canceled at any time by pressing the Cancel button in this window Capture To File Captures terminal output to a file Capture starts immediately when the file has been selected and ends when this menu item is selected again Note that while capturing is active this is indicated by the menu item being selected Send ASCII File This will send the contents of the selected file to the terminal as input i e would be the same as if the contents were typed from the keyboard Close Ctrl Shift E Closes this window Note that when closing a window without logging out you are aborting the SSH connection abnormally i e it is advisable to logout in the shell before closing exiting MindTerm Exit C
104. as the installation and pricing of cable modems and DSL have been dropping Below are the requirements for configuring both DHCP and PPPoE devices to work with an EnGarde Secure Linux system DHCP Requirements DHCP in regards to broadband will allow your ethernet device to fetch it s config uration from the DHCP device such as a cable modem Configuring an EnGarde system to work with a cable modem can be done easily Make certain the cable modem is connected to the ethernet card that is set up for DHCP via the cable supplied with the modem Next make certain the ethernet interface connected to the cable modem is config ured for DHCP If this was not done at installation time it can be configured from the WebTool After logging into the WebTool select the System Management option Following that select Network Configuration At this point the ethernet interfaces in the EnGarde system will be displayed A static or PPPoE device can be changed to a DHCP device from here Refer to Section 4 4 8 on page 117 for details on how this is done The DHCP configuration is now complete There are now some general configu ration requirements that will need to be made These can be found after the PPPoE Requirements section on page 124 EnGarde Secure Professional 123 Section 4 4 System Management PPPoE Requirements PPPoE is short for Point to Point Protocol over Ethernet Point to Point Protocol PPP is commonly used by analog modems for c
105. at extent Next gt Cancel 290 User Guide CERTIFICATES Appendix E Your browser will ask you if you want to accept the certificate attached to your EnGarde system The reason for this is Guardian Digital has signed the certificate and is not a Certificate Authority CA such as Verisign and Thawte Having this certificate signed by a CA is not necessary since you can verify that you are connecting to your own EnGarde system You will want to accept this certificate Click the Next button to continue New Site Certificate Netscape This next screen will display brief information concerning the certificate There is a button you can click More Infor for detailed information concerning the certificate Click Next to continue EnGarde Secure Professional 291 Section E 2 Accepting an Unsigned Certificate New Site Certificate Netscape Now you will be asked in what way you want to accept this certificate You have three options here The first option will only accept the certificate for the current session So when you shut your browser down you will be prompted with the same screens the next time you try to login to the GD WebTool The second option will tell your browser to never accept the certificate This will lock you out of GD WebTool Finally the third option will accept the certificate until it expires When it expires and a new certificate is put in it s place you will be prompted again with thes
106. ata and information contained within it Guardian Digital solutions have been engineered with security as a primary concern providing that high degree of assurance required to conduct business on the Web today This high level of security integrated in to EnGarde Secure Professional requires you follow the guidelines in this manual when configuring and administering En Garde By following these guidelines you can be assured the highest level of system security at all times EnGarde Secure Professional 11 Section 3 0 3 INSTALLING ENGARDE SECURE PROFESSIONAL EnGarde Secure Professional comes with an easy to use front end for installing the operating system Described in the following sections are the steps to be com pleted to successfully complete an installation of EnGarde Secure Professional EnGarde Secure Professional also provides an easy to use interface for the initial configuration The initial configuration is ran after installation to configure the software on the machine as opposed to the installation which configures hard ware This interface requires you to configure it from another PC The client PC can be any operating system and only requires a browser that supports SSL Netscape 4 and Internet Explorer 5 will be fine for doing this The interface you will be using will guide you step by step through the set up pro cess We will also outline the steps in more detail in this manual The Guardian Digital WebTool will provi
107. ate Certificate Authority Name This is the name of the host the certificate will be used on This name must match your FQDN for SIMAP and SPOP3 to both work properly E Mail Address This is the authoritive contact This can be an individuals ad dress in charge of the address or the system administrator Organization The organization is the name of the company or individual who will own the certificate Department This is a sub category of the company name You should enter in the name of the department within the organization that has control over this certificate City This is the city that the physical server resides in State or Province This is the state or province in which the city from the above definition resides in Country The country entry box requires a two letter code to designate your coun try 4 6 7 Tripwire Maintenance Tripwire is an open source security tool copyrighted by Tripwire Security Inc and customized for EnGarde by Guardian Digital It that monitors changes in EnGarde Secure Professional 147 Section 4 6 Security file attributes and will raise an alert via an e mail to the system administrator concerning file changes that should not have taken place When you first visit to the Tripwire Maintenance section there will be instructions for initializing the Tripwire configuration This must be done before you can access the WebTool s Tripwire module Tripwire Initial Configuration Before y
108. backups and initializing the directories so they are ready to accept new backups licking the button below will delete all existing backups and control files setting the backup systern to the state it was in when it was first installed Initalize Directory 164 User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 4 7 3 Create a New Backup Creating a new backup will allow you to run one of your predefined named back ups immediately Don t confuse this with the ability to create a new type of backup When you select the Create a New Backup link you will be brought to anew menu SE User Home Directories Mome y Web Server Files Jnomettpa Web Server Configuration Jetcdntted v DNS Configuration Nariehrootinamed y Mail Server Configuration Jetcipostfin y Everything MySQL Databases War fibiraysql a You will have the option to choose a backup to perform When you made your selection hit the Select button You will then be prompted to choose between an incremental and full backup OT ce Backup Method Backup to IDETape Drive Name of Backup MySQL Databases Directory Back Up fvar fits Inysql Exclude err Click the Create Incremental Backup button if you wish to continue with an incremental backup Click the Create Full Backup button if you wish to continue with a full backup Create incremental Backup Create Full Backup Once you have done this the backup will proceed and after everything is finished a summary
109. bled which is default settings files are created automatically and the user never have to worry about saving loading them Auto Load Settings Enables disables automatic loading of settings When dis abled you must explicitly load settings from file if you need to When en abled MindTerm tries to load a settings file with the same name as what you give at the SSH Server prompt or in the Settings gt SSH Connection dialog These files are located in the MindTerm home directory Thus the server you give at the prompt does not necessarily have to be the name of the server it is mainly the name of the settings file to load Normally the user does not have to worry about the settings files since it is handled auto matically Though to create short names for servers and to create multiple settings files for a single server you have to explicitly create settings files Current Connections This dialog lists the currently open connections through the tunnels you have set up Note that it doesn t list the tunnels themselves only active connections through them You can close a tunnel by selecting it and clicking close EnGarde Secure Professional 195 Section 6 2 Connecting from Unix 6 2 Connecting from Unix The first thing you will need to connect to your EnGarde system is an SSH client For Unix there is OpenSSH You can download OpenSSH from http www guardiandigital com tools You will also find OpenSSL as you will need this
110. can also delete the virtual host and change the database password from here 4 3 4 Web Site Directory Structure When a Web site is created the following directory structure will be created on the system home httpd lt sitename gt lt port gt Inside of this directory the following sub directories will exist cgi bin This is the directory where cgi bin is aliased to html This is the document root logs This is where the access error and SSL logs are kept If a secure site was created the following will also be created ssl This is where the SSL certificate and key are kept cgi bin The CGI files for you Web site should be located here For ex ample if register cgi was placed then you would access it by using the following URL 72 User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 http www engardelinux com cgi bin register cgi Using the lockbox guardiandigital com example being used in this section the directory URLs would look as follows For a standard non secure Web server e nome httpd engarde guardiandigital com 80 cgi bin e nome httpd engarde guardiandigital com 80 html e home httpd engarde guardiandigital com 80 logs e nome httpd engarde guardiandigital com 80 ssl For a Secure Socket Layer SSL Web server e nome httpd engarde guardiandigital com 443 cgi bin e home httpd engarde guardiandigital com 443 html e home httpd engarde guardiandigital com 443 logs e nome httpd engarde guardian
111. change your system password or manage SSH keys When you are finished please click the Logout button in the upper right hand corner of your screen Change System Password Change the password you use to read your email Secure Shell Koy Management Upload Generate or Delete SSH keys trom your remote keyring Logout When you are finished use this link to logout 4 8 1 Change System Password In this section a user can change their system password The old password must first be entered followed up by the new password twice If both new passwords match the user will be logged out and the password will be updated EnGarde Secure Professional 169 Section 4 8 Secure Manager Welcome to the password administration menu Here you can change your account password enter your ole password in the first field and your new password in the next two fields If the two new passwords match then your password will be changed and you will be logged out of the password changing area Old Password we eRe ee New Password eee New Passwerd Again waved Abort and Log Out Update Password Clicking the Abort and Log Out button will cancel this operation 4 8 2 Secure Shell Key Management Here the user has the ability to create or upload their own public key to the En Garde Secure Professional server so that they may be able to SSH into the server For more information on what SSH is and how to use it in a Windows and Unix environ
112. conds Set how often you wish to have your windows refresh 138 User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 EAS Display Lines This is the number of lines the EAS applets will display Its meaning varies from applet to applet For example in the Services applet it defines how many log lines will be displayed and in the Process applet it defines how many processes will be displayed EAS Truncate Length This is the number of characters on a line that will be displayed before the line is truncated in the interest of display This is used to control wrapped caused by long lines in the pop up EnGarde Secure Professional 139 Section 4 6 Security 4 6 Security EnGarde Secure Professional includes all necessary security settings pre configured They are optimally set for the highest level of security without hindering the usage of EnGarde This section will let you configure some of these security settings to adapt to possible system changes you may make over time From here you have the ability to manage certificates configure SSL encryption IP access control customize your console login banner configure host intrusion detection gateway firewalling and virtual private networking In this area you can eras various security settings for the _ Change WebTeol Password Change the password you use to access the WebTool Change Admmistrator Address Setup the address that receives security alerts and the daily surnrmary Edit Log
113. ction D 2 Disabling Proxy Settings in Your Browser Preferences Click the radio button labeled Direct connection to the Internet and then click Ok Your Netscape browser is now ready to connect to your EnGarde system D 2 2 Internet Explorer To disable the proxy settings in Internet Explorer you will need to be at the main Internet Explorer window Click the Tools menu button and then select Internet Options from the pull down menu Internet Options Once you select Internet Options you will be presented with the Internet Options 286 User Guide FIREWALLS AND PROXY SERVERS Appendix D dialog box At the top of the box there are a list of tabs select Connection From the Connection section click the Lan Settings button Internet Options aS Enos fe Ever dialie Conhecton EVER a HeUvOnOCGMHECUGH IS hol piesent Hlal MG eran GohneGuGt DUTeHUGeEnault Wate Jo Berton sistem security check before dialing After clicking the Setup button the proxy information will be displayed You want to turn off all your proxy server settings so you have to make sure all the check boxes are NOT checked Once this is done click the OK button to finish EnGarde Secure Professional 287 Section D 2 Disabling Proxy Settings in Your Browser Local Area Network LAN Settings AGGESS aati J Bypass pror You are now ready to connect to your EnGarde system with Internet Explorer 288 User Guide E CERTIFICATES E 1
114. d a disables it Before each capability is a description of what the capability does We suggest you keep the default capabilities You can also find a list of all the capabilities and definitions at the end of this section and by just typing 1idsadm or lidsadm h Issuing lidsadm I sets all the capabilities listed in the etc lids lids cap file By default in EnGarde Linux the command is entered into the etc rc local file so the kernel is sealed during boot up When LIDS is disabled the capabilities return to their original settings and when you enable the kernel again they return to their previous state Earlier we set capabilities to a binary We were actually linking a capability a process the binary creates lidsadm A s path to binary t o CAP_NAME All processes however are protected from being killed by anyone but the owner of the process This too can be avoided with the above process 9 4 1 Capability Names and Descriptions Here is a list of all the capabilities supported by LIDS and what their function is CAP_CHOWN In a system with the _POSIX_CHOWN_RESTRICTED option defined this overrides the restriction of changing file ownership and group ownership 258 User Guide THE LINUX INTRUSION DETECTION SYSTEM LIDS Chapter 9 CAP_DAC_ OVERRIDE Override all DAC access including ACL execute access if _POSIX_A CL is defined Excluding DAC access covered by CAP_LINUX_IMMUTABLE CAP_DAC_ READ SE
115. d report at the bottom of the report Update Database When you select the Update Database option Tripwire will create a list of all the files that have changed and will display them to you along with a check box next to each one 150 User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 Tripwire Maintenance Below you can view reports and update your tripwire policy files GD WebT ool Files usr webtool Added r r A jusr iwebtoal dusr Avebtool ver sion just Wvebtool mime types tusr Web tooltLICENSE fetcwebtool var path fetcwebtoolwebrain acl fete webtool userpass conf CL Update Database To add an item to the database unselect the check box Once all changes have been made enter in the passphrase and select Update Database 4 6 8 Firewall Setup EnGarde Secure Professional allows you to configure global firewall settings and set up port forwarding rules The firewall security policy configured with EnGarde by Guardian Digital combined with the additional security measures included with EnGarde provide a robust firewall configuration for most environments A description of each menu and the items contained within it are explained below Firewall Setup Below you can perform firewall configuration General Configuration Edit general firewalling configuration aptions Configure Port Forwarding Define hostsiports you wish to forward Firewall Setup Help Mew the help page for this module En
116. de the complete ability to configure your EnGarde sys tem after installation 12 User Guide INSTALLING ENGARDE SECURE PROFESSIONAL Chapter 3 3 1 System Requirements Below are a list of the system requirements for EnGarde Secure Professional e 486 or faster processor e 16MB of ram or greater e 520MB hard drive SCSI or IDE e 1 network interface card The above listed requirements are the bare minimum for EnGarde Linux to func tion properly We highly recommend using a system with the following specifica tions e Pentium class processor e 32MB of ram or greater e 2Gb hard disk SCSI or IDE e 1 PCI network interface card EnGarde Secure Professional 13 Section 3 2 The EnGarde Secure Professional Installer 3 2 The EnGarde Secure Professional Installer The installation process is mostly automated but can be very interactive if the advanced user wishes The installation process is started by booting the system with the EnGarde Secure Professional CD ROM If your system does not support the CD ROM drive as a boot device you can create a bootable floppy disk refer to Appendix B 1 on page 272 for information on creating a bootable floppy disk Booting Once the system finds bootable media you will be presented with a prompt and a few options You can press Enter to continue with a normal installation press F2 to view more information concerning Rescue Mode explained in Appendix B 1 on page 272 or press F3 to view add
117. digital com 443 ssl In an HTML form you would use something of the sort lt FORM ACTION cgi bin register cgi METHOD GET gt html This is where the HTML files are kept logs This is the directory where the logs are kept You can set up how often the logs are analyzed in the Configure Website Log Analysis section of the WebTool ssl If this is a secure site then this is where the certificate and key are kept You should never edit anything in this directory by hand EnGarde Secure Professional 73 Section 4 3 Virtual Host Management 4 3 5 Set Up Name Virtual Hosts A Virtual Host has to be bound to an IP address This is required for proper operation of your virtual host Port IP Address va iI Add New IP Here is where you can enter in the IP address and port of your new Name Virtual Hosts To add a new host select the port from the pull down menu and enter in the IP address you want The port pull down menu gives you two selections Port 80 for normal connections and 443 for secure connections Choose accordingly Click the Add New IP button after each IP address your your new host will be added To delete a named virtual host simply click on the IP address of it 4 3 6 Configure Web Site Log Analysis Site Edit Configuration File lockbox guardiandigital com lockbox guardiandigital com conf Each virtual host running on your system has it s own status logs In here you have the options to co
118. e same menus If you will be doing your administration via the GD WebTool on the current ma chine it is recommended you select Accept this certificate forever until it expires option Once you have made your decision select the Next button 292 User Guide CERTIFICATES Appendix E New Site Certificate Netscape a This fourth screen will inform you of the possibility of fraud and insecurity when using an unsigned certificate Since you know EnGarde Linux and the certificate both came from Guardian Digital you can be certain your connection and data will be secure EnGarde Secure Professional 293 Section E 2 Accepting an Unsigned Certificate This is the final step and will inform you of your decision to accept the certificate and verify your options Click Finish to fully accept the certificate and enter the GD WebTool 294 User Guide F GLOSSARY attributes ext2fs specific In addition to standard Unix permissions the ext2 file system contains additional attributes which the file system driver hon ors whenever the file is accessed or modified Attributes are set or unset by the CHATTR command and it is common to refer to the bits set by the name The immutable bit is particularly popular among system admin istrators trying to protect critical files from unintentional destruction by an inattentive ROOT user authentication The process of knowing that the data received is the same as the data that was sent
119. e Domain Name Ser vice servers Domain Name Service DNS is the software that is responsible for converting host names into numbers that computers can understand If you selected a DHCP or PPPoE ethernet device they may retrieve your DNS information for you If you have no DHCP or PPPoE configured devices then you are required to enter in at least one DNS server otherwise both are optional 3 2 9 Troubleshooting NICs If the EnGarde Installer locates a NIC but fails to initialize the card properly you will be brought to this dialog box below at the start of the networking module 36 User Guide INSTALLING ENGARDE SECURE PROFESSIONAL Chapter 3 This will list for you all the cards found in the system that failed to load properly Since EnGarde requires at least one NIC device be present during install you will have the ability to force an ethernet device to be configured To forcefully add the device select the Add button from the dialog box Upon doing so a new box will be displayed This new dialog box will allow you to choose one or more network cards to add to the system The list box in this dialog box allows you to select multiple net work cards to be added at the once This interface works identically to the one mentioned earlier in the package selection section Ndvanced Micro Dev 79c9786 PCnet LANCE After selecting your devices hit Add Card s and if you added every available card EnGarde Secure Professional 37
120. e The swap partition is 5 of the system drive but will not be less than 32MB and no greater than 256MB e var and home will them be 50 each of the total remaining space For example if we have a 20Gb drive 20012MB the partitions will look like this A 2048MB swap 256MB home 8854MB var 8854MB These numbers are determined as follows EnGarde Secure Professional 273 Section B 3 Automatic partition scheme 20012 25 5003MB 5003 gt 2048MB swap 20012 05 1000 6MB 1000 6 gt 256MB home 20012 2048 256 17708 50 8854 var same as home 274 User Guide C GENERAL LINUX C 1 Introduction In this section we will discuss some basic Linux knowledge for administering En Garde from the console or an SSH connection This section is more for advanced users You have to be careful you can corrupt the system configuration resulting in improper operation of your EnGarde system C 1 1 Root Access on Your EnGarde System su is a small program that gives you the ability to login as the root user from a remote connection To help increase security you are prevented from running su The only ways to gain root access is to either login as root from the console or make an SSH connection to EnGarde as the root user All logins via SSH both root logins and normal user logins are logged in var 1lo g syslogandare filteredinto var log audit ssh_authorization log var log audit su_logins log and var log audit s
121. e has the ability to create thousands of vir tual Web sites from the same IP address e E Mail Server Aliasing EnGarde gives the administrator the ability to add e mail server aliases allowing the creation of thousands of virtual e mail domains 4 User Guide INTRODUCTION Chapter 1 1 2 List of Chapters and Appendices Chapter 1 Introduction covers basic information about EnGarde Chapter 2 General Security gives you an understanding of basic security Chapter 3 Installing EnGarde is an guide for installing and initially configuring EnGarde Chapter 4 The Guardian Digital WebTool covers all the functions of the GD WebTool configuration utility Chapter 5 Guardian Digital Secure Network shows you how to take advantage of the Guardian Digital Secure Network automated update system Chapter 6 EnGarde Connectivity has information of the different ways of con necting to your EnGarde system from a remote location without using the Guardian Digital WebTool Chapter 7 The Virtual Private Networking VPN section covers configuring your EnGarde Secure Professional server for VPN and configuring Windows 98 NT 2000 to connect to a VPN using EnGarde Chapter 8 Secure E Mail shows you how to configure different e mail clients to work with secure e mail services Chapter 9 The Linux Intrusion Detection System LIDS is covered in the WebTool but delves into a much more technical aspect of this feature Appendix A Quick Start Guide contai
122. e the changes can take effect 280 User Guide GENERAL LINUX Appendix C C 5 Groups and Users File and directory permissions are the basic means for providing security on a system They are also the last line of defense against an unauthorized user reading or modifying information that does not belong to them A properly configured system contains files and directories which are only accessible to the users in which were authorized to access those files and directories The set of rules that a file or directory is given to tell it who can and can t access it are known as permissions These file and directory permissions are assigned by both user and group Each file and directory has three sets of permissions associated with it It gives permissions to owner group and other Below is the result of a sample directory listing produced by executing 1s 1 displayed with each field broken down 1 2 3 4 5 6 7 rw r r 1 nick users 6619 Oct 24 15 57 README Field 1 Permissions for this file We will break down these nine file permis sion settings in the next section Field 2 Number of hard links to this file or directory These links can be directories Field 3 Owner of the file The users user name is displayed if no user name is associated with the owner then the user ID number is displayed Field 4 The group to which the file belongs A group name will be displayed
123. e your virtual hosts Create a Virtual Host Setup anew virtual host Create an SSL Virtual Host Setup anew SSL based virtual host Setup Name Virtual Hests Configure which IP addresses you would like to run virtual hosts from Configure Website Log Analysis Configure various options for generating web statisties Restart Web Server Click here to restart the web server so your changes take effect If no virtual hosts have been set up yet your Virtual Servers section will be empty First we will discuss how to create a virtual host NOTE After making any Web changes you must restart the Web server You can restart the server by clicking the Restart Web Server button on the main Vir tual Host Management page 4 3 1 Creating a Virtual Host In this section you will have the ability to create a Virtual Host also known as a Virtual Server Creating a Virtual Host through this method will be for hosting a Web site and will not affect any other virtual hosts You must fill in all the required fields A description of each field is listed below 56 User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 Create a New Virtual Host Below you can create a new virtual server All four fields are required For help click on the help links re a Administ r Address 192 168 1 196 astor nick guardiandigital com S F rar 7 beac lockbox guardiandigital com Webmaster nick zj Group www Create Group Create a database for
124. eate Quota button for this quota to go into effect To create a group quota select the New Group Quota link You will be brought to a screen similar to the New User Quota screen but instead of asking for a user name a group name is wanted This menu works the same way but the quota takes effect for every user of that group Define New Quota Type Group Group Name usera ke Soft Limit 1d MB Hard Limit iq MB Create Quota Resource Limits The Resource Limits section contains three subsections System wide Limits User Limits and Group Limits There are all system wide limits All the interfaces here work similarly To edit and existing item select the associated Edit link to the right of it and to add a new limit click the New Limit button associated with it EnGarde Secure Professional 129 Section 4 4 System Management Ary hard Maximum Core Size KB 0 Edit Arny hard Maximum Nurnber of Processes 160 Edit Ary hard Maximum File Size KB 40000 Edit ary hard Maximum Number of Logins 5 Edit New System wide Limit mysal hard Maximum File Size KB 10000000 Edit I New User Limit users hard Maximum File Size KB 15000 I Edit New Group Limit System wide Limits All the limits set in here are generic limits that effect everything that is not con trolled by the root user You have three options from this menu if your limit is soft or hard what kind of limit it will be and the value of the
125. ection A 3 Mail Server Alias sales engardelinux com Real Name www engardelinux com Mail Server Records Mail Server mail engardelinux com Priority 10 At this point we have successfully created www engardelinux comand mail engardelinux comto goto192 168 1 71 We have now successfully configured the DNS records for our sample domain A 3 Mail Server The mail server provides the mechanism to deliver e mail to a recipient on the In ternet When an e mail is sent the mail server is instructed to deliver the message to the remote mail server responsible for the recipient s domain Example To configure e mail for our new domain we must create a new Mail Domain From the System Management section select Mail Server Management Then se lect Domain Management We want to Create a New Domain with the following values Domain engardelinux com Postmaster ryan This assumes that there is a user named ryan on the system Now EnGarde has been configured to receive mail for engardelinux com The local user ryan has been defined as the Postmaster More information on the Postmaster account is available in Section 4 4 4 Mail Server Management on page 87 Once the mail domain is created individual user accounts can be added by click ing on the engardelinux com link 268 User Guide QUICK START GUIDE Appendix A Example 1 E Mail Username administrator Recipient christi Example 2 E Mail Username info
126. ed to transfer DNS information between each other You can set the default in the Default Zone Settings section for this specific zone which is described later in this section Allow Queries From Here you can list the IP addresses and or block of IP ad dresses for machines that are allowed to query your DNS server You may want to limit this to the people inside your network if your EnGarde system is located on your internal or private network We recommend leaving the default set if you are uncertain You can set the default in the Default Zone Settings section which is described later in this section Creating a New Slave Zone A secondary DNS server also sometimes referred to as a slave server for a zone gets the zone data from another DNS server that is authoritative for the zone called its master server When a secondary name server starts up it contacts its master server and requests a copy of the zone data for which it is responsible This is called a zone transfer A slave server will backup your master server This is mostly for redundancy if your master server is not running or is unavailable to answer a query This section has everything necessary to create one 96 User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 NOTE You must configure the master server to allow this new slave server to per form zone transfers from the master server These changes must be made on the master server Information pertaining to this can
127. ed to enter in the state in which your orga nization resides You must enter the full name of the state not an abbrevia tion In the example above New Jersey used EnGarde Secure Professional 67 Section 4 3 Virtual Host Management Country Enter in the country in which the organization resides in this field This requires an abbreviated name for the country not the full name as in the previous two fields In the example above US was used When all the fields are completed click the Generate Key button to create the certificate and key You must now go back to the previous screen and click the Restart Web Server button for the changes to be activated Generate Certificate Signing Request A Certificate Signing Request CSR is what is sent to a Certificate Authority CA such as Verisign or Thawte to request a signed certificate for your site This section will allow you to create one to be submitted The form looks similar to the Generate Certificate and Key form above You can refer to the previous section above Generate Certificate and Key for a description of each of the fields There is however one new field Create New Certificate Key Pair If this option is selected it will create a new certificate and key with the information you filled in It will then allow you to download the certificate to be signed If you wish request a new certificate because your old one has expired then d not select the Create New Certificate Key Pair
128. em configuration hom User home directories lib Essential shared libraries and kernel modules mnt ount point for mounting a filesystem temporarily root Home directory for the root user sbin Essential system binaries tmp Temporary files usE Secondary hierarchy var Variable data This is just a brief summary of the main root file system For more detailed infor mation you can download the Filesystem Hierarchy Standard from http www pathname com fhs EnGarde Secure Professional 279 Section C 4 Services and Daemons C 4 Services and Daemons Linux has the ability to start and stop services and daemons on the fly A service is generally something like POP3 or an FTP server and are managed using files in the etc inet d directory You can also have services ran from the init d scripts Here are a few commands with their results etc init d crond start Starting crond OK etc init d d stop Shutting down crond OK etc init d crond restart Shutting down crond OK Starting crond OK etc init d crond status crond pid 18529 18525 18522 is running Not all commands in this directory have the above options To get a list of what each one can do type the filename by itself This is primarily used if you need to shutdown a daemon for maintenance or other reasons Remember when you make modifications to configuration files for a daemon you generally have to restart that daemon befor
129. en source nature of Linux programs are often evaluated for security vulnerabilities Between the time the known security vulnerabilities are found additional protection is available to provide an extra layer of security until the system can be updated Since Linux is an art of the open source community security holes may be found more easily but can also be patched just as quickly and easily But when the hole is disclosed to the public and the administrator is unable to patch the hole it could potentially compromise your system With the typical Linux systems a cracker has absolute control if superuser access is gained With the added protection of LIDS this and many other potential problems can be reduced LIDS provides the ability to control all access to files processes binaries mem ory raw devices drives etc One of the main features of LIDS is protection from the superuser known on a Linux system as the root user NOTE LIDS requires advanced administration skills to manage properly and there fore should not be modified by inexperienced users Managing EnGarde Se THE LINUX INTRUSION DETECTION SYSTEM LIDS Chapter 9 cure Linux through the WebTool will not require users to perform and LIDS administration The root user has control over every single aspect of the system They can mount and unmount drives delete and create files remove users access the database edit the Web page shutdown the system etc So you can see
130. equired and one must be a static IP Additionally the static interface must be defined as the gateway and the DNS server Additional information concerning PPPoE DHCP and broadband usage can be found in Sections 4 4 8 and 4 4 9 User Guide INSTALLING ENGARDE SECURE PROFESSIONAL Chapter 3 3 2 6 Set the Default Gateway The next step in the network configuration process is to configure the default gate way The default gateway is required if the requested route is not found in the routing table the default gateway will be used To set a device as a default gateway simply scroll with the arrow keys and make your selection by pressing Enter NOTE When a device is configured for PPPoE it is assumed as the default gateway 3 2 7 Configure a Fully Qualified Domain Name FQDN After selecting your default gateway it s required you enter in your hostname and your domain in a Fully Qualified Domain Name FQDN format A Fully Qualified Domain Name is written from most specific a host name to least specific a top level domain where each part of the domain separated by a period For example if you were to name the host Lockbox and place it inside the guardiandigital comdomain the FQDN would be lockbox guardiandigital comas in the example screen shot below EnGarde Secure Professional 35 Section 3 2 The EnGarde Secure Professional Installer 3 2 8 DNS Configuration The final step of network configuration is to configure th
131. ess and basic system access mysql The mysql group is primarily used for running the MySQL server This is done for the same reasons as explained above in the admin 80 User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 description The administrator will also have access to MySQL and all its databases named The named group is used for the DNS server This group is defined specifically for this task By giving the DNS server it s own group helps increase security snort Snort exists for the same reasons the named group exists 4 4 2 FTP Configuration EnGarde Secure Professional includes a secure FTP server You can configure your FTP server from here Global Configuration makes system wide changes and the Define Chroot and Blacklist menus allow you to define who is not allowed to connect via FTP and where users are limited to Below you can configure your FTP server Global Configuration Configure general settings that effect all connections Define Chroot and Blacklist Define what users to chroot and what users to block FTP Server Configuration Help View the help page for this module Global Configuration The Global Configuration section allows you to make system wide configuration changes to your FTP server Each item found on this menu is explained in detail below EnGarde Secure Professional 81 Section 4 4 System Management aL eT TEE TOTEE If you are unsure jon of an option please click on the help link
132. ete button Edit Zone Parameters The zone parameters are general settings needed by the zone You will be pre sented with a menu of the options with the defaults being displayed A description of each item is listed below Master server Rockbox guardiandigital com Email address Jsdningguardiandigital com Save Master Server The Master Server field contains the address of your master DNS server also known as a primary DNS server The master server controls the DNS for your zone For example if you own guardiandigital com your master server will be responsible for the hostnames and IP addresses for guardiandig ital com E mail Address The administrative e mail address responsible for this zone Gen erally this is the e mail address of the system administrator or whomever is responsible for DNS for this zone When editing is finished click the Save button to apply the changes EnGarde Secure Professional 107 Section 4 4 System Management Edit Zone Options The zone options are preset to the settings you specified globally in the Global Options section 4 4 5 on page 99 If you wish to override any global settings you can do so here Zone Options Allow queries from Allow transfers from Allow Any Allow None Q Listed Listed T Save 4 4 6 DHCP Server Configuration DHCP is the Dynamic Host Control Protocol It allow hosts to obtain a dynamic IP address from a centralized machi
133. ethods depending on the pro tocol version used For more information on SSH please visit www openssh com the OpenSSH Project home page Section 6 1 Connecting from Windows 9x ME NT 2000 6 1 Connecting from Windows 9x ME NT 2000 Windows based systems only include telnet capability Therefore we have included a utility to make a secure connection to your EnGarde system from a Windows host MindTerm is a secure SSH client included on your EnGarde CD ROM It can be found in the x dosutils mindterm directory Replace the x in the previous statement with the drive letter of your CD ROM drive Installation instructions are in the next section MindTerm provides you the ability to make an SSH connection to your EnGarde Linux system You will be on a secure 1024 bit encrypted connection MindTerm performs X Term emulation You also have SCP capabilities which allows you to copy files securely over an SSH connection SCP will be fully explained in the Menus section 6 1 1 Installing MindTerm We have included an installer for Windows based systems to use You can find the installer in x dosutils mindterm setup exe You can type in the command by clicking the Start button then selecting Run You can also click on My Computer select you CD ROM drive then the dosutils folder followed by the mindterm folder and finally selecting the setup exe file This will start the MindTerm installer Once the installer starts you will have a
134. ew range A description of each option is listed below Subnet The DHCP Subnet is the network that the block of IP s is on For example if you want to allocate 192 168 1 10 Start Address through 192 168 1 20 End Address you would enter 192 168 1 0 here Netmask This is the netmask value for the block of IP s you are allocating A sample netmask is 255 255 255 0 This netmask is sent to the client when they request an address Gateway The DHCP Gateway is the machine that the client machines need to access to get to the outside world This is also referred to as a default route When the client machine requests an IP address this is sent back to them along with the assigned address Domain Name This is the domain that the client machines are in An example value is inside xyzcorp com This is generally the domain portion of the DNS name for the IP address EnGarde Secure Professional 109 Section 4 4 System Management DNS Servers These are the DNS servers that the clients should be assigned A DNS server is used to resolve names into IP addresses When the client requests an IP address the server will send these DNS servers back along with the assigned address You can enter as many DNS servers as you want here provided that they are separated with spaces Start Address This is the first IP in the range you wish to allocate If you want to allocate the range 192 168 1 10 through 192 168 1 20 you would enter 192 168
135. exes Certificate Management Generate or upload a certificate key pair Webmail Configuration Configure various Webmail settings Server Configuration Change the IP acidress server name or database options 60 User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 The options in this section are for advanced users who have knowledge of the Apache server There are many complex options to give you full and complete control over your virtual host We recommend you read the main Apache docu mentation which can be found at http www apache org docs before making any changes There are also numerous books available on this subject Networking and Addresses In this section you will have the ability to define what interfaces and addresses this virtual host should listen on Networking and Addresses For lockbox guardiandigital com Server admin email address Fickeguardiandigital com Alternate virtual server names Save First you will need to enter in the server administrators e mail address Following that is the Alternate virtual server names section You have the ability to assign other names to your host For example say you have www guardiandigital com and you also want www guardiandigital net to go to www guard iandigital com You would enter www guardiandigital net into the Alternate virtual server names field Click the Save button to save your changes Document Options Here you have the option to
136. ext button to continue 240 User Guide SECURE E MAIL Chapter 8 Internet Connection Wizard If you already have an account with an Internet service provider and have obtained all the necessary connection information you can connect to your account using your phone line If you are connected to a local area network LAN that is connected to the Internet you can access the Intemet over the LAN Which method do you want to use to connect to the Internet Connect using my phone line Connect using my local area network LAN C willl establish my Internet connection manually You will now see a confirmation screen informing you the profile has been created Click the Finish button to continue EnGarde Secure Professional 241 Section 8 2 Configuring Outlook for Secure IMAP and POP3 Internet Connection Wizard You will now be returned to the Internet Accounts dialog and will notice the profile you created listed in the window in the Mail tab At this point we have to setup the profile to work with a secure server Select the Properties button on the right 242 User Guide SECURE E MAIL Chapter 8 Internet Accounts 2 xi All Mail Directory Service Type Connection Remove SA lockbor guardian mail default Local Area Network Properties Getas Beraut Import Here you will see you have four tags General Servers Connection and Advanced Select the Advanced tag to continue
137. fine specific users Or groups that you wish to allow or deny access to If the box is left blank the access will be granted to all users provided the appropriate access control rules are defined in the Security module Keep in mind that if you grant access to a specific user or group then only those users will be able to ssh to the machine Be careful not to lock yourself out These should only be modified if you know what you are doing C jyes Permit Root Login me intertaces CE Allow Users Allow Groups root Deny Users nny Ong a Write Configuration By default EnGarde Linux will not allow you to login via SSH as the root user Though if this feature is required it can be enabled by selecting Enabled from the pull down menu The second field contains the option to define which interfaces SSH will listen on Leave this field blank to allow it to listen on all interfaces or enter in each interface by IP using a blank space for the delimiter You can also select the gt button to bring up a list of all the interfaces In each deny allow field you can enter in a group name or user name whichever is appropriate for the field using a blank space as a delimiter Clicking on the button will bring up a small window containing a list of users or groups you may select from There are a few rules to take note of when configuring access control for SSL Below is a short list of basic rules e Once you add a
138. firewall to allow EnGarde access to the outside world Below are a list of ports and what they are You may not have all of the listed ports opened on your EnGarde system if you don t have it configured to For example if your EnGarde system is not a DNS server you will not have the DNS port 53 opened 22 tcp 25 tcp This is the SSH port If you want to allow anyone from outside to SSH into your machine you must open this port This is the SMTP service If this machine will be receiving e mail this port must be available 53 tcp amp udp This is the DNS service You will need to have this opened Config 80 tcp 443 tcp 993 tcp 995 tcp 1022 tcp uring DNS to work through a firewall or proxy server can be difficult and it is recommended to refer to your firewall manual for complete instructions If EnGarde is going to be a Web server you will need to enable access to this port If EnGarde is a Web server and will be hosting a secure site you will need to open this port to support SSL If EnGarde will be offering Secure IMAP you will need to have this port open Secure POP3 will be available from this port if EnGarde is running it This is the user password changer portion of the GD WebTool If you want to give outside users to availability to change their own password via the GD WebTool you will need to open this port up Section D 1 Configuring a Firewall or Proxy Server 1023 tcp This is the actual GD WebTool for
139. ftware RAID Mode The EnGarde Installer allows the selection of multiple swap partitions during a Software RAID installation These swap partitions are assigned the same priority so that the system will access all the partitions at the same time to read and write its data This greatly increases swap performance After creating the first Software RAID partition the RAID selection screen will change Partition Configuration Select to make this partition a swap partition or choose the RAID level Choose help for more information concerning a gt J In place of the No RAID option will be Swap Select the Swap option to start the process of creating swap partitions Selecting drives to use for swap After selecting Swap there will be a new menu with a list of available drives Choose at least one drive for the swap partition There is no limit on swap parti tions 26 User Guide INSTALLING ENGARDE SECURE PROFESSIONAL Chapter 3 Determine swap size Once the drives have been selected the size of the partition s must be selected The installer will determine the maximum size allowed for the swap partition s This is determined by the drive with the smallest space available After choosing the size of the swap partitions along with any others that may have been created it will be displayed in the main partition menu EnGarde Secure Professional 27 Section 3 2 The EnGarde Secure Professional Installer Ed
140. g Device This will be the device in your EnGarde system that will be used to access the router Generally et h0 is used for this When changes are done being made click the Save Default Route button for changes to take effect NOTE Only configured interfaces will be displayed Hostname and DNS Client Configuration This section will allow you to reconfigure your DNS servers and your hostname which are configured at installation time Additionally you can add Search Do mains from here as well Hostname and Search Domains Hostname Search Domains louardiandigital com Hostname The hostname must be a Fully Qualified Domain Name Entering in an incorrect or partial hostname can have serious negative effects on a system It is also highly recommended not to change the hostname of a production system EnGarde Secure Professional 121 Section 4 4 System Management Search Domains Search domains are domains that the system will automatically search if only a hostname is given For example if you specify guardiandigital com and in your web browser your type www in the address bar the system will know to look for www guardiandigital com as well as the other domains you have listed Following the Hostname and Search Domains configuration is the DNS config uration Here you will see the DNS server s that were supplied at install time These can be change by typing in new IP addresses into these fields NOTE
141. g the initial installation and configuration of the machine If you enter in a wrong name and or password return to the previous screen and you can enter it in again 53 EnGarde Secure Professional Section 4 2 The Main WebTool Menu Screen 4 2 The Main WebTool Menu Screen After a successful login the GD WebTool will bring you to the main screen Guaroian 7 koi DIGITAL EnGarde Pioneering Open Source Security a Logout Virtual Host System EnGarde Manayement Management Auditing System i Guardian Digital a System Security Secure Network Backup gt Guardian Digital Secure Network Guardian Digitalcom Support Guardian Digital Store This screen contains the main categories of options for administering your system These categories are listed below with explanations R Virtual Post gt Meeeagewent This section controls Web server virtual hosts and the creation and deletion of on line stores System 5 Managemert System Management has all the basic Linux administration features including user control network configuration system time ports and addresses settings interface languages and SSH manage ment EnGarde see Auditing system The EnGarde Auditing System will give you an overview of the current running state of your system This includes viewing user 54 User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 processes a number of different logs current drive space ker
142. h the following screen Firewall Setup Below you can setup anew port forwarding rule Protocol tcp 3 Port SMTP 25 Q Local Address 209 10 240 72 ethO 3 Remote Address 192 168 100 10q Define Rule Here you get to configure and create the new rule You have the following fields to fill out Protocol Select the protocol TCP or UDP you wish to use for this rule This should correspond to the protocol used by the port selected 154 User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 Web Server Figure 4 Port Forwarding Example EnGarde Secure Professional 155 Section 4 6 Security Port The ports are listed by their associated services with the port in parenthesis Select which service you wish to forward Local Address Select the local address the address on this machine that you wish to forward from This will generally be an external interface of the firewall Remote Access This is the address you will be forwarding to This will generally be a server on internal network of the firewall The example above describes how to forward SMTP port 25 on IP address 209 10 240 72 to the SMTP port on IP address 192 168 100 100 on the internal side of the EnGarde Secure Professional server All requests for SMTP from the outside world to 209 10 240 72 will be forwarded to the internal server on IP address 192 168 100 100
143. he entire backup Select which one specifically you want to use to restore with select Restore Backup 166 User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 System Backup Below is a listing of the currently available backups for MySQL Backup Name Backup Date Backup Type mysar November 02 2001 Full Backup Toggle List All the data in the backup will overwrite all current data so you are asked to confirm your decision after selecting Restore Backup After confirming your decision you will see a screen giving you a summary of what files were restored similar to the summary screen in Create a New Backup 4 7 5 View Changes Since Backup The View Changes Since Backup option will allow you to compare the current files on the system against a backup of your choice When you first click on View Changes Since Backup you will see a screen similar to Create a New Backup Select which named backup your backup is located under then hit Select You will be viewing a list of all the backups you have made in this named backup System Backup Below is a listing of the currently available backups for MySQL Databases Backup Name Backup Date Backup Type MySQL Databases October 16 2001 Full Backup Diff Backup After choosing which one you want to use to compare with hit the Diff Backup button Because this could possibly put a heavy load on the system you are asked to confirm your decision System Backup Below is an overview of what
144. he Backup Level will give you two options full and incremental Full will backup every file while incremental will backup only files that have changed since the last backup Once you have everything filled in hit the Define Named Backup button and you will be brought back to the main screen with your new named backup now listed EnGarde Secure Professional 163 Section 4 7 System Backup Everything Never Edt MySQL Databases Every Week incremental Edit Define New Named Backup To edit one of the predefined backups or to edit a newly created one you can select the Edit link associated with the backup This will bring you to a screen almost identical to the Define Named Backup screen and will give you the option to update or delete the named backup You can also enable a predefined named backup here 4 7 2 Perform Tape Directory Maintenance The WebTool offers the ability to help maintain your backups If you configured your backups to use tape then you will see the option to initialize the tape which consists of erasing it reseting it and setting the system up for use with a blank tape gae the button below will initialize anew tape consists of rewinding the tape to the start position erasing it s contents and creating the appropriate control files on the local disk Initalize Tape Otherwise if you selected to backup to the hard drive you will have the option to initialize the backups on there by clearing out old
145. he check box associated to the option you wish to use before clicking the button This is done to prevent accidentally clicking a button and bringing down the system EnGarde Secure Professional 137 Section 4 5 EnGarde Auditing System EAS System Control Below you may reboot or shutdown this machine Be sure to check the confirmation boxes before you commit 4 5 7 Edit Configuration The EnGarde Auditing System gives you full control over how the system infor mation is visually displayed Here you can change such options as the number of lines in a log to display refresh time and window size See below for a detailed list of each option EnGarde Auditing System Configuration These settings effect how the SMS window looks and feels EAS Window Width BD pros EAS Window Height pixels EAS Window Scrollbars EAS Window Menubar EAS Refresh Time BE seconds EAS Display Lines E ines EAS Truncate Length E nas When you are finished making your changes click Save Changes for the new changes to take effect EAS Window Width This will set the width of the pop up window the EAS uses EAS Window Height This will set the height of the pop up window the EAS uses EAS Window Scrollbars Selecting No will remove all the scrollbars from the pop up browser windows EAS_Window_Menubar Select No will remove the menubar from the pop up browser windows EAS Refresh Time Each pop up window will be refreshed after X se
146. he default SSH port We suggest leaving this as is Username Here you will need to enter in the user name your system adminis trator has given you for the server In our example we are trying to login as user admin This user name will automatically be passed to MindTerm So you will only need to supply a password when you login admin was entered in to the field Cipher In this field you will have a pull down menu giving you a selection of different cipher methods A cipher is a method of encrypting plain text in formation into encrypted information There are several different methods By default EnGarde is set to use 3DES Check with your system adminis trator to see if they have changed the cipher Authentication Here you will need to select your authentication type The au thentication type is the method that will be used to authenticate you when you log in By default RSA is used RSA uses a public and private key scheme When your account was created you should have been given a key to be used with the server Forms of authentication other than RSA are not supported by EnGarde Secure Professional EnGarde Secure Professional 183 Section 6 1 Connecting from Windows 9x ME NT 2000 Identity Here is where you will enter in the path to your key By default MindTerm will search in c Windows Java mindterm for keys It would be ap propriate to place your key in this directory when it is given to you by your system administrator You ca
147. he pull down menu you will be represented with the current status of the service whether the service is being started at boot time and the ability to toggle these two options Currently Enabled Toggle At Boot Disabled Toggle EnGarde Secure Professional 135 Section 4 5 EnGarde Auditing System EAS Below these two options you will additionally see the most recent logs generated from the selected service Date Message 4 15 13 08 06 postfix startup succeeded 4 15 13 08 06 postfix succeeded 4715 13 03 29 poetfix startup succeeded 4 14 03 29 07 poetfix startup succeeded 4 14 03 29 07 poetfix succeeded 4 14 03 28 47 poetfix startup succeeded 4 5 3 Website Logs The Website Logs will display the most recent logs from a selected Web site hosted on the EnGarde server To choose which of your Web sites you wish to view logs from select one from the pull down menu 4 5 4 System Reports System Reports are run nightly and contain information on the currently running system Such things as free memory open port current connections disk usage e mail statistics DNS statistics and others can be found in this report To choose a report for a specific day select it from the pull down menu and click the View button System Reports Please select a report date to view a The report for the selected date will then appear in the browsers window 136 User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 b
148. here if no group name is associated with the ID then the ID number is displayed Field 5 This is the size of the file in bytes Field 6 The date of the last time the file was modified Field 7 The name of the file There are three options for file permissions Read r write w and execute x These three options can each be assigned to the user group and other attributes of each file and directory We can break down field one above as follows EnGarde Secure Professional 281 Section C 5 Groups and Users 1222333444 rw r r 1 Special Flag 2 Owner permissions 3 Group permissions 4 Other permissions We have S as a special attribute Here is a list of special attributes e d Directory e s socket e b block special file IE dev hda c character special file IE dev tty e sybolic link e p named pipe Next we have the owner of the file followed by the group and finally the other Each one can have their own set of read write and executable permissions 282 User Guide D FIREWALLS AND PROXY SERVERS D 1 Configuring a Firewall or Proxy Server A firewall is a system designed to keep everything behind it safe from the outside world It scans incoming connections and determines whether or not the connec tion matches one of a list of pre defined access control rule accepts or rejecting the connection If your EnGarde system will be positioned behind firewall you will need to con figure your
149. ho is authorized to access your log statistics NOTE By default no users have access EnGarde Secure Professional 75 Section 4 4 System Management 4 4 System Management The System Management section contains all the system configuration options for administering the system On the main screen you are presented with a list of all the user accounts Local User Management Below you can find a listing of all the users who currently have access to your machine Next to their name is their user ID their Real name their home directory on the machine and their shell If their shell is bin false then they do not have remote access privieges Click on a username to edit any of these parameters or click on Create New User to add a user to your system Each user is also a member of a group You can add delete edit groups by clicking on the Configure Groups button Following this section is the Service Configuration section and then the System Configuration section SRA mion enna FTP Server Configuration Edit global options chroot list and blacklist Secure Shell Management Edit your system wide secure shell configuration and generate keys Mail Server Management Set up virtual domains transport maps and glabal options DNS Management Create forward and reverse zones and edit the global options DHCP Server Configuration Define what ranges to use for DHCP and see what leases are currently active Windows Fi
150. host then the following screen will be active to allow you to make changes 70 User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 Webmail Configuration Please note that you must have index php set in Directory Indexing for Webmail to work properly Webmail Status Webmail is currently enabled for this host The URL used to access it is https Mockbox guardiandigital cora webmail TrA epee poe IT aT EETA a i the setup Click on the help links for help on a particular itera Enable Webmail Yes O No Orgamzation Name buardian Digital Inc Doman Name Iguardiandigi tal com IMAP Server localhost SMTP Server localhost Save Changes In the first section Webmail Status the Guardian Digital WebTool will tell you the current running status of Webmail and the URL to access it Following that is the Webmail Configuration which has all the options presented to you in the initial creation of the virtual host All the options are described previously in Section 4 3 2 on page 58 EnGarde Secure Professional 71 Section 4 3 Virtual Host Management Server Configuration Virtual Server Configuration Address 92 168 100 100 Server Name Lockbox quardisndigital com Database Username nickd Database Password Save Delete Virtual Server Here you can alter the basic virtual host settings You have the ability to change the IP address of your virtual host and the server name of the virtual host You
151. ice for a definition of each section When you are done making changes select the Save Interface button or you can select Delete Interface to remove the selected device from the configuration Creating a Virtual Address To create a virtual interface you can start by clicking on the New Virtual Address link associated with the device to which you want it bound Define New Virtual Address Attach To eth 192 166 1196 IP Address hh92 168 1 197 Netmask 255 255 255 0 Define Address Fill in the IP address you want for this virtual interface and then the netmask Click the Define Address button to apply the changes EnGarde Secure Professional 119 Section 4 4 System Management Routing Configuration In this section you can configure the routing table for the EnGarde Linux system This is initially configured during the EnGarde installation process but if the phys ical network was changed since that time or the routing table required updates this is where it gets done From here you can define the default route and the static route s for the system The static route is an explictly defined route When sending out a packet over the network the static routes will all be searched first If the packet fails to reach it s destination via the static route s it will fall back to the default route described below A Static Route is an explictly defined route When talking to the network your machine will check these routes a
152. ide Example To configure the Web server for our new domain we must set them up in Section 4 3 Virtual Host Management on page 56 To create the normal site go to Virtual Host Management and select Create a Virtual Host We use the following values Address 192 168 1 71 Administrator E Mail webmaster engardelinux com Server Name www engardelinux com Webmaster ryan For Group we want to first Create a Group named engardeweb and then select it Group engardeweb 270 User Guide QUICK START GUIDE Appendix A If a database is necessary for this site then we check the Create a database for this site box and enter in the values Username engardeweb Password e nGa rDe We have now successfully created the normal website Likewise to create the secure site go to Virtual Host Management and select Create an SSL Virtual Host We use the following values Address 192 168 1 71 Administrator E Mail webmaster engardelinux com Server Name www engardelinux com Webmaster ryan Group engardeweb We have now successfully created the secure website Once this is done the following directories for the normal site will be created home httpd www engardelinux com com 80 cgi bin nome httpd www engardelinux com 80 html home httpd www engardelinux com 80 logs And the following directories for the secure site home httpd www engardelinux com 443 cgi bin home httpd www engardelinux com 443 ht
153. ide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 Before you can configure your own DNS server you must first register your DNS server and domain name with Network Solutions or another naming authority by completing their host registration form You will need to reserve one IP address for use by your nameserver In order to maximize availability every domain must have both a primary and secondary DNS server and both must be registered with a naming authority such as Network Solutions Guardian Digital can assist you with this process if you wish The DNS Management section contains three options as shown below Global Options Setup forwarders and various defaults that will apply to all the zones you manage Create a New Master Zone Create anew authoritative zone Create a New Slave Zone Create a new secondary zone Existing DNS Zones This section provides the ability to Global Option Forwarders and other various defaults that will apply to all the zones you manage Create a New Master Zone This will bring up the configuration screen to create anew DNS master zone Create a New Slave Zone This will bring up the configuration screen to create a new DNS slave zone Create a New Master Zone The domain namespace is divided into regions called zones For the purposes of this document it is sufficient to describe a zone as a domain or section thereof for which the server will be responsible The host www guardiandigital com is amember
154. ild true multi user multi threaded SQL databases enabling EnGarde system users and applications to create robust interactive Web sites and powerful E commerce sites DNS Packages EnGarde Secure Professional can manage DNS for thousands of domains for external users trying to access virtual Web and email sites running on EnGarde as well as for internal users This is all configurable using the WebTool Firewall Packages The integrated Gateway Firewall includes the ability to protect organiza tions from malicious cybervandals The port forwarding functionality pro vides small organizations with the ability to publish internal servers on the Internet Network Address Translation provides security by masquerading requests by internal clients for Internet services as well as enabling organi zations to use a single IP address for all their internal workstations to reach the Internet Mail Packages The include email server has been engineered to provide security and sta bility and can control email for hundreds of domains with the click of a mouse Mail can then be retrieved in a secure format using conventional EnGarde Secure Professional 29 Section 3 2 The EnGarde Secure Professional Installer email clients Additional security improvements have been made includ ing protection from common email threats as well as restricting unsolicited email NIDS Packages The intrusion detection features will detect and notify you of possib
155. in Banner Edit the banner that is displayed when a user logs in on the system console WebTool Access Control Define what machines are allowed to access the WebTool System Access Control Define what machines are allowed to aceess services on your machine Secure Email Client Setup Edit your SIMAP SPOP3 certificates and perform interface control Tripwire Mamtenance Change the e mail address view reports and update the local database Firewall Setup Setup port forwarding PPTP Setup Define addresses encryption level and username password pairs 4 6 1 Change WebTool Password You can change your administrative WebTool password here You need to enter it in twice to avoid typing errors We recommend a password no shorter than six characters Mixing letters and numbers is a good idea and avoid full words See LinuxSecurity com for tips on choosing a secure password 140 User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 Change WebTool Password In this section you will change the GD WebTool password This password is used for all on line adminstrative functions Below are some examples of a good password dogtcat LOckbex linyoux After changing the password you will be prompted to re authenticate yourself Password deeseeeed Password again sseseeeeg Change GD WebTool password 4 6 2 Change Administrator E Mail Address The administrators address can be entered here to receive a daily summary of important log infor
156. ings found by clicking on the TCP IP Settings button Once the necessary changes are made click OK My Connection 21x General Server Types Type of DiakUp Server PPP Intemet Windows NT Server Windows 98 _ Advanced options M Logon to network Enable software compression l Require enctypted password l Require data encryption T Record alog file for this connection 3 Allowed network protocols M NetBEUI I IPX SPX Compatible M ICPAP You are now ready to attempt to establish a connection Double left click on the configuration you created My Connection in the example used above You will see the Connect To dialog box appear Enter in the user name and password you set up on the EnGarde Secure Professional machine into these entry boxes Once the information has been entered click Connect to establish a connection with the EnGarde Secure Professional server EnGarde Secure Professional 207 Section 7 2 Connecting From Windows 98 NOTE It is recommended you reboot your Windows system before attempting to connect T Save password YPN server fis2 168 1 82 Lema cma As Windows attempts to make the connection you will see the Connect To dialog box replaced with a smaller dialog box displaying the results of the connection If the connection is successful you will see what appears to be an icon of two computers connected together in your task bar Each computer will light up g
157. ions You first have the choice of using POP3 or IMAP for your connection Select this according to what your system administrator recommends you use For the remainder of this example we will be using POP3 You now have to enter the mail server you will be contacting In our example below our incoming mail server is the same as our outgoing server In many situations smtp servername comand mail servername comare used for outgoing and incoming mail servers Once you have entered in the proper mail server addresses and selected the POP3 or IMAP protocol click the Next button to continue 238 User Guide SECURE E MAIL Chapter 8 Internet Connection Wizard Now you will need to enter in some account information First enter in your account user name assigned to you by your system administrator followed by the password You can select the Remember password option if you wish for Outlook to remember the password for future sessions You will also notice a check box for Secure Password Authentication SPA This feature isn t used with EnGarde so leave it unchecked Once you have correctly entered in all the required information click the Next button to continue EnGarde Secure Professional 239 Section 8 2 Configuring Outlook for Secure IMAP and POP3 Internet Connection Wizard Internet Mail Logon Now you will need to select which method you use to connect to the Internet Select the appropriate option and then click the N
158. ir After clicking on Generate Key you will be prompted to save the private key to your computer After you do this you will be able to ssh into the machine as user Username using the key and the provided passphrase Filename nickhomd Passphrase feeeweweeee EnGarde Secure Professional 171 Section 4 8 Secure Manager Filename This filename is the name that will be used to store your private and public key on the EnGarde Secure Professional server They filename must be alphanumeric Description This description is displayed when trying to connect to the EnGarde Secure Professional server using this key Passphrase The passphrase is used to authenticate the user and works similar to a password It will need to be entered twice to check for typing mistakes Once all the fields have been filled out click the Generate Pairkey button to create the keys You will then be prompted to download you key to your PC Click Here to Download Private Key Save this te your computer and name it something you will remember Clicking the Click Here to Download Private Key button will prompt your browser to download the key A default filename is given that corresponds to the server and user name this can be changed At this point the new key will be listed in the Keys in Your Keyring section 172 User Guide 5 GUARDIAN DIGITAL SECURE NETWORK Whether you re a small organization new to the Internet world or a large organi za
159. is set to no then only Writeable Users and Writeable Groups will have read write access to the share EnGarde Secure Professional 115 Section 4 4 System Management Windows File Sharing Below you can create anew share Share Name Directory Share Description Hosts to Allow Public Share Authorized Users Authonzed Groups Writeable Writeable Users Writeable Groups Wel Vhome ht tpd lockbox guardiandigital com 443 lockbox web pages 192 168 1 151 No 3 hick admin Yes J mick ladmin Create Share Share Name This is a label that users will see when browsing Directory Enter into this entry box the path to the directory you wish to share Share Description This is an informational field the user sees when browsing Public Share Writeable Authorized Users and Groups Writeable Users and Groups along with Hosts to Allow all define access control to a share The chart below can be used to determine how these options are used to control user access Public Shares Writeable No 116 No Yes Yes Only Authorized Users Groups can read the share on only Writeable Users Groups can write to the share Anybody can read the share but only Writeable Users Groups can write to it Anybody defined in Authorized Users Groups can both read and write to the share Anybody can read and write to the share User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4
160. ital com register You can fill out all the necessary information here and submit it directly to Guardian Digital You will have immediate access to the latest updates upon registration EnGarde Secure Professional 7 Section 1 4 Obtaining Technical Support 1 4 Obtaining Technical Support Guardian Digital provides 60 days of Web phone or e mail support beginning at the time of product registration This includes up to four incidents of installa tion and configuration support within that 60 day period Additional support is available from your Guardian Digital sales representative Before contacting Guardian Digital s technical support team please visit the Guardian Digital Support Web site which covers many common technical support issues at http support GuardianDigital com You can contact Guardian Digital directly using one of the following means Phone 1 866 GDLINUX 201 934 9230 E Mail support guardiandigital com Before you can obtain support you must have previously registered on our Web site https www GuardianDigital com register Additional details on available support plans are available at http www GuardianDigital com support 8 User Guide 2 GENERAL SECURITY Before you start using EnGarde Secure Professional we recommend you read this section covering general security knowledge This section will help you under stand the goals of your EnGarde system and in turn will help you configure it better for you
161. iting a Partition To edit a partition move to the partition listbox by using the tab key on the key board Once in the partition listbox highlight with the arrow keys on the keyboard the partition you want to edit and hit Enter At this point the following dialog box will appear Mount Point Size MB You will notice you can change all the configuration choices you made when creating the partition All the same rules mentioned previously apply here NOTE boot can not be edited Creating Partitions and Filesystems Once all the partitions have been defined hitting the OK button will continue with the installer The installer will display a small dialog showing each partition being created EnGarde Secure Professional v1 5 Partition dev hdb After all the partitions are created an Ext3 journal and filesystem will be created on each partition except for swap Tasnia Tarere Prefexetone vi 3 Creating Ext3 journal on devredal 28 User Guide INSTALLING ENGARDE SECURE PROFESSIONAL Chapter 3 Creating Ext3 filcsystcm om dov sdal 3 2 2 Package Selections EnGarde Secure Professional offers the ability to choose what packages you wish to have installed on your EnGarde system In this dialog you can choose which packages you wish to install You can choose from the following packages Database Packages Select this option to include support for building databases Use the MySQL database to bu
162. itional information concerning EnGarde Secure Professional and the installation process The Installer Following the boot menu the kernel will be loaded and booted Once this pro cess is complete the installer will be launched and you will be presented with the following screen Here you are given the option to choose your language Currently the installer it self does not support any languages except for English but it will accept keymap pings for the languages listed Additionally after installation language settings keymappings and font settings will be active at the systems console 14 User Guide INSTALLING ENGARDE SECURE PROFESSIONAL Chapter 3 uardian Digital EnGarde Secure Professional v1 5 Installer v1 2 English UK French German Polish Russian Spanish Swedish lt Tab gt lt Alt Tab gt between elements i lt Space gt selects To select your language scroll through the list with the arrow keys on your key board and when you your language is highlighed press enter to select it You will then be brought to a welcome screen Welcome to the installer program for EnGarde Secure Linux Selecting Cancel on any of the following screens will cause the installer to quit and the machine to be rebooted l lt Tab gt lt Alt Tab gt between elements i lt Space gt selects Press the Ok button to continue on your way Mounting the CD Next you will be prompted to insert the CD ROM If
163. kup to File au Overwrite Newer Files No G Revind Only No a Save Configuration pg ce eT re you wish ETEN in arder to back up a directory it must have a named backup defined Below you can define a new named backup or edit delete an existing one User Home Directories Never Edit Web Server Files Never Edit Web Server Configuration Never Edit DNS Configuration Never Edit Mail Server Configuration Never Edit Everything Never Edit Define New Named Backup General Configuration In the General Configuration section you have to choose your method of backing up EnGarde supports SCSI and IDE tape drives for backup and will also allow you to backup to a file located on your hard drive There are also two other options in the menu Overwrite Newer Files and Rewind only Overwite Newer Files is only applicable if you set if your Backup Method is Backup to File If Overwrite Newer Files is set to Yes files being restored will overwrite files on the system newer than ones that already exist Rewind only affects only tape backups If Rewind only is set to Yes it will rewind the tape to the beginning when making a backup instead of erasing a tape This is done since erasing a tape could possibly take hours Select which method you wish to use from the pull down menu and use the Save Configuration button to confirm the changes Define Named Backup The WebTool comes with a list of predefined backups These are all di
164. l 12 boot disk 39 booting 14 DNS 36 FQDN 35 langauge 14 locale 14 network card 36 network cards 32 network configuration 33 new user 38 packages 29 partitioning 16 software RAID 22 swap 26 system requirements 13 kernel capabilities 258 key generation OpenSSH 197 user 86 key management 86 LIDS 246 example 254 example script 257 file protection 254 usage 249 lidsadm 249 add entry 251 delete and update all 252 delete entry 252 password creation 253 using 250 view configuration 253 view status 253 locale 48 log analysis 74 statistics 75 login banner 143 mail 87 MindTerm 180 installing 180 running 181 usage 189 Netscape 43 52 network configuration 117 DHCP 118 interfaces 117 PPPoE 118 restart 123 307 static 117 OpenSSH 196 key generation 197 usage 196 password 45 root 46 webtool 46 POP3 146 secure 146 pop3 145 postfix management 87 PPPoE 123 124 PPtP 199 file and print sharing 200 pptp 157 printers 126 quotas 127 filesystem 127 group limits 131 resource limits 129 system wide limits 130 user limits 131 RAID level 1 22 level 5 23 software 22 spares 23 Redirects 63 routing configuration 120 static 120 samba 111 Secure Manager 169 308 Secure Shell Management 84 security 9 55 140 alerts 141 142 server name 57 service configuration 50 services 48 135 simap 145 spo
165. l Host Management Username If you wish to create a database for this site this will be the username associated with accessing the database which is created An example username is dbadmin Password If you chose to create a database for this site this will be the password associated with accessing the database which is created An example password is gu rd1 n You can now click the Create button to create the virtual host After some processing you will be returned to the Virtual Servers main menu You will see the new virtual host you created in the Virtual Servers list If you created a new IP address or a new domain name for this virtual host you will have to add it to your DNS servers Details on this are later in this section After the host is created you will now have the ability to edit that host 4 3 2 Creating a Secure Virtual Host In this section you have the ability to create a virtual host secured with SSL Creating the secure host is similar to creating a non secure host as was discussed in the previous section NOTE If you do not have WebMail installed from the Professional Workgroup Suite the WebMail Setup will not appear 58 User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 Create a New SSL Virtual Host Below you can create a new virtual server All four fields are required For help click on the help links Address 192 168 1 196 Server Name lockbox guardiandigital com Administrator E Mail admin g
166. l be doing your administration via the GD WebTool you can skip this section but it s suggested reading anyway Minimal maintenance is required to keep LIDS running Management of LIDS on servers that are co located with Guardian Digital is included with your support contract You may sometimes need to change the configuration or add new packages requir ing you to disable LIDS The GD WebTool will automatically enable and disable LIDS while you administer the system For administration from a shell a program called 1idsadmis used to interface with LIDS First you have to disable LIDS After logging in as root type sbin lidsadm S LIDS This will prompt you for your password After entering your password LIDS is disabled for the current session you are in This method will still apply all the LIDS resource settings and rules to every other user on the system while you administer the system Optionally issuing sbin lidsadm S LIDS_GLOBAL will disable LIDS globally While in this mode no LIDS rules will be applied to any user or resource Use this with caution Once you have LIDS turned off you may configure your capabilities file permissions resource permissions etc If you changed the LIDS configuration while LIDS was turned off you will need to reload the configuration file into LIDS Before turning LIDS on enter this sbin lidsadm S RELOAD_CONF This will make sure you have the latest configuration loaded into
167. le Shaving Edit global configuration setup WINS hosts and define shares Dave pasem porion v na aprtenenbanures tactens Network Configuration Set up interfaces routes host DNS and statie addresses Printer Setup Define local printers used for Windows File Sharing Quota Setup Configure filesystem and resource quotas System Time Change the system time and define time servers We will discuss the user accounts portion first 76 User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 4 4 1 User Account Administration In this section we will describe how to add users delete users edit users and configure groups These are the regular system users Users who wish to have SSH access to the machine will need an account here For more information on users and groups refer to the Groups and Users section in Appendix C 5 on page 281 You should see all users listed in the table as follows Home Directory nick S00 Nicholas homernick Create a New User To create a new system user start by clicking on the Create New User button This will bring you to this screen Username Passwort Access W Epail Only Windows Password Create Primary Group new Group Secondary Groups Existing Group eee J Here you will enter all basic user information Below is a brief description of each option Username Enter a unique user name in here A username can not contain spaces EnGarde Secure Professional 77 Section 4
168. le threats and security related events Select this option to enable network and host intrusion detection on your EnGarde system Web Packages All Web functions are configurable using the WebTool The creation of thousands of fully functional virtual Web sites including CGI PHP and perl support can be easily managed and maintained Select this option to provide services for building Web sites This dialog box contains a list box that has listed all the available packages You can navigate the list box with the arrow keys Once an item has been highlighted press the Enter key This will turn the item red When you move the cursor the item will appear orange That item has now been flagged To select another item do the same thing To deselect an item simply highlight it and press Enter again If you choose not to install any packages just the core packages will be installed The only way to leave this dialog box and continue with the install is by selecting the Ok button Package Selection Using the Enter key select from the scrolling listbox which pangs classes you wish to install at this time Additional can be added in later Update via the GD ee Firewall Mail Services Below is an example of what the dialog box will look like with multiple packages selected Selected are the Databases and Firewall packages while the cursor highlights the Mail Services package 30 User Guide INSTALLING E
169. less you want to relay email through an external mail server NOTE index php must be set as the document root for Webmail to work The WebTool will set this for you When you are done making changes click the Create SSL Virtual Host button Don t forget to create or upload your certificate for this virtual host Instructions on doing so can be found in Section 4 3 3 Editing a Virtual Host on the current page found after this section 4 3 3 Editing a Virtual Host You can edit any virtual host settings on an existing host by clicking on the address of the host listed under the virtual servers Once you are brought to the Virtual Server Options page you will be presented with quite a large number of options First before you start making changes check at the top of the page below the Guardian Digital banner you will see a list of options Make sure you are editing the intended host In place of lockbox guardiandi gital com will be the name of the site you are editing Edit Virtual Host For lockbex gnardiandigital com Networking and Addresses Define what interfaces and addresses this virtual host should listen on Document Options Setup the document root and how various documents are handled Error Handling Define what pages should show upon encountering an error Aliases and Redirects Setup aliases for certain URLs and where they should be redirected to Directory Indexing Define what filenames you would like to use as directory ind
170. ling disabling tagged queuing on SCSI controllers and sending arbitrary SCSI commands Allow setting encryption key on loopback file system User Guide THE LINUX INTRUSION DETECTION SYSTEM LIDS Chapter CAP _SYS_BOOT Allow use of reboot CAP_SYS_NICE Allow raising priority and setting priority on other different UID processes Allow use of FIFO and round robin realtime scheduling on own processes and setting the scheduling algorithm used by another process CAP_SYS_ RESOURCE Override resource limits Set resource limits Override quota limits Override reserved space on ext2 ext3 file system NOTE ext2 ext3 honors fsuid when checking for resource overrides so you can override using fsuid too Override size restrictions on IPC message queues Allow more than 64hz interrupts from the real time clock Override max number of consoles on console allocation Override max number of keymaps CAP_SYS_TIME Allow manipulation of system clock Allow irix_stime on mips Allow setting the real time clock CAP_SYS_TTY_CONFIG Allow configuration of tty devices Allow vhangup of tty EnGarde Secure Professional 263 A QUICK START GUIDE This appendix is intended to give an overview of the functions of the Guardian Digital WebTool After reading this appendix the reader should be able to perform the steps required to set up a domain to receive mail configure DNS services and serve Web pages If your EnGarde system will no
171. luehen inside guardiandigital com EnGarde Secure Linux version 1 1 Balestra Report Time Wed May 15 14 00 01 EDT 2002 System uptime 1 23 Load Average 0 00 0 01 0 00 Kernel version 2 2 20 1 2 2jipseec Network Device Information Interface addresee mack RX Fackete Serr TX Packets serr etho 192 168 1 7 24 159395 0 10225 0 etho 1 192 168 1 6 24 n a n a ipeecd 192 168 1 7 24 ni 4 5 5 Process Information Process Information contains a list of the current running processes on the system You can choose to arrange them by User CPU or Memory by clicking on the link at the top of the process list Sort By User CPU Memary CPU Memory Command root 0 0 0 1 init 3 root 0 0 0 0 kf luehd root 0 0 0 0 kupdate root 0 0 0 0 lkewapal root 0 0 0 0 keventd root 0 0 0 0 Imarecoveryd root 0 0 0 2 ebin eyelog ng cfgfile etc syslog ng conft root 0 0 0 3 kloga c 1 root 0 0 0 2 crond root 0 0 0 3 eh uer lib ipeec _plutorun debug none uniqueide ye root 0 0 0 1 logger p daemon error t ipeec__ plutorun root 0 0 0 3 eb uer lib ipeec _plutorun debug none uniqueide ye root 0 0 0 3 eh uer lib ipeec _plutoload load teearch setart tee root 0 0 0 3 usr lib ipseec pluto nofork debug none uniqueide root 0 0 0 3 xinetd reuse etayalive 4 5 6 System Control System Control gives you two options Reboot System and Shutdown System You will need to check t
172. ly the option for you v Use DHCP to obtain network settings Overwrite DNS Configuration Ves O No Dynamic Interface PPPoE PPPoE is the Point to Point Protocol over Ether net If you select the Use PPPoE to connect to network check box then the machine will attempt to connect to the network using the PPPoE protocol In order to use PPPoE you must have a valid username and password If you are on a DSL connection then his is probably the option for you Selecting Yes for Overwrite DNS Configuration will force this device to use your ISPs DNS servers 118 User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 PEt is the os om no over ATT if you select the Use ain to connect to network checkbox then the machine will attempt to connect to the network using the PPPoE protocol In order to use PPPOE you must have a valid username and password which you enter below If you are on a DSL connection thent his is probably the option for you V Use PPPoE to connect to network Overwrite DNS Configuration Yes No O Usemmame I Password a Delete Interface Save Interface For more information concerning DHCP and PPPoE in regards to a broadband Internet connection refer to Section 4 4 9 on page 123 Edit an existing interface To edit an interface click on the ethernet device you wish to edit You will see the same menu as if you were creating a new device Make your changes here refer to Creating a New Dev
173. m You can list as many hosts as you want but we recommend listing only those that are necessary for adminis tration You can list them by IP address or hostname Entering the network address will allow access to the entire network Each item must be on it s own line Once you have everything filled in click Save and Proceed to continue with the initial configuration 3 5 2 Locale and Time Setup The next step of the initial configuration process is to configure the locale of your system and set up your time servers initial System Configuration Locale and Time Setup one select your timezone below select a region then select an area America New_York a man Network p and is used to keep your machines spstera clock in sync with the CATIN e various atomic clocks Below you are asked to either select or enter three NTP servers It is very important that you have three for the sake of reliability anel accuracy Please select frora the pre define list or enter if you have local time servers three servers below If you only wish to have ane or two servers please enter duplicates so that all three are filea out NTP SERVER 1 nip1 cs wisc edu USA 2 i NTP SERVER 2 clock psu edu USA NTP SERVER 3 fitp 0 cso uiuc edu USA a Save and Proceed EnGarde Secure Professional 47 Section 3 5 The Initial Configuration Process Locale In the System Locale section you will see two pull down
174. mation and security alerts Change Administrator Address In this section you will change the Administrator Password This is the e mail address that the machine sends security alerts along with the daily summary of system activity Current Address nick guardiandigital com New Address adnin gquardiandigital com Change Administrator Address The Daily Summary The daily summary is e mailed out every night at ten minutes past twelve The contents will look something like this sample daily summary e mail Log Summary for 10 3 2000 Log summary for system logins Total number of root logins via su SSH sessions opened l ono console logins EnGarde Secure Professional 141 Section 4 6 Security Log summary for GD WebTool logins Total number of successful administrator logins TG failed logins 4 This has been e mailed to nick guardiandigital com End of summary for 10 3 2000 Depending on your system configuration and installed packages you may receive more or less information in this summary Security Alerts For servers that have the LIDS host intrusion detection service enabled and some one tries to disable it but gives an incorrect password three times in a row in under a one minute interval an e mail will be sent to the administrator whose address was specified in the Change Administrator E Mail Address section NOTE Chances are you can safely ignore this section If y
175. ment refer to Section 6 on page 179 The main menu here is broken down into three sections Keys in your Keyring Upload a Public Key and Generate a New Keypair Keys in Your Keyring This section is only for viewing current keys and deleting them When you first visit this section there will be nothing listed here since there are no keys in the system Keys In Your Keyrin No keys are currently in place If you have already uploaded or generated a key it will be visible from here Click ing on the Remove link will remove it from the server 170 User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 Keys In Your Keyrin Key Size Fingerprint Comment 1024 8b 24 e9 39 4a 30 87 6f fb 06 da 9b 5 8c fe eb nick asmodean Remove Upload a Public Key Here a user can upload a public key that you have previously generated You can type in the path to the key or use the Browse button to find it p a local publie key click on the NT ETL directory on your local spstera Public Key File Vhome nick esh iden Browse Upload Key Once the path to the key is in the entry box Upload Key can be clicked to upload the key to the server Once it is uploaded you will see it listed in the Keys in Your Keyring section Generate a New Keypair Here a user can create a new keypair This will create the keypair on the EnGarde Secure Professional system and give the user a copy of the key so they may login remotely Generale a New Keypa
176. menus The first menu allows you to select your country or region After selecting your country or region the second box will change accordingly to allow you to select a city or region found within your first selection Time Servers After setting up your System Locale you will need to configure your NTP time servers NTP is the Network Time Protocol and is used to keep your machines system clock in sync with the official time as defined by various atomic clocks You can select a time server from the pull down menu or type in one of your own in the entry box NOTE If you only wish to have one or two servers please enter duplicates so that all three are filled out 3 5 3 Firewall and Service Configuration This is the last configuration step of the initial configuration If you chose to install the firewall package you will have the Firewall Configuration section in this menu otherwise you will have only the Service Configuration section 48 User Guide INSTALLING ENGARDE SECURE PROFESSIONAL Chapter 3 Initial Configuration Email Firewall and Service Configuration Emall Configuration Please enter the email address where system reports should be sent to Several reports run nightly which the system administrator should review These reports will be sent to this address Administrator Email Sa Firewall Configuration Your machine only has one interface active so host only tirewalling will be set up on this machine If yo
177. mes Domain name Network quardiandigital com Master server Lockbox guardiandigital com Email address admin guardiandigital com Allow transfers from Allow queries from Allow None Allow Any Listed Listed Es o Create Figure 3 3 8 6b New Master Zone Options EnGarde Secure Professional 95 Section 4 4 System Management Master Server This section will contain the IP address of your master DNS server The master DNS server also known as a Primary DNS Server main tains a list of domain names and their IP addresses This list is made avail able to other DNS servers on the Internet so that users can access these sites over the network For example if you own guardiandigital com your master server will control guardiandigital com You can have other DNS servers known as secondary DNS servers or slave DNS servers that act as a backup to the primary DNS server for guardiandigi tal com If your EnGarde system is your master DNS server then enter in the address of your EnGarde system Email Address The default e mail address associated with this zone Generally this is the e mail address of the system administrator or whomever is re sponsible for DNS on your network Allow Transfers From DNS will need to transfer information if you have slave DNS servers on your network This should contain a list of IP addresses and or a block of IP addresses for other DNS servers that are allow
178. minal settings to default e g clears line draw graphics mode which might be mistakenly set by displaying a binary file Settings SSH Connection Ctrl Shift H In this dialog you can set all SSH parame ters To view all options click the button More options When connected you can set the parameters for the current session Note that some changes wont take effect until the next time you connect to this server When not connected a new session is created if one is not found with the name of the server In this case it is the same dialog that is shown when selecting New Server from the Connection dialog The parameters set in this dialog are names as given in paragraph 5 server Name ip address of SSH server port Port which SSH server listens on username User name to login as on SSH server cipher Name of block cipher to use or if none is selected no encryption note no encryption is normally not supported by the SSH server authtyp Method of authentication or if custom is selected a comma separated list of methods to try in order given 192 User Guide ENGARDE CONNECTIVITY Chapter 6 xllfwd display mtu alive portftp realsrv localhst idhost forcpty prvport remfwd Selects whether to allow X1l connections to be forwarded or not The local X11 display to forward X11 connections to aximum packet size to use alive Keep interval in seconds to use Enables port commands to be
179. ml home httpd www engardelinux com 443 logs home httpd www engardelinux com 443 ssl Once the above steps have been completed EnGarde is ready to serve webpages for the following sites http www engardelinux com https www engardelinux com The next step is to populate your sites with content For more information on this and the many other aspects of the WebTool please refer to the User Guide EnGarde Secure Professional 271 Section B 2 B ADVANCED INSTALLER ISSUES B 1 Boot disk creation If your PC does not support the ability to boot from a CD ROM then you must create a boot floppy A boot floppy simply contains the same boot image that is on the CD To create a boot floppy have a blank floppy available and the EnGarde Secure Professional CD ROM in the drive and if in a Linux system mounted as well B 1 1 Creation on a Linux based system The boot image is located on the CD in boot boot img Type the following command in a shell to create a boot disk dd if mnt cdrom boot boot img of dev fd0 bs 1k The above command assumes the CD is mounted in mnt cdrom change this if necessary Once you have been returned to the prompt the disk is ready for use B 1 2 Creation on a DOS based system Included on the CD ROM are DOS utilities for creating a boot disk Inside of x dosutils you will find a program called rawrite exe This will write the image to the floppy disk NOTE Replace x througho
180. modules LIDS See Linux Intrusion Detection System 298 User Guide GLOSSARY Appendix F Linux Intrusion Detection System The Linux Intrusion Detection System al lows fine tuning of control over resources and file permissions For detailed information concerning LIDS and using LIDS please read Section 9 loadable modules Portions of kernel code that have been compiled separately and that can be loaded during normal operation using modprobe or insmod If you have LIDS running it seals the ability to load modules after the sys tem has booted You must shut LIDS off first then load your module s Information on controlling LIDS can be found in Section 9 journaling Journaling is a method used to preserve data when it is written to a storage device This greatly increases recovery time in the event of a system crash mount A storage device containing a device can not be accessed by a Linux sys tem until it is mounted The process of mounting allows the system to make a common reference to this filesystem This is done by mounting a filesystem to an empty directory The filesystem will then be contained within that directory non repudiation The property of a receiver being able to prove that the sender of some data did in fact send the data even though the sender might later deny ever having sent it Open Source Programs for which the original source code is available for which relatively permissive opportunities to modify the c
181. mulate Unix the term is a trademark legally held by The Open Group user key See host key virtual interface A virtual interface is a non existent interface that binds itself to areal interface This virtual interface can be assigned its own IP address and will access the network through the real interface its bound to For example interface ethO can have ethO X bound to it X being replaced with the virtual interface number virtual memory Memory beyond what is actually available but which programs believe is actually available memory in the system See swap Virtual Private Network Allows remote computers to connect to a common net work via a medium such as the Internet as if the remote computer was lo cally connected to the network in a secure manner VPN See Virtual Private Network 302 User Guide GLOSSARY Appendix F zone transfer A zone transfer is when a secondary name server also sometimes referred to as a slave server for a zone gets the zone data from another name server that is authoritative for the zone called its master server When a secondary name server starts up it contacts its master server and requests a copy of the zone data for which it is responsible storing it in the event a request is made for information in that zone EnGarde Secure Professional 303 10 11 12 REFERENCES Albitz Paul amp Liu Cricket DNS and BIND Third Edition O Reilly amp Associates Inc 1998
182. n it s check box 3 5 4 System Summary and Reboot The information you entered during the Initial Configuration will now be dis played back to you for confirmation as shown in the next screen shot If every thing is correct click the Reboot button to complete the configuration process initial System ee uration System Summa ongratuations your Ent ine i fully K eonfiguration MDNI D pet Tris page and save it for future reference You must now reboot your machine by clicking the button below for the changes to take effect Network Settings Interface and Reboot ed Below is an outline of your current ethO Address 192 168 100 100 Hostname Undefined interface eth Address 192 168 1 196 Hostname lockbox inside quardiandigital cor be a ll e e FTP Server Active Web Server Active Domain Name Server Active Mail Server Active SIMAP Server Active SPOP3 Server Active User Password Changer Active Reboot System NOTE Before the machine reboots you will be returned to the login screen This is necessary for a successful system logout You do not need to log back in If you used a crossover cable for configuration remove it now and connect the EnGarde machine to your network You are now ready to start administering your server 50 User Guide 4 THE GUARDIAN DIGITAL WEBTOOL The GD WebTool is a secure on line administration utility accessed using your browser You have the capability to control every aspect
183. n the WebTool will be available to valid users For more information concerning printers in the WebTool refer to Section 4 4 10 on page 126 112 User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 Interfaces This allows you to enter in the specific IP address you wish to allow Windows File Sharing to accept connections on Generally you only want this to listen on the internal IP or trusted IP You can also choose to allow it to listen on all IPs Set Administrator Password If your machine is configured as a Domain Master then you will need an administrative user defined who can authorize new machines to logon to the domain This is where you set the password for that user This option will show up as Set Administrator Password if you do not cur rently have an administrative password set If you already have one set and you wish to change it this option will show up as Change Administrator Password Machine Management Before a machine can join the domain if you are accepting domain logins it must have a machine definition To define a new machine go into this section and click on the Define New Machine link There ave currently no machines defined Define New Machine You will then be asked to enter the machine s NetBIOS name into the box Click ing on Define Machine will set complete the machine setup and you can now log into the domain Windows File Sharin Below you can define a new machine Machine Name fa
184. n use the button to browse through other directories on your local machine A key will generally end with key Once all the information has been filled in you can select the OK button to con tinue You will be brought back to the screen you began on Fie Edt Seting VT Optore Tue Help Copyright c 1998 2000 by Mindbright Technology AB Stockholm Sweden Initializing random generator please wait done This is a demo version of MindTerm it is 118 days old Please go to http www mindbright se sindtera to check for new versions now end then MindTerm home C WINDOWS Jave mindters SSM Server Alias J Once you click the OK button MindTerm will attempt to make a connection If you have never connected to the server before you will be asked if you want to add the host to your host key list Answer Yes to this question MindT em Confirmation Do you want to add this host to your set of known hosts tuj Once the dialog box is removed if the connection was successful you will be prompted for your password 184 User Guide ENGARDE CONNECTIVITY Chapter 6 Fie Edt Settings VT Options Tunnels Heb Copyright c 1998 2000 by Nindbright Technology AB Stockholm Sweden all Initializing random generator please wait done This is a demo version of MindTerm it is 116 deys old Please go to http www mindbright se mindtera to check for new versions now and then EindTerta home C WINDOWS Jev
185. nal and the accompanying Workgroup Suite implement Virtual Private Networking VPN using the PPTP protocol The Point to Point Tunneling Protocol is a network protocol that enables remote office workers to connect to their local corporate network behind their EnGarde Secure Professional gateway server protecting their communications through a secure private data channel EnGarde Secure Professional employs sophisticated encryption technol ogy to ensure that data transmitted from the remote workstation to the EnGarde gateway cannot be intercepted and remains secure during its transmission Using PPTP on EnGarde Secure Professional remote office workers can connect to their internal hosts to access network resources such as file and e mail services EnGarde Secure Professional implements a standards compliant PPTP server im plementation that supports Windows 98 Windows NT and Windows 2000 clients While support for the PPTP protocol is included in Windows NT and Windows 2000 it must be downloaded and installed for use with Windows 98 For an example of how PPTP might be used to provide VPN services in your or ganization refer to Figure 5 on page 199 Details of the PPTP protocol itself and additional information are available by searching microsoft com for Understand ing PPTP document dated January 1997 NOTE Virtual Private Networking is only available with the purchase of the EnGarde Workgroup Suite The following text description a
186. nd if there are none that match will fall back to sending it out the default route see below 192 168 5 0 255 255 255 0 etho Edit New Static Route To add a static route click New Static Route A new screen will appear a lt a Network Enter in the network address of the network this static route is being configured for Netmask Enter the address of the netmask for the network defined in the Net work field Device Select from the pull down menu which ethernet device this static route will be configured for When all the fields have been correctly filled in clicking Define Route will create the route and it will now appear on the main Routing Configuration screen as pictured above 120 User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 Below the static route configuration is the Default Route The default route is used when a packet fails to reach it s destination via the defined static route s If no static routes are defined the defualt route will always be used Default Route The Default Route is the next hop for all packets leaving this machine that are not caught by any other routing rules This IP address should be told to you by your system administrator The default route is configured when you install EnGarde on your system If you wish to make changes modify the appropriate fields Gateway You will need to enter in the IP address of the gateway you will be usin
187. nd corresponding image depict a typical PPTP session of how a remote user might connect to their corporate network A The Windows PC client will make a PPTP connection using an existing connection to the Internet PPTP will encrypt the data before sending it out over the Internet to the EnGarde Secure Professional server at the other end B The EnGarde server is the destination for the PPP packets containing the encrypted PPTP information within C When the EnGarde server receives these packets it will decrypt the infor mation and distribute it to its destination within the local network An ad ditional IP address will be assigned by the EnGarde sever on the internal network to the remote Windows workstation 198 User Guide VIRTUAL PRIVATE NETWORKING Chapter 7 neg Windows PC at Home C EnGarde Internal Server Network D iamma iammm A Samba Web SMTP POP Figure 5 PPTP general overview EnGarde Secure Professional 199 Section 7 1 Configuring EnGarde for PPTP File and Print Sharing D At this point you can access all of your internal network resources as if you were locally connected to the network You have access to your e mail account ability to send e mail from the network access the internal only Intranet among many other tasks 7 1 Configuring EnGarde for PPTP File and Print Sharing
188. ndigital com Below you can edit existing aliases E Mall Address is of the form usem inside Quardiandigital com Recipient is the person that you want to recieve the message You can select a local user by clicking on the button E Mail Address Recipient gt a LS J To add a user give the user an e mail username in the E Mail Username field and fill in the real user s e mail address in the Recipient field Click the Add New button to add this user s e mail Additionally towards the bottom of this menu the current configuration can be changed from here Mail Routing The mail routing section allows you to select what domains you would like aliased If you have a user at the guardiandigital com domain and want every user to be able to receive mail to Linuxsecurity comas well this menu provides that ability Refer to Figure 3 8 8 Enter in the domain you want the mail aliased as We used Linuxsecurity com to create an existing mail route in the above image We then enter in the Relay mail to field the actual domain the mail should go to guardiandigital comin this example EnGarde Secure Professional 91 Section 4 4 System Management Mail Routing Below you can configure domains for which you would like to route mail Domain is the domain for which you would like to route mail An example value is linuxsecurity com Relay mail to is the host you would like the mail to go to An example value is
189. ne The DHCP server assigns network infor mation for the clients on its network and allows you to control what IP ranges are available for your users DHCP Server Configuration DHCP is the Dynamic Host Contra Protocol it allow hosts to obtain a dynamic IP address from a centralized machine This module allows you to control what IP ranges are available for your users Define Address Ranges Define what address ranges you want to use for dynamic host assignment View Current Leases See what addresses are currently in use by what systems DHCP Server Configuration Help View the help page for this module NOTE DHCP server is only available if you purchased the Professional Workgroup Suite Define Address Ranges This screen shows all of the address ranges you already have allocated for DHCP If you would like to define a new range click on the Define New Range link 108 User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 SR ee Define New Range After clicking the link you will be presented with the following screen DHCP Server Configuration Below you can edit or create an address range For help on a specific field click on the help link Subnet 192 168 1 0 Netmask 255 255 255 0 Gateway 192 168 1 1 Domain Name quardiandigital com DNS Servers 192 164 1 1 Start Address 192 168 1 64 End Address 192 168 1 127 Create Range All fields must be filled out before you will be able to add this n
190. ned by a smaller Certificate Authority Netscape and Internet Explorer may bring up a warning that it does not recognize the CA This may make some users uncomfortable and insecure about using your site However one of these CAs can provide you with a signed certificate at a much reduced cost E 1 2 Certificates IP and Virtual Host Issues A certificate is bound to a domain name regardless of the IP address Therefore if you register a certificate you will register it under your domain name Unfortu nately due to current protocol restrictions you can only have one certificate per IP address Using a separate IP for each domain name located on your EnGarde system will give you the ability to assign a separate certificate to each domain E 2 Accepting an Unsigned Certificate During the initial login during the configuration of your EnGarde system and or when connecting to the GD WebTool you will be prompted with the following screen F New Site Certificate Netscape amp New Site Certificate lockbox guardiandigital com is a site that uses encryption to protect transmitted information However Netscape does not recognize the authority who signed its Certificate Although Netscape does not recognize the signer of this Certificate you may decide to accept it anyway so that you can connect to and exchange information with this site This assistant will help you decide whether or not you wish to accept this Certificate and to wh
191. nel in formation and network information Security This is quite a large section It contains all the configuration for your Certificates SSL connection IP access control and the login banner Guardian Digital Secure Network Pee The Guardian Digital Secure Network allows organizations to manage the software configuration of their EnGarde Secure Profes sional installations within their enterprise It includes access to soft ware updates technical support and security information alerts en suring EnGarde provides a robust platform requiring very little main tenance This section will allow you to create and view system back ups EnGarde Secure Professional 55 Section 4 3 Virtual Host Management 4 3 Virtual Host Management The Virtual Host Manager provides complete control over all Web server virtual host configurations This section is also where you can create and delete an on line store To enter the Virtual Host Management section click the Virtual Host Man agement icon The upper portion of this screen displays a list of virtual servers you have on your system It has the port number hostname and document root of that virtual host Below that is the list of Virtual Host options Virtual Servers Below is listing of the virtual servers you currently have on your systern Port Hostname Document Root There are currently no virtual servers defined Virtual Host Management Below you can configur
192. nfigure these logs You will first be presented with a list of the existing non SSL virtual hosts Select whether you would like to have the Web Statistics generated daily or weekly Site Name Lockbox guardiandigital con Frequency Daily V Weekly V Save Settings In this menu you will have the following options Site Name Here you can enter in the name you wish to associate with this site Leaving it as the name of the virtual host is a good idea 74 User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 Frequency The Web statistics software can be run daily or weekly It s up to you how often you want new statistics generated Click the Save Settings button when you ve finished your selection Going to the site name followed by WEBSTATS will display the logs for your virtual host Using the example above you would type in http engarde guardiandigital com WEBSTATS User Access Control Web statistics are protected so no one can view them without a user name and password Since most likely your Web statistics are private information you will want to protect the Web statistics from unauthorized visitors Here we will assign user access control Username Password f Y jI Add a New User Here you have two fields Username and Password This allows you to assign a username and password to your statistics directory When a person tries to access them a username password window will appear This allows you to define w
193. ning mode allows advanced users to use multiple drives both IDE and SCSI and configure them however you like If you don t have a clear un derstanding of partitioning it is recommended you use the automatic partitioning mode Main Screen When you first start the manual partition mode you will see the screen on the following page This main screen will show you a list of created partitions drives with space available and space remaining It will also allow you to add delete and edit partitions There are two listboxes on this screen the partition listbox and the hard drive list box Both boxes scroll and can be accessed by hitting the tab key on the keyboard Hitting Enter while in the partition listbox will bring up an edit screen described later in this section To scroll up and down in a listbox simply use the arrow keys on the keyboard Partitioning Device Mount Point Size MB Filesystem ar ag zI AEN to m eT Hard Drive List Total Size MB Maxtor 3 a 2 ST348816A hdd 18 User Guide INSTALLING ENGARDE SECURE PROFESSIONAL Chapter 3 The first thing that must be done at this menu is to add a boot partition A boot partition is required for compatibility and security and will be created for you automatically the first time you hit the Add button The boot partition will be a 30MB partition created on the first drive in the sys tem If you have both SCSI and IDE drives in the system the following window will a
194. not allowed to FTP into the machine If you have Allow Local Logins enabled in the Global Configuration and you would like to block access to certain users select their username here EnGarde Secure Professional 83 Section 4 4 System Management Chroot List Blackhst hick e l rwm 2 pete davd Save Changes NOTE Any changes made here will take effect immediately after pressing Save Changes 4 4 3 Secure Shell Management Secure Shell Management Below you can configure your secure shell server Edit Secure Shell Configuration Configure who can ssh inte your machine Secure Shell Key Generation Create anew key for a user so they can ssh to your system Secure Shell SSH is a program for logging into a remote machine and for ex ecuting commands on a remote machine It is intended to replace rlogin and rsh and provide secure encrypted communications between two untrusted hosts over an insecure network This section will allow you to edit the SSH configuration generate a new host key and generate user keys Edit the SSH configuration By clicking on the SSH Configuration icon you are brought to the Edit SSH Con figuration page Here you have the ability to allow and deny groups and users SSH abilities Be careful when editing these options since you may grant access or deny access to the wrong people which could cause problems 84 User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 Below you can de
195. ns a step by step guide on setting up all the major components of your EnGarde system Appendix B The Advanced Installer Issues covers other features of the installer to be used by advanced users Appendix C General Linux has some basic BASH commands for getting around the system from the console Appendix D Firewalls and Proxy Servers covers how to allow your EnGarde sys tem to get through a firewall or proxy server and how to get a client system to EnGarde from behind a firewall or proxy server EnGarde Secure Professional 5 Section 1 2 List of Chapters and Appendices Appendix E Certificates has basic information on what certificates are how to manage them and getting a certificate signed Appendix F Licenses covers all the major licenses attached to the different soft ware programs included with EnGarde Appendix G Glossary covers common jargon and terms used in this manual Appendix H References has a list of references used to aid in the creation of this manual 6 User Guide INTRODUCTION Chapter 1 1 3 Product Activation Activating your copy of EnGarde Secure Professional gives you the ability to join our mailing list priority access to the latest system and security updates and Guardian Digital technical support as described in the next section Activate Your Software Guardian Digital offers the ability to activate EnGarde Secure Professional from your local desktop Simply connect to https www guardiandig
196. nternal mail server using the publically accessible IP address as signed to the EnGarde Secure Professional server itself The following steps correspond to the sections in the diagram as data traverses from the workstation on the Internet to the internal server and back to the work station A The end user on the Internet makes a request for a webpage EnGarde Secure Professional 153 Section 4 6 Security B The request passes through the Internet and makes its way to your EnGarde server The EnGarde server will evaluate what type of request it is and determine how to handle it based on the rules defined by the EnGarde ad ministrator in this section C In this example it will forward the request to the web server located on the internal network D The web server will handle the request and send the results back to the EnGarde server E The EnGarde server at this point will forward the results back out to the Internet and to the end user s PC EnGarde gives you the ability to set up port forwarding directly through the WebTool Here you can define what service requests addressed to the external interface of the firewall will be passed on to servers on the internal network When you first visit this section you will not see any rules listed Protocol Local Host Port Remost Host Port There are currently no rules defined Define New Rule To add a rule select the Define New Rule link You will be presented wit
197. ockbox guardiandigital com Similar to the other sections you can click on the name to edit the record After clicking on the name you will be brought to the Edit Name Alias Record page Edit Name Alias Record Below you can define aliases to different machines Alias is the machine you wish to alias to Real Name For example you may want to alias www guardiandigital com to webserverl guardiandigital com In this case www guardiandigital com is your Alias and webserverl guardiandigital com is your Real Name Warning You can not make an alias to a mail server Alias pw guardiandigital con Real Name ockbox quardiandigital com Save Delete You can make your changes by editing the appropriate field When you are done with your changes you can click the Save button to set the changes To delete the record simply click the Delete button and the alias will be deleted Name Server The Domain Name System DNS is the software that is responsible for con verting hostnames into numbers that computers can understand For example 104 User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 the name www guardiandigital com corresponds to the host IP address 63 87 101 80 and vice versa The DNS server sometimes called a name server is the process that runs on EnGarde awaiting incoming name service re quests The name server section allows you to specify the name server that will be hosted here A name server is required for the dom
198. ode and share the results with others exist and which are developed by people whose primary means of communication with each other is the Internet OpenSSH An Open Source version of Secure Shell ownership The user UID and or group GID that is associated with a file di rectory process or process group packet The fundamental unit of communication on the Internet packet filtering The action a device takes to selectively control the flow of data to and from a network Packet filters allow or block packets usually while routing them from one network to another most often from the Internet to an internal network and vice versa To accomplish packet filtering you set up rules that specify what types of packets those to or from a particular IP address or port are to be allowed and what types are to be blocked EnGarde Secure Professional 299 Section F 0 partition Before a storage device such as a hard drive can be used by the system it must be partitioned A partition is a portion of the whole drive It defines the boundries in which the filesystem can manage A filesystem can not be placed on a storage device without a designated partition partitioning See partition perimeter network A network added between a protected network and an exter nal network in order to provide an additional layer of security A perimeter network is sometimes called a DMZ pid Process identifier A number used by the kernel to keep track of
199. of MindTerm it is 116 days old Please go to http wew sindbright s mindtern to check for new versions now and then RindTerm home C WINDOWS Jeva mindterm SSH Server Alias Connecting to Lockbox NindTerm home C WINDOVS Jeva mindterm Connected to server running 55H 1 5 OpenSS5H_2 2 0p Host key not found from the list of known hosts key file Admin Key password Last login Non Nov 27 21 25 44 2000 from devel querdiendigitel con admin lockbox edmin f At this point you are ready to interact with the system Now would probably be a good time to save your settings Saving your settings allows MindTerm to store the information you entered into the SSH Connection dialog so you don t have to re enter the data in every time 186 User Guide ENGARDE CONNECTIVITY Chapter 6 MindTerm home C WINDOWS Java mindt To save your settings select File gt Save Settings To exit the system type exit You will be brought back to the SSH Server Alias prompt At this point you can shutdown MindTerm by clicking the X in the cor ner or from the menu File gt Exit It is highly recommended that you log out of the server using the Exit command before shutting down MindTerm so you are properly logged out 6 1 3 Secure Copy SCP The Secure Copy SCP is a method of copying files over a secured SSH connec tion MindTerm supports SCP To copy files to and from the server via SCP you will
200. of the domain guardiandigital com asismail guardiand igital comand dns guardiandigital com For example Figure 3 8 6a shows the guardiandigital com zone and two hosts within the zone EnGarde Secure Professional 93 Section 4 4 System Management guardiandigital com mail guardiandigital com www guardiandigital com Figure 2 3 8 6a Example of the guardiandigital com zone When you select the option to create a new zone you will be presented with the page in Figure 3 8 6b The above page has quite a few options Here we will discuss each one in detail Zone type The zone type will allow you to choose between forward and reverse lookup e Forward lookup allows the client machine to supply a Fully Qualified Do main Name FQDN and the DNS will return the IP address e Reverse does the exact opposite You supply an IP address and the DNS will return an FQDN NOTE When creating entries for a Reverse Master Zone you must not put in entries that refer to an alias To do so would break DNS for the corresponding domain Domain name Network This contains the actual domain name or in the case of reverse zones the network address block that this DNS zone will reside in For example if your EnGarde system is like above lockbox guardiandigital com then the domain would be guardiandigital com 94 User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 Zone type Forward Names to Addresses Reverse Addresses to Na
201. of the system through the GD WebTool utility In this section we will discuss the GD WebTool usage interface and how to take full advantage of everything it has to offer This section does not cover using the GD WebTool for the initial machine configuration You can find this information in the previous section 3 5 NOTE The GD WebTool is a program that is run by EnGarde When you make changes the WebTool may take a few moments to process the changes While this is happening your browser may report Host contacted Waiting for re ply Do not press back stop or reload while this is happening Section 4 1 Connecting and Logging into the WebTool 4 1 Connecting and Logging into the WebTool The GD WebTool is always running through it own personal mini Web server This server is securing your connection with SSL and can be accessed on port 1023 To connect to the GD WebTool program from your browser you will have to type in the following URL https computername domain com 1023 We used https as opposed to http This tells your browser you will be us ing an SSL secured connection to connect to the server Where computer name domain comis you will replace with the actual name and domain The last part of the URL is 1023 which specifies an explicit port rather than the default port https engarde guardiandigital com 1023 This tells the browser that instead of connecting to the default port 80 for non SSL and 443 for SSL
202. ommunication over a phone line PPPoE allows PPP communications to travel through an Ethernet interface This method is used primarily for DSL modems To configure EnGarde to work with your PPPoE device start by connecting your PPPoE device via the cable supplied with the device to the ethernet card that will be configured for PPPoE If the ethernet device to be used for PPPoE was not configured at installation time the WebTool can be used to accomplish this Starting in System Management se lect Network Configuration A static or DHCP device can be changed to a PPPoE device from here Refer to Section 4 4 8 on page 117 for details on how this is done The PPPoE specific configuration is now complete There are now some general configuration requirements that will need to be made These can be found in the following section Common Configuration Requirements Common Configuration Requirements Now that DHCP or PPPoE settings have been properly configured the network needs to be restarted for all the changes to take effect To restart the network from the WebTool start in System Management then select Network Configuration and click the Restart Networking link The network will be restarted when the page refreshes Bring up down interfaces and make routing changes Restart Networking adire At this time you must redefine the trusted and untrusted ethernet devices The system may be more vulnerable to an attack during this time
203. on figuration Now we are ready to start the initial configuration of EnGarde Secure Professional Click on the Begin Configuration button to start the initial configuration process Guarogoian an s DIGIT L rrr Pioneering Open Source Security a Logout Initial System Configuration Welcome to EnGarde Secure Linux Before you can use EnGarde you must finish your machines initial configuration When the process is complete you will be asked to reboot your machine so the changes can take effect This module will take you through the following steps 1 Passwords and Access Control Setup your root LIDS MySQL and WebTool passwords 2 Locale and Time Setup Define your systerns locale time and time servers 3 Firewall and Service Configuration Configure your firewall and define what services this machine should proviele Begin Configuration gt Guardian Digital Secure Network Guardian Digital com Support Guardian Digital Store At the main screen you will see a brief outline of the different steps you are about to be going through each with a brief description From here you can start the initial system configuration It will guide you through step by step You can not skip steps here The next section covers each step of the configuration process 3 5 1 Password and Access Control This first step of the initial configuration is to set the root and WebTool passwords and setup access control En
204. on is enabled PPTP will produce very verbose log messages in var log messages This should be dis abled under normal circumstances If you are having trouble with PPTP you should enable this option and see what messages are showing up in var log messages Local IP Address This is the IP address that the local PPPTP daemon will bind to This should be the IP or virtual IP address of the machine that your PPPTP connection will be coming from Remote IP Address These are the ranges of IP addresses that the PPTP daemon will hand out to connecting clients You can specify single IP addresses separated by commas or you can specify ranges or both For example 192 168 0 234 192 168 0 245 249 192 168 0 254 IMPORTANT RESTRICTIONS 1 No spaces are permitted between commas or within addresses 158 User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 2 No shortcuts in ranges ie 234 8 does not mean 234 to 238 you must type 234 238 if you mean this 3 You MUST give at least one remote IP for each simultaneous client Address to Listen On This is the address off an interface on the machine that will listen for connections Leave this blank to allow all interfaces to listen Local WINS Server This is the IP address of your WINS server If you setup your EnGarde machine as a Windows File Sharing server then the IP ad dress of the EnGarde machine can be used 40 bit Encryption This specifies whether the PPTP daemon should use 40 bit
205. ons at the top followed by a list of your DNS servers DNS Management Global Options Setup forwarders and various defaults that will apply to all the zones you manage Create a New Master Zone Create a new authoritative zone Create a New Slave Zone Create a new secondary zone Zane Type Quardiandigital com Master The first object in this menu is the Global Server Options Here you have the ability to create new Master and Slave zones discussed above and to edit the Global Options 98 User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 Global Options Global forwarding and zone transfer options Z to to Servers to forward queries TEEF Allow transfers from Allow queries from Allow None Allow Any gt Listed Listed Save Global Forwarding and Zone Transfer Options Servers to Forward Queries to A forwarder is used for name servers that may not necessarily be directly connected to the Internet This may be due to being behind a firewall or inside of a corporate network Forwarders will instead query a specified additional name server for its DNS information If your DNS server will be responding to a forwarding server you will want to specify the server s it is allowed to contact See forwarders and forward zone in the glossary for more information concerning forward queries Addresses to listen on This allows you to define which address your want your DNS server to listen on You can enter in each I
206. ontrol PPTP A new Dial up configuration will be created for your PPTP connection To create this configuration click on My Computer From the My Computer window select Dial up Networking EnGarde Secure Professional 209 Section 7 3 Connecting From Windows NT 3 5 File Edit View Help 3 Floppy A Cc D IE F a as Control Panel Printers DialUp Scheduled Networking Tasks Dial up Networking will start up with your dial up configuration s If no other configurations were made previously then the fields will be empty as in the ex ample below Click the New button to start the creation of a new dial up configuration 210 User Guide VIRTUAL PRIVATE NETWORKING Chapter 7 The first step is to give this dial up configuration a name For the example My Connection was used Anything descriptive can be used blank spaces are not allowed Click Next to continue EnGarde Secure Professional 211 Section 7 3 Connecting From Windows NT 3 5 Next we need to tell Dial up Networking how we are going to go about estab lishing our connection The PPTP service will use an existing connection to the Internet as a passageway to the remote network The option in Windows NT is called I am calling the Internet Click the J am calling the Internet check box and click Next to continue 212 User Guide VIRTUAL PRIVATE NETWORKING Chapter 7 Next the information concerning what computer you want to connect to mus
207. or example user nick will automatically be given group nick This allows user nick to have private files that no other user but root can access 78 User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 Edit a User To start editing an existing user click on the user name from the main System Manager menu You will be brought to the same screen as for creating a new user except it will contain all the information about the user you selected From here just change what you wish to change and select Save when done The options work exactly the same as creating a new user in the previous section Configure Secondary Group The last user option in this section is the Configure Groups option In here you can create and change the group names group ID s and members by selecting the Configure Groups link to edit the groups You will be presented with a menu listing all the current groups and giving you an option to create a new group Create a New Group Selecting the Create a New Group link you will be brought to a new menu to create a new group Group Details Group name Group ID m newgroup 505 Members J thick root a Create The interface will assign a group ID It is advisable that you leave the default value You will also need to assign a group name and select users to this group if necessary Once all the fields have been filled out hit the Create button to apply the new changes EnGarde Secure Profe
208. ot your password then contact your system administrator To view and or modify any of the information mentioned please refer to Section 4 4 1 User Account Administration on page 77 You are also required to have a key for the system The key provides the en crypted information MindTerm requires including your password to authorize you to connect to the remote host When your account was created by the sys tem administrator a key should have been given to you If you do not have this key please contact your system administrator To generate a new key refer Secure Shell Management on page 84 To enter this information into MindTerm select Setting gt SSH Connection File Beem Tunnels Help Copyrigh Initiali Terri This is Terninal Misc Please g Fionw Loca Darian SHa MindTerm Auto Save Settings v Auto Load Settings SSH Serv Save Passwords This will pop up a window labeled MindTerm New Server Here you will need to enter in the information mentioned above Each field will be described below 182 User Guide ENGARDE CONNECTIVITY Chapter 6 Sewer focktox guadandgtalc Pot 22 Ok Cancel Server In this field you will need to enter in either the IP address or the name of the server you are trying to connect to In our example above we want to connectto lockbox guardiandigital com So lockbox guard iandigital com was entered in to the server field Port This field should be preset to port 22 t
209. ou are uncertain of what to do should this event arise contact Guardian Digital for further assistance and we will be glad to help The e mail will contain instructions on how to handle the situation It will look similar to the example below A password to disable the host intrusion monitor was en tered three 3 times incorrectly This could be an er ror of the system administrator or it could be some one attempting to gain unauthorized access We suggest checking in to this matter as soon as possi ble To check if the host intrusion monitor is prop erly running login to your Lockbox as the root user In structions on this can be found in Section 6 of the docu mentation and type 142 User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 lidsadm r This will return the current running status of the intru sion monitor If the monitor is not run ning you should turn it back on Do this by typing lidsadm S LIDS_GLOBAL It will prompt you for your host intrusion monitor pass word Once the password is correctly entered the intru sion monitor will be en abled You can scan the logs through the GD WebTool for more de tailed information You can also read more on the intru sion monitor in Section 9 of your of your manual This error will only occur under the following conditions e A wrong password is entered in three times in a row to disable LIDS e A wrong password is entered in three times in a row to
210. ou use this module you must first set up Tripwire on your machine Unfortunately this cannot be done through the WebToo at this time so it must be done from a shell Below are the steps you will need to perform Be sure that these commands are executed as the root user root machine root etc tripwire twinstall sh root machine root tripwire init After you execute the twinstall sh script you will be prompted for a site keyfile passphrase and a local keyfile passphrase These passphrases should fol low the guidelines outlined in the Initial Configuration section of this manual on page45 After the keys are generated you will be prompted for your site passphrase two times as Tripwire signs its configuration files with this key to ensure data integrity When that script is done you can run the second command to initialize your database You will be prompted for your local passphrase when initializing the database If you see No such file or directory warnings do not be alarmed The configuration file provided in EnGarde covers a stock installation with all ser vices running If you have some services disabled then Tripwire will generate these harmless warnings These warning can be addressed in the Tripwire Main tenance section of the WebTool The first time Tripwire is run a reference database will be created that reflects the normal operating state Variations from this reference database will requi
211. our Monday 205 November o 2000 2a 06 a o Set System Time It is also possible to configure EnGarde to use Internet time servers to set its time You have three fields to fill in the hostnames of the time servers EnGarde will use all three servers to synchronize its time Keeping accurate system time is extremely important You have to enter hostnames in here IP addresses are not allowed 132 User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 Setup Time Servers This section allows you te setup which servers you would like to use as time servers For more information on this please visit http www ntp org Your system will sync itself with these systems often using the three servers to assure accuracy Your current time servers are listed below the text boxes A list of servers can be found here Please find the three geographically closest to you and enter them in the text boxes below Note These should be hostnames not IP addresses Server One Server Two Server Three rrapin csc neau edu tock usno navy nil bonehed lcs nit edd terrapin cse nesu edu tock usno navy mil bonehed les mit edu Setup Servers EnGarde Secure Professional 133 Section 4 5 EnGarde Auditing System EAS 4 5 EnGarde Auditing System EAS Auditing is the process by which EnGarde lets you know what s going on with both users and processes on the system as well as how it is currently performing Information must
212. over from a failed disk The size of a RAID 5 partition is determined by taking the total number of disks in the array minus one and multiplying that by the size of the smallest partition in the array RAID Spares In the event of disk failure the Software RAID system will recon struct the RAID array using the parity information contained on its RAID disks It will write the reconstructed data to one of the spare disks in the system The spare disk remains unused until an error occurs This method is sometimes refered to as hot reconstruction A RAID array can be fully reconstructed and operational with no system downtime If at least two disks are found in the EnGarde system a prompt to choose RAID 1 or No RAID will be given Additionally if three or more disks are present in the system an option for RAID 5 will be listed as well Partition Configuration Choose to RAID during this installatino or no RAID at all Choose help for more information concerning NOTE Once a Software RAID partition is created the entire system will be con figured for Software RAID Non RAID partitions can not be created at that point Choosing the RAID disks and Spare disks Once RAID I or RAID 5 is chosen a new menu with two lists will be displayed Each list shows the hard drives located in the system and their available free space EnGarde Secure Professional 23 Section 3 2 The EnGarde Secure Professional Installer Ydev sda Ydev sdc
213. ow Anonymous Uploads Enabling this will allow anonymous users to upload files It is strongly recommended you do not enable this ability Allow Anonymous MKDIR By default anonymous users can not create directo ries Enabling this will override this functionality Create Permissions Users Setting this option to Owner Readable will make all uploaded files accessible only to the user who uploaded them while the other option World Readable makes files readable by all users Create Permissions Anonymous This works the same as setting the permis sions for local users as described above accept it applies to anonymous users FTP Banner This is a text banner that is displayed to the user when they login via FTP Interface to Listen On Select which interface you want the FTP server to ac cept connections from Leaving this blank allows connections from every interface Max Rate For Anonymous Users This is the maximum data transfer rate per mitted in bytes per second for anonymous clients Set this to 0 for unlim ited Max Rate For Local Users This is the maximum data transfer rate permitted in bytes per second for local authenticated users Set this to 0 for unlimited Define Chroot and Blacklist This page allows you to define what users should be chroot ed Any user not listed here will not be chroot ed unless you have enabled Chroot All Local Users in the Global Configuration section The blacklist defines what users are
214. ow will appear Now pull down the Edit menu and select Preferences from there File Edit View Go Communicator tiis zi ut iil ony tHe if Past ASIE tl Py a Z Select Al Cirle Eind in Page Ctrl F Ring Aer EHS Search Internet Preferences After selecting Preferences the Preferences window will be displayed From here you will want to expand the Mail amp Newsgroups section by click on the found in the box You will then have a new group of options We will start by configuring our user name e mail address etc Click the Identity option from the menu tree on the left EnGarde Secure Professional 227 Section 8 1 Configuring Netscape Mail for Secure IMAP Preferences Guardian Digital Inc m Once the window appears fill in the appropriate information When you are done entering everything select Mail Servers from the menu tree on the left This will bring up the options for your incoming and outgoing e mail servers 228 User Guide SECURE E MAIL Chapter 8 mail Default We will start be creating a new server for the incoming mail First delete the default server Netscape includes by clicking on it and selecting the Delete button Then click the Add button EnGarde Secure Professional 229 Section 8 1 Configuring Netscape Mail for Secure IMAP You will be presented with the following dialog Mail Server Properties x General IMAP Advanced Se
215. p3 145 SSH 77 179 definition 84 edit 84 management 84 SSL 52 connection 180 static host addresses 122 system backup 55 161 management 54 76 reports 136 status 54 time 132 time servers 48 Tripwire 147 148 administrator 149 maintenance 149 reports 150 schedule 150 update database 150 trusted host 47 84 update 55 173 user account 77 edit 79 install time 38 new 77 password change 169 SSH key management 170 User Access Control 75 virtual host 58 delete 72 edit 60 management 54 56 named create 74 delete 74 secure 58 ssl 58 Webmail setup 59 Virtual Private Networking 157 VPN 157 198 configuration 157 edit user 159 Windows 2000 216 Windows 98 201 Windows NT 3 5 209 web directory 72 WebMail 59 WebTool 51 access control system 144 WebTool 144 backup 161 configuration 161 define backup 162 new 165 restore 166 tape directory maintenance 164 view changes 167 broadband 123 certificate CSR generation 68 generation 66 management 66 upload 70 connecting 52 daily summary 141 default login 43 DHCP 108 define ranges 108 view leases 110 DNS global options 99 management 92 e mail 88 domain creation 89 domain management 88 edit domain 90 routing 91 secure 226 secure client config 145 EAS 134 edit configuration 138 process information 137 system control 137 system graphs 134 system reports 136 website logs 1
216. parated by a dot A fully qualified domain name FQDN starts with a specific host and ends with a top level domain An example of this could be engarde guardiandigital com FQDN guardiandigital com full backup This is probably the most confusing term that relates to the subject of backups It often does not mean comprehensive A full backup does not necessarily mean that it includes every file on a whole system Full in those cases means including all files in a given data set without regard to previous backups In other words it means not incremental and not differential It is better to use the phrase level zero to make this distinc tion GNU GNU s Not Unix a recursive acronym This is the name of a project started by Richard M Stallman and is the mission of the FSF Free Software Foun dation which he founded The purpose of the GNU project is to produce EnGarde Secure Professional 297 Section F 0 a free operating system and suite of applications utilities and program ming tools that are non proprietary and unencumbered GPL To protect the GNU project software from being appropriated for propri etary use by hardware vendors the Free Software Foundation released their software under the GPL or General Public License hard link An entry in a directory that contains a pointer directly the the inode bearing the file s meta data All non symlink directory entries a
217. ppear so that you may select if you want this boot partition on the first IDE disk or on the first SCSI disk After clicking the Add button the main screen will refresh and you will see the newly added partition If you had to choose between SCSI and IDE this will happen after your decision Adding a Non Software RAID Partition Before EnGarde Secure Professional can be installed a and boot partition are required As described above the first time you click Add a boot partition is created After that you have the ability to create your own partitions as necessary NOTE The installer will not continue until a partition has been created Step 1 Selecting a Drive The first thing the installer requires when adding a partition is to select which drive you want the partition to be created on It will display the following dialog showing each drive and the remaining space on that drive EnGarde Secure Professional 19 Section 3 2 The EnGarde Secure Professional Installer If a drive has all of its space allocated to other partitions it will not be displayed This dialog will also not appear if you only have one drive in the system Step 2 Partition Size After selecting the drive to create the partition on you must select the size of this partition The interface accepts input in the form of MB so for a 500 MB partition you would type 500 After entering in the partition size you have a second option Test disk integrit
218. printers EnGarde Secure Professional 225 8 SECURE E MAIL EnGarde Secure Professional provides two methods of retrieving your e mail re motely secure IMAP and secure POP3 Both protocols have been secured using SSL and both require clients that support SSL secured IMAP and secured POP3 Securing IMAP and POP3 greatly increases the security and privacy of personal e mail For this reason IMAP and POP3 are only available in a secure form and therefore the standard insecure form of IMAP and POP3 are not available with EnGarde Using a secure form of these protocols requires a client that can support them We will discuss how to configure both Netscape Mail for secure IMAP and Microsoft Outlook for secure IMAP and secure POP3 SECURE E MAIL Chapter 8 8 1 Configuring Netscape Mail for Secure IMAP The Netscape Communicator package includes Netscape Mail Netscape Mail is capable of both IMAP and POP3 but only supports IMAP in secure mode Below is a set of instructions for configuring your Netscape Mail for secure IMAP NOTE You must allow users to access their mail from their machine by adding in their IP address in the System Access Control Section 4 6 5 on page 144 To access the Netscape Mail you will first need to start Netscape Once Netscape is loaded you can launch the Mail by either selecting Communicator gt Messages or by clicking the mail icon in the lower corner of the browser window At this point the Netscape Mail wind
219. pting lan guage makes it easy for developers to create dynamically generated Web pages PHP also offers built in database integration for database man agement systems providing the ability the produce database enabled Web pages with a short learning curve Database Support The included database server provides a true multi user multi threaded SQL Structured Query Language database server en abling EnGarde system users and applications to create robust interactive Web sites and powerful E Commerce sites Secured IMAP and POP3 SSL Secured IMAP and POP3 are fully sup ported to help increase the security of personal e mail e Domain Name Services EnGarde Secure Professional can manage DNS for thousands of domains for external users trying to access virtual Web sites running on EnGarde as well as DNS for internal users This is all configurable using the WebTool e Common Gateway Interface CGI Support The administrator has the ability to enable CGI based dynamic Web content on an individual virtual server basis Server Side Includes EnGarde has the full ability to correctly display server parsed Web pages shtml files EnGarde Secure Professional 3 Section 1 1 Features e Secure Shell Accounts The Secure Shell provides a secure encrypted com munications link with EnGarde Secure Professional from a remote location eliminating the risk previously found in other remote access methods e Web Server Aliasing EnGard
220. r assigning dynamic IP addresses to devices on a network DHCP simpli fies network administrative work because the software keeps tracks of IP addresses as opposed to the administrator EXT2 Is the main filesystem the Linux operating system uses on its storage de vices EXT3 A filesystem based on the EXT2 filesystem that includes journaling capa bilites filesystem The filesystem manages files contained on a storage device so that the operating system may interact with them The most common filesystem in Linux is Ext2 296 User Guide GLOSSARY Appendix F firewall A component or set of components that restricts access between a pro tected network and the Internet or between other sets of networks forward zone A forward zone contains a listing of the hostnames in that zone with their corresponding IP addresses A reverse zone represents address to domain mapping suchas 63 87 101 80towww guardiandigital com forwarder A forwarder is used for name servers that may not necessarily be directly connected to the Internet This may be due to being behind a fire wall or inside of a corporate network Forwarders will instead only query a specified additional name server for its DNS information FQDN See Fully Qualified Domain Name Fully Qualified Domain Name Domain names reflect the domain hierarchy Do main names are written from most specific a host name to least specific a top level domain with each part of the domain se
221. r needs with security in mind and increase the overall security of your network Section 2 3 Why Do We Need Security 2 1 Why Do We Need Security In the ever changing world of global data communications inexpensive Internet connections and fast paced software development security is becoming more and more of an issue Security is now a basic requirement because global computing is inherently insecure As your data goes from point A to point B on the Internet for example it may pass through several other points along the way giving other users the opportunity to intercept and even alter it It does nothing to protect your data center other servers in your network or a malicious user with physical access to your EnGarde system 2 2 How Secure is Secure Security is about defense in depth Providing physical security as well as a well designed network control over the users and processes on the host itself and regular maintenance can go a long way towards providing good security In the most basic sense a system is secure if it does what it s supposed to do even if its users attempt to do something they re not supposed to do It protects the information stored in it from being modified either maliciously or accidentally or read or modified by unauthorized users Consider the security of your household Perhaps you have an alarm system but does it work if the intruder cuts the system power Security involves tradeoffs How m
222. ranted access they are denied and a connection cannot be established IP Address for example 192 168 1 10 a IP Network for example 192 168 1 To add an address simply type it into the text box below To remove an address simply click on it below i Service JE Allow all addresses Entering an IP address in the given IP Address field will allow that IP Address to connect to EnGarde using the selected service Checking the Allow all addresses check box will allow any and all IP Address to access the selected service Exam ples are given above the IP Address field Once you have that typed in click the Add Host button and your new settings will appear below once the screen refreshes Allow Hosts These are hosts that are allowed to connect to the specified service on your system Service sshd 192 168 1212 192 168 5 4 6 6 Secure E Mail Client Setup EnGarde Secure Professional supports both Secure IMAP simap and Secure POP3 spop3 Here you can configure which interfaces each service can listen on and configure your certificates for each service EnGarde Secure Professional 145 Section 4 6 Security Secure Email is ie Setu B you can edit ti cate and the interface your OP daemons use tifieate is used for SSL it provides sertty vertcebon The interface ia the IP adress that the hemon shodd Inan Keep this fei thank to have R isten on al interfaces Secure IMAP Certificate Subject 3 Issuer
223. rd in the General Configuration General Configuration Contigure and customize the GDSN install trom Local Media Install new packages from an EnGarde CD Run the Update Agent Check for and retrieve updated packages Run the installation Agent Check for new installable packages GD Secure Network Help View the help page for this module 5 1 1 General Configuration This section allows you to control a few global functions of the Guardian Digi tal Secure Network Here you can select to use an advanced mode and enter in 174 User Guide GUARDIAN DIGITAL SECURE NETWORK Chapter 5 the account number and password supplied by Guardian Digital for use with the Update Agent General Configuration Auto Check Agent Selections Disabled 3 Advanced View Enabled 3 Activation Code 33334444 Password ek ew eee Save Changes Auto Check Agent Selections If this is set to Enabled then updated package in the Update Agent will be auto selected for retrieval If this is not set then you will have to check each package individually Advanced View If this is set to Enabled then dependancy information will be show in the update agent Activation Code This is the number assigned to you from Guardian Digital when you registered your copy of EnGarde Secure Professional This allows you access to the Update Agent so that you can update your EnGarde Secure Professional with the latest packages directly from Guardian Digital Account Password
224. re hard links host A computer system attached to a network host key A key the host will store locally and used for authentication when a user key stored on the users system is passed to it If both keys are valid then both the host and user Usually associated with SSH IDE See Intelligent Drive Electronics Intelligent Drive Electronics An interface for mass storage devices that have the controller integrated into the disk Also refered to as IDE for short Internet Message Access Protocol A protocol for retrieving e mail from a server Similar to POP3 but instead of downloading messages to the local machine IMAP s default is to work on the server IP spoofing IP Spoofing is a complex technical attack that is made up of several components It is a security exploit that works by tricking computers in a trust relationship into thinking that you are someone that you really aren t There is an extensive paper written by daemon9 route and infinity in the Volume Seven Issue Forty Eight issue of Phrack Magazine ISO9660 The most common file system found on CD ROMs Kernel Unix systems have a kernel that provides a system call interface includ ing IOCTL I O device control interface to allow programs to interface di rectly with hardware and files The Linux kernel provides file systems net working support for TCP IP and other protocols and device drivers These can be built into a kernel statically or as loadable
225. re intervention to include these changes to reflect this new state It is therefore rec ommended Tripwire be initialized only after your system is fully configured and before being connected to a network to minimize the potential for variation It is recommended Tripwire be started after your system is fully setup The ad ministrator will be notified of any changes from the point Tripwire is started and could become a hassle if the system is still being configured 148 User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 Once these steps are performed you can come back to this section to use the WebTool module Tripwire Maintenance Once the steps to initially configure Tripwire listed above have been completed you will see the following screen upon returning to the Tripwire Maintenance section Tripwire Maintenance Below you can view reports and update your tripwire policy files Define Administrator Define where you want the daily report e mailed to Schedule Tripwire Define when you want tripwire to generate reports Generate Report Generate a new report with the current state of the system View Reports Mew and delete reports Update Database Update the local database as per the most recent report Define Administrator Tripwire sends a daily report informing you of any system changes To change who gets the message type in the e mail address of the person to receive the reports and enter in the passphrase you used to set up T
226. re also given a private key that no one can have The public key is then checked against the private key for authenticity In the case of EnGarde Linux the private key is stored on your EnGarde system and MindTerm passes the public key to EnGarde for authenticity You can start up MindTerm by either double clicking on the MindTerm desktop icon or choosing it from the Start Menu Start gt Programs gt Mindterm gt Mindterm After a few moments you will be displayed with the MindTerm screen Fie Edt Setings VT Optone Tunnels Help Copyright c 1998 2000 by Mindbright Technology AB Stockholms Sweden Initializing random generator please wait done This is a demo version of MindTerm it is 118 deys old Please go to http wow mindbright se nindtera to check for new versions now end then MindTerm home C WINDOWS Jave mindters SSM Server Alias 7 When you started up MindTerm you may have noticed a MS DOS Prompt window appear and it may be located behind your MindTerm window You may minimize this window but do not close it The MS DOS Prompt window will close when you shutdown MindTerm At this point you will need to set up MindTerm so that it knows where to connect EnGarde Secure Professional 181 Section 6 1 Connecting from Windows 9x ME NT 2000 to who you are and what key to use First you must have a valid user on the system you are trying to connect to If you do not have a user are uncertain of the user name or forg
227. rectly in the Name Server field and click the Save button to make the changes If you wish to delete this name server record click on the Delete button Name Alias The Name Alias section gives you the option to configure an alias for this record Add Name Alias Record Below you can define aliases to different machines Alias is the machine you wish to alias to Real Name For example you may want to alias www guardiandigital com to webserverl guardiandigital com In this case www guardiandigital com is your Alias and webserverl guardiandigital com is your Real Name Warning You can not make an alias to a mail server Alias www guardiandigital com Real Name lockbox guardiandigital coal Create On this menu you have two options Alias and Real Name EnGarde Secure Professional 103 Section 4 4 System Management Alias The alias needs to be a Fully Qualified Domain Name FQDN In this case the alias is where you want the user to be redirected to For example the user types in www guardiandigital com while really they are being sent to lockbox guardiandigital com Real Name The real name of the server also needs to be a Fully Qualified Do main Name This is the name that the Alias will really be going to In the ex ample above you would enter in Lockbox guardiandigital com Edit Delete an Alias Once you create a new alias it will appear at the bottom of the page Real Name www guardiandigital com l
228. reen when data is sent and received over this connection E3 228PM By double clicking on the computer icon in your task bar a status dialog box showing information about your PPTP connection will be displayed You can get detailed information concerning the protocols by clicking the Details gt gt button disconnect from the network with the Disconnect button or hide the dialog box by clicking OK 208 User Guide VIRTUAL PRIVATE NETWORKING Chapter 7 Connected to My Connection NOTE Do not confuse this with a dial up connection using a modem This is con necting to another network over an existing connection You can now access the resources on the network you connected to via the Net work Neighborhood 7 3 Connecting From Windows NT 3 5 To configure PPTP to work in Windows NT 3 5 you will need to first install the PPTP drivers from the network menu in the Control Panel if they aren t already installed Use the Add Remove Programs section in the Control Panel for this or contact your system administrator NOTE The Windows NT 3 5 CD will be required to install the PPTP drivers Once the PPTP drivers are installed Service Pack 6a is required to be downloaded and installed After Service Pack 6a has been installed and the system is rebooted you are ready to start configuring your Windows NT 3 5 machine to connect to your EnGarde Secure Professional with PPTP Windows NT 3 5 uses the Dial Up Networking interface to c
229. ring LIDS this application won t function properly Here is what needs to be done to add this package to your LIDS configuration Issuing the following command will give you a list of the files an RPM uses Though it won t tell you if it needs read write and or append access to them rpm qpl package_name rpm The first thing we want to do now is protect the configuration file The configura tion file never needs to be changed by the program so we can give it READ access only If you want to make changes in the future simply disable LIDS make your changes and enable LIDS Here is how to protect our config file for READ only access lidsadm A o etc my_package conf j READ 254 User Guide THE LINUX INTRUSION DETECTION SYSTEM LIDS Chapter 9 Now the file is in the LIDS configuration file and set as read only We used the A option to ADD a new object The o object is the file my_package conf and it s j attribute is READ Valid attributes are READ WRITE APPEND DENY and IGNORE NOTE These are case sensitive and therefore must be written in all upper case letters We have successfully protected the configuration file Next we will tackle the log file The log file is simply a file that maintains a list of program events The file never changes previous information and therefore can be set to APPEND only So we issue a similar command as the one used for the configuration file lidsadm A o var log my_package log j
230. ription Section 5 1 Running Guardian Digital Secure Network 5 1 Running Guardian Digital Secure Network To start the Guardian Digital Secure Network select the Guardian Digital Secure Network icon from the main menu You will be brought to the main Guardian Digital Secure Network menu From here general configuration changes can be made packages installed from CD media and updated packages downloaded from Guardian Digital The purchase of EnGarde Secure Professional includes a trial subscription to the Guardian Digital Secure Network To take advantage of the features included in the Guardian Digital Secure Network you first must activate your subscription by visiting https www GuardianDigital com register You will be issued an activation password which must be entered into the Guardian Digital Secure Network configuration detailed below To purchase a subscription to the Guardian Digital Secure Network beyond the trial period visit the Guardian Digital online store by clicking on the Guardian Digital Store icon from the WebTool The Guardian Digital Secure Network is authorized for use on one EnGarde Se cure Professional installation A Guardian Digital Secure Network subscription must be purchased for each copy of EnGarde Secure Professional installed on your network Guardian Digital Secure Network Welcome to the Guardian Digital Secure Network Before you can use the GOSN you must configure your activation code and passwo
231. ripwire Define Administrator Below you can define where the daily report is e mailed to E Mail Address is the address you want all report summaries sent to Local Passphrase is the local passphrase for your system database Site Passphrase is the sitewide passphrase This process will take about 4 minutes Please do not click the Stop button or interrupt the process E Mail Address Local Passphrase root fr Site Passprase Update Policy NOTE This process will take about 4 minutes Please do not click the Stop button or interrupt the process EnGarde Secure Professional 149 Section 4 6 Security Schedule Tripwire Tripwire is scheduled by default to run at midnight everyday Using the pull down menus you can change how often and when Tripwire is run Below you can define how often tripwire checks the current system against its database Weekda Tame Every Day 000 a Generate amp View Reports You can force Tripwire to create a report by selecting Generate Report After it has finished generating a report you can get a list of all the recently generated reports be selecting View Reports View a Iripwire Report Below you can loak at the conetents of a tripwire report and optionally update the database October 15 2001 1552 lockbox inside guardiandigital com 2001 1015 155243 twr Selecting a listed report will display the report to you with the option to delete the selecte
232. rnet Explorer 5 5 or Netscape Navigator 4 78 is required First you must make certain that you have proxy servers disabled You will not be able to successfully connect to EnGarde with proxy servers enabled Type in the following address https 192 168 10 100 1023 It will take a few moments to connect Once the connection is made you will be informed of a new certificate Guardian Digital distributes EnGarde with a certificate generated by our security team Since the certificate is not issued by a certificate authority you will be prompted to accept the certificate Instructions on how to do this and more information concerning certificates can be found in Appendix E Certificate on page 289 if necessary After accepting the certificate you will be prompted for a login name and pass word This information is pre set to Login admin Password lock amp box Login to the GD WebTool Please enter a valid username and password You will be logged out after 15 minutes of inactivity The login and password are case sensitive During step 2 of the initial config uration you will be prompted to change the password You MUST change this EnGarde Secure Professional 43 Section 3 4 Connecting to EnGarde password Otherwise it will remain lock amp box 44 User Guide INSTALLING ENGARDE SECURE PROFESSIONAL Chapter 3 3 5 The Initial Configuration Process Once you enter the login name and password you are in the EnGarde Initial C
233. rpm rpm Uhv openssh 1 2 3_1386 rpm In Debian or any distribution using DPKG 196 User Guide ENGARDE CONNECTIVITY Chapter 6 dpkg i openssl1 0 9 4 dpkg dpkg i openssh 1 2 3 dpkg And from tar files tar zxvf openssl 0 9 4 tgz tar zxvf openssh 1 2 3 tgz cd openssl 0 9 4 configure make make install cd images openssh 1 2 3 configure make make install unrnonnnn7nnn wm You now must create a key for yourself You can create a key with OpenSSH by typing ssh keygen Generating RSA keys DOO OOO i od ae aa ai a obi a oo000000 Key generation complete Enter file in which to save the key home nick ssh identity Enter passphrase empty for no passphrase Enter same passphrase again It will prompt you for a filename to save the key in The default identity pub will be fine It will then prompt you for a new passphrase After entering your passphrase twice your public key will then be generated Once you have your key e mail it to your system administrator and they will insert it in to the system properly Read Section 4 4 3 Secure Shell Management on page 84 for more information Once this has been completed you will be able to successfully SSH in to the system For more information on SSH and using SSH please read the SSH FAQ which can be found at http www linuxsecurity com docs EnGarde Secure Professional 197 Section 7 0 7 VIRTUAL PRIVATE NETWORKING EnGarde Secure Professio
234. rtain your properties have the same configuration as the one below has Hit OK to accept the changes you may have made 222 User Guide VIRTUAL PRIVATE NETWORKING Chapter 7 EnGarde VPN General Options Security Networking Sharing Type of VPN server am Point to Paint Tunneling Protocol PPTP Laxoa We are now ready to attempt to establish a connection Double left click on the icon The connection dialog box will be displayed prompting you for a user name and password Use the user name and password you configured through the WebTool previously Once this information has been entered into the entry boxes select Connect to make the connection EnGarde Secure Professional 223 Section 7 4 Connecting From Windows 2000 2x If the connection is successful an icon of what looks like two computers connected together will appear on your task bar You can click on this icon to get statistics about the connection and to terminate the connection You will also notice the icon on your desktop will change if you selected to create a desktop icon The monitors on the two computers in the icon will turn from gray to blue informing you that a connection is established with that PPTP configura tion 224 User Guide VIRTUAL PRIVATE NETWORKING Chapter 7 tl EnGarde VPN You are now connected to your inside network and have access to all the resources Use the Network Neighborhood to access files and
235. rver Name flockbox quardiandigital com Server Type IMAP Server ii User Name rick T Remember password T Check for mail every fis minutes Cancel Help In the Server Name field you will need to enter in the name of the mail server given to you by your system administrator In the example above we used 1ock box guardiandigital com Next we need to select the Server Type Netscape Mail only supports secure IMAP so select IMAP Server here Finally in the User Name field enter the user name you were assigned to by your system administrator Next click the JMAP tab at the top of the dialog You will be presented with a number of IMAP options 230 User Guide SECURE E MAIL Chapter 8 Mail Server Properties a M Here you will want to make sure all the check boxes are turned off except for the User secure connection SSL option Your screen should match the number above EnGarde Secure Professional 231 Section 8 1 Configuring Netscape Mail for Secure IMAP Category Appearance Spec y servers for mad Fonts Colors w Navigator Mail amp Newsgroups Identity Mad Servers Newsgroup Servers Addressing Messages Window Settings Copies and Folders Formatting Return Receipts Disk Space Roaming Access Composer Offline Advanced S r Incoming Mail Servers lockbox To set server properties such as checking for new Siig asec gee ti heise Quaidiandigital com
236. sabled by default To create new ones select Define New Named Backup Click on this button and you will be brought to a new menu 162 User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 System Backu Below you can perform named backup operations Define a Named Backup Below you can define a new named backup Backup Description Myson Databases Directory Vvar 1ib myeql Exclude Patterns gt err Backup Schedule Every Week 3 Backup Level Incremental Backup Define Named Backup The Exclude Patterns field is the only optional field in this menu Backup Description You will need to give your backup a descriptive name In the example above we will be backing up our database files for MySQL so it was named MySQL Backup Directory This is the directory path containing the contents of what you want backed up In the example we are backing up all the database material so we pointed it to the top level database directory It will backup recursively Exclude Patterns Using standard wild card flags and regular expressions you can choose files not to be backed up In the example we didn t want to backup the error files so we entered in err All files ending in err will be excluded from this backup Backup Schedule This pull down menu contains four options concerning when you want this backup executed Never Daily Weekly and Monthly Select ing Never will disable this backup but it will not delete it Backup Level T
237. screen will be displayed showing the size of the final archive and what files are contained within it and your backup is complete EnGarde Secure Professional 165 Section 4 7 System Backup System Backup Your backup of MySQL Databases was successful The backup took seconds The total backup size was 64k oop eg roy sy ee myeql mysql db irm mysql db MyYI mysql db MYD mysql host irm mysql host MYI mysql host MYD mysql user irm mysql user MYI mysql user MYD mysql ftunc irm mysql func MYI mysql func MYD mysql tables_priv frm mysql tables_priv MYI mysql tables_priv MYD mysql columne_priv irm mysql colunns_priv MYI mysql columns_priv MYD myaql sock mysql pid Return To Index Page 4 7 4 Restore a Backup If you find the need to restore one of your old backups you can quite easily ac complish this through this interface When selecting to Restore a Backup you will be brought to a menu listing all the named backups almost an identical menu as the Create a New Backup menu Select which named backup you want and choose Select At this point you will be brought to another menu listing all of the backups listed under this named backup To the right of each named backup is the Toggle List option Clicking on this link will display a list of all directories contained in the backup set You can choose to restore only portions of the backup or t
238. ser Guide GUARDIAN DIGITAL SECURE NETWORK Chapter 5 console tools er ey Minor Bugfix Advisory ady anpe tools 1 1 1 tral Installed Version 19990829 1 1 0 Retrieve C Available Version 19990829 1 1 1 ached Dependancies Resolved Retrieve Packages The screen will show Severity of the update a link to the Advisory web page the Installed Version currently on the server the new Available Version and if all the Dependancies are met will all be listed To select a package to download click the check box labeled Retrieve When finished making the selections click the Retrieve Packages button The browser will then wait while the packages are securly downloaded and installed on the system During this time period do not hit stop back or reload in your browser or the packages will not be properly installed When the process is complete a screen displaying a list of all installed packages will be displayed Guardian Digital Secure Network The following packages were successfully updated console tools Tools for configuring the console The system has now been updated with the latest selected packages available from Guardian Digital 5 1 4 Run the Installation Agent The Installation Agent is very similiar to the Update Agent covered above In stead of providing updates the Installation Agent can perform installations of new packages not originally included in EnGarde Secure Linux security fixes and bug fixes
239. should not do any of this by hand unless you have a very good idea of what you re doing since if it is done incorrectly it will cause the Web server to fail As was said above the certificate and key are a pair If for some reason the certificate and key that are in place do not match each other then the Web server will fail to start If the Web server fails to start then all of the other sites on the machine are inaccessible SSL Certificate Management For nick tes1 inside quardiandig alcom Below you can configure SSL ceric ates for your site Generate Ceriiicate and Kay will generate a new SSL certificate key pair for this ste Enter Ceniticiate and Key will alow you 10 paste an existing certificiate key pair for this site This 6 useful if you have a certificate signed by Verisign or another certificate authority Generate Certilicate and Key Generate a new certificate key pair for this site Generate Certilicate Signing Generate a CSR which you can then submit to a certificate authority such as Request Verisign to be signed Enter Certilicate and Key Enter an existing certificate and key Or view your current certificate The Certificate Management section will allow you to configure your SSL certifi cate This option will only be available if the virtual host you are editing has SSL enabled Once at this menu you will be presented with three options which are each discussed below Generate Certificate and Key 6
240. ss and IP ad dress to name mappings It also provides the information necessary for mail to be properly routed DNS was created because IP addresses are often hard to re member DNS is used to map that address to a name which is much easier to remember When typing http www guardiandigital com into a Web browser for example the DNS server translates the host name www guardiandigital com into the IP address associated with www guardiandigital com The browser then sends the request to that IP address and responds with the informa tion available at that address DNS contains a number of unique characteristics about each host Each charac teristic forms a record in the database that stores the DNS information DNS zones are regions of IP addresses or names for which a particular organization is responsible Address Records This is a record that provides a host name to be assigned to an IP address All host names are associated with an IP address Name Server Records This is a record that defines what name servers are re sponsible for the zone In most cases this will be the same as the hostname of the machine Do not alter these records unless you have an explicit reason to Name Alias Records This is a record which provides an alias for a pre existing host name There may be multiple aliases for a single host name Mail Server Records This is a record which provides the information necessary to correctly route mail
241. ssage Protocol Small Computer System Interface Commonly refered to as SCSI is an indus try standard I O bus for high speed data transfer SPOP3 Is a version of the POP3 protocol that is wrapped in the SSL protocol for increased security For a description of POP3 see Post Office Protocol SSH See Secure Shell SSL See Secure Socket Layer superuser An informal name for ROOT EnGarde Secure Professional 301 Section F 0 swap A swap partition is a physical hard drive partition A Linux system utilizes swap space when system RAM starts to fill and it is necessary for more RAM However swap is signfigantly slower than system RAM and is not a replacement for RAM symlink Symbolic link An entry in a directory that is not a file but contains the name of another file that should normally be accessed instead Contrasts a hard link trusted host A trusted host refers to a network computer or device that can be trusted Generally these are internally controlled boxes and all boxes on the outside are untrusted Umask A setting in a Unix process that modifies the permissions on newly cre ated files It is generally represented as a three digit octal number that will be logically ANDed against the mode 666 rw rw rw Execute bits are not on newly created files in any case Unix The operating system after which Linux is modeled Although often used to refer to any operating system that provides features and programming interfaces that e
242. ssional 79 Section 4 4 System Management Edit an Existing Group Editing an existing group allows you to change the group ID and what members are part of the group Group name asers Group ID hoo Members Upon Save Change group ID on fles No Q Homedirectories lt 7 All files Save Delete If you change the group ID you will see three options at the bottom of the menu concerning changing the group ID on files If you changed the group ID and select no then files belonging to that group will still contain the old group ID Selecting the Home Directories option will change only files in users home direc tories while All Files modifies every file on the system in that group To delete the selected group click the Delete button The reason to change a users group would be to change their privileges For example if you want a certain user to be able to administer your EnGarde system you may add that user to the admin group Perhaps you want a certain user to only be able to edit their own personal files and the Web files you may add them to the www group A brief explanation of the groups in the example above is explained below admin The admin group will give a user access to some of the systems ser vices This would be good if you have other trusted users whom you wish to do administrative tasks such as maintenance file cleanup and other needed tasks users This is the group general users would be put in for e mail acc
243. stration of the random device e Allow device administration mknod e Allow examination and configuration of disk quotas Allow configuring the kernel s syslog printk behavior domain name Allow setting the domain name Allow setting the host name Allow calling bdflush e Allow mount and umount setting up new smb connection EnGarde Secure Professional 261 Section 9 4 Kernel Capabilities 262 Allow some autofs root ioctls Allow nfsservctl Allow VM86_REQUEST_IRQ Allow to read write pci config on alpha Allow irix_prctl on mips set stacksize Allow flushing all cache on m68k sys_cacheflush Allow removing semaphores Used instead of CAP_CHOWN to chown IPC message queues semaphores and share memory Allow locking unlocking of shared memory segment Allow turning swap on off Allow forged pids on socket credentials passing Allow setting read ahead and flushing buffers on block devices Allow setting geometry in floppy driver Allow turning DMA on off in xd driver Allow administration of md devices mostly the above but some extra ioctls Allow tuning the ide driver Allow access to the nvram device Allow administration of apm_bios serial and bttv TV device Allow manufacturer commands in isdn CAPI support driver Allow reading non standardized portions of pci configuration space Allow DDI debug ioctl on sbpcd driver Allow setting up serial ports Allow sending raw qic 117 commands Allow enab
244. t the broadcast address should be The most widely accepted one is to use the highest possible address on the network as the broadcast address An Section F 0 example on an internal network would be 192 168 1 255 Every host on the network must be configured with the same broadcast address buffer overflow Common coding style is to never allocate large enough buffers and to not check for overflows When such buffers overflow the executing program daemon or set uid program can be tricked in doing some other things Generally this works by overwriting a function s return address on the stack to point to another location denial of service An attack that consumes the resources on your computer for things it was not intended to be doing thus preventing normal use of your network resources for legitimate purposes DHCP See Dynamic Host Configuration Protocol DNS See Domain Name Server Domain Name Server The Domain Name System DNS is the software that is responsible for converting hostnames into numbers that computers can un derstand For example the name www guardiandigital com corresponds to the host IP address 63 87 101 80 and vice versa The DNS server some times called a name server is the process that runs on EnGarde awaiting incoming name service requests dual homed host A general purpose computer system that has at least two net work interfaces Dynamic Host Configuration Protocol Also known as DHCP is a protocol fo
245. t LIDS Configuration You can use the lidsadm L option to view a list of all the files and their attributes in the configuration You must have LIDS disabled to run this command since it requires access to the etc lids lids conf file EnGarde Secure Professional 253 Section 9 3 Protecting Your Files 9 3 Protecting Your Files EnGarde Secure Professional comes with a default configuration for protecting your files based on your configuration options and installed packages If packages are removed or added LIDS will have to be updated Most of this can be easily accomplished using the GD WebTool application If you wish to do administration of LIDS from the console you will need to use the lidsadm program Using the commands described in the previous section we will remove add and update files on your EnGarde system Before any administration can be done you must first turn off LIDS Turn LIDS off only on your session Unless you are working in multiple sessions and feel safe leaving your system unprotected for the time lidsadm S LIDS Now with LIDS disabled you can proceed with your work 9 3 1 An Example Protecting a Freshly Installed Package For this example we added a package called my_package rpm my_package rpm has a configuration file in etc a binary in sbin a log is kept var log my_package log and stores user datain var lib my_pack age my_package rpm also requires setuid and setgid access Without re configu
246. t be entered A PPTP connection to an EnGarde gateway does not require a phone number here but rather an IP address Enter in the IP address of the EnGarde gateway into the Phone number entry box EnGarde Secure Professional 213 Section 7 3 Connecting From Windows NT 3 5 At this point your new PPTP configuration is complete Hit Finish to write the configuration 214 User Guide VIRTUAL PRIVATE NETWORKING Chapter 7 You will now be returned to the Dial Up Networking section with the option to Dial with your new configuration NOTE The Dial button will not physically dial another computer but makes a con nection to another network via a currently established Internet connection Click the Dial button to connect to your EnGarde Secure Professional server EnGarde Secure Professional 215 Section 7 4 Connecting From Windows 2000 The Connect To dialog will appear Enter in your user name and password you selected when creating the user account on your EnGarde machine Click the OK button Lonnect to MyLonnection Enter a user name and password with access to the remote network domain User name pete Domain I Save password Windows will attempt to establish a connection to your EnGarde machine using PPTP When a connection is established an icon will appear on your task bar and a bubble containing our connection information will appear for a few moments Line speed 10 000 000 bp adra 1206
247. t be used to perform all of the functions listed above it is especially important that you read the User Guide and have a full understanding of each of the services you will be configuring Before following the example below EnGarde should have already undergone initial configuration and be plugged in and operating on a network Information regarding the initial configuration can be found in Section 3 Installing EnGarde on page 12 To obtain a fast and most accurate setup follow the steps in the described order Once you have successfully completed each step proceed in order to the next step There are four primary steps required to configure EnGarde 1 Configure the network interface 2 Configure the DNS Server 3 Configure the Mail Server 4 Configure the Web Server to prepare for normal and secure websites After the initial configuration of your EnGarde Secure Professional system the basic system and networking functions are operating correctly and is ready to configure a sample store We will be configuring our example EnGarde system to use the following initial values entered when EnGarde was configured Hostname myserver Domain Name mydomain com IP Address 192 168 1 70 Netmask 255 255 255 0 Gateway 192 168 1 1 QUICK START GUIDE Appendix A Primary DNS Address 192 168 1 70 Secondary DNS Address 192 168 1 60 In this example we will be creating the domain engardelinux com that will be hosting our DNS routing m
248. ted database and software development packages and support for standards based Internet services EnGarde Secure Professional is also available in pre configured turnkey rack mount Internet servers from Guardian Digital The Guardian Digital Linux Lock box is a highly reliable complete eBusiness solution configured to address space saving considerations at co location facilities ISPs and ASPs Guardian Digital s EnGarde Secure Professional features Browser Based Administration Browser based secure remote adminis tration can be performed using the Guardian Digital WebTool The GD WebTool provides security through a 1024 bit SSL connection and allows an administrator to perform 100 of the functions that could previously only be performed from the command line Guardian Digital Secure Network The integrated Guardian Digital Se cure Network allows organizations to manage the software configuration of their EnGarde Secure Professional installations within their enterprise Web Services All Web functions are controllable through the GD WebTool The creation of thousands of virtual Web sites can be easily managed and maintained High speed Internet Connectivity Connect your office Cable or DSL high speed Internet connection to build an inexpensive corporate presence Gateway Firewall Services The integrated gateway firewall includes the ability to protect organizations from malicious cybervandals and provides a level of ass
249. the item For example if you chose Maximum file size Kb then a value of 250 would be 250Kb or if you selected Maximum Logins then a value of 5 would denote a maximum of 5 logins User Limits The User Limits here will allow you to set what was optional in the previous System wide Limits section on a per user basis Resource Limit Mamtenance Usemame lI a Type Hard 3 tem Maximum Core Size KB Value f Create Fill out each entry box first with the name of the user followed by the Soft Hard option item and value as described in the System wide Limits section prior to this Group Limits The Group Limits allows you to set everything like you did in the User Limits section but the changes effect an entire group instead of a single user Refer to the System wide Limits section for a description of each field EnGarde Secure Professional 131 Section 4 4 System Management Group hsers 4 Type Hard Item Maximum File Size KB Value 115000 Remove Limit Save Limit 4 4 12 Change System Time This section allows you to change the current system time or synchronize it with an Internet or designated local time server Changing the time is controlled by pull down menus Select the current time and hit Set System Time for the changes to take effect Normally system time will be accurately controlled with the network time services and manually setting it is not necessary Day Date Month Year H
250. the system level resources necessary to switch between this process and others running on the system It is easily visible to a system administrator by use of the ps command In the GD WebTool Section 4 you will find detailed instructions on viewing and deleting processes via the WebTool pptp See Point to Point Tunneling Protocol protocol A predefined standard for transmitting data between two devices proxy server A program that deals with external servers on behalf of internal clients Proxy clients talk to proxy servers which relay approved client requests to real servers and relay answers back to clients Point to Point Tunneling Protocol A secure protocol for transmitting data nec essary for a Virtual Private Network VPN over the Internet Post Office Protocol A protocol for retrieving e mail Also refered to as POP3 version 3 it downloads all new e mail messages from the server and stores them locally on a users machine reverse zone See forward zone root Root is the superuser of the system Generally the system administrator will login with root privileges to administer the system You can not login remotely as root only from the console It is not recommended to login as root unless you need to since accidental errors can be easily made samba A client server for non Windows based system integration into Windows File Sharing and Printing system 300 User Guide GLOSSARY Appendix F SCSI See Small Computer
251. this site Usemame nickd Password lot ckatbor Address Here you can enter the IP address of your new virtual host You are allowed to have multiple virtual hosts on one IP address The main reason to do this is so you can host many sites without the need to register more IP addresses The Web server will know how to differentiate between the different virtual hosts when they are requested Administrator E Mail This will be the default e mail address that will be dis played to a user who receives an error Setting this to the owner and or system administrator of the virtual host is recommended Server Name This will be the name of the server Enter in a valid FQDN Webmaster This is the user who will own all of the files for this Web site You can choose a user by clicking on or you can type an existing user name in this box Group This is the group that will have access to all of the files for this Web site You can select an existing group by clicking on or you can type an existing group name in this box If you wish to create a new group click on the Create Group button and create a new group You can then select this new group using the group chooser by clicking on Create a database for this site If this box is checked a database will be created for use with this site You must enter a user name and password for access ing the database below EnGarde Secure Professional 57 Section 4 3 Virtua
252. tion with dozens of EnGarde Secure Professional servers your security needs are just as important A security system that is out of date leaves you more sus ceptible to cybervandals Maintaining system security keeping up to date with the latest software improvements and obtaining access to technical support has been difficult until now Guardian Digital s Secure Network is a means to keep your systems updated while at the same time receiving authoritative advice information and additional ser vices from the experts As you focus on building your Internet presence Guardian Digital experts focus on assuring you are protected from cybervandals and devel oping system improvements Guardian Digital has a dedicated group of security experts that both monitor security sources on a constant basis to identify potential vulnerabilities as well as actively audit the core components of EnGarde improv ing the overall security it provides Guardian Digital Secure Network is the least expensive way to add dedicated se curity experts to your staff focused on keeping your systems secure and up to date This vigilant approach to system security and management is the most effective means to protect your corporate assets and remain up to date Protect your investment and lower support costs while at the same time improving the security and functionality of your EnGarde servers The Guardian Digital Secure Network is available as a monthly or annual subsc
253. to control the interface Static Interface A static interface consists of pre defined network settings that are restored upon each reboot If this machine is to be a router gateway or server this option is probably for you Simply select the Use a static EnGarde Secure Professional 117 Section 4 4 System Management address check box enter in your IP address and netmask and save your settings by clicking the Define Interface button A static interface consists of pre defined network settings that are restored upon each reboot If you are in a small office or on a LAN this is probably the option for you Simply select the Use a static address checkbox enter in your IP address and netmask and save your settings Use a static address IP Address 192 168 100 100 Netmask 255 255 255 090 Dynamic Interface DHCP DHCP is the Dynamic Host Control Protocol If you select the Use DHCP to obtain network settings check box then the machine will attempt to contact a remote DHCP server to obtain its network settings If you are on cable modem or a LAN that uses DHCP to delegate IP addresses this is probably the option for you Dynamic Interface DHCP DHCP is the Dynamic Host Control Protocol If you select the Use DHCP to obtain network settings checkbox then the machine will atterapt to contact a DHCP server to obtain its network settings If you are on cable modem or a LAN that uses DHCP to delagate IP addresses this is probab
254. too If you wish to download OpenSSL you can find it at http www guardiandigital com tools A version of OpenSSL and OpenSSH are included on the EnGarde CD ROM If you are using Windows use the included MindBright MindTerm software You can find it on the EnGarde CD ROM under the dosutils directory Instructions on installation and usage can be found in the previous section 6 2 1 Using OpenSSH The first thing you will have to do is create a user This is either done by logging in as root at the console and running adduser or adding a user from the GD WebTool utility If you use the GD WebTool utility to create the user read Section 4 4 1 User Ac count Administration on page 77 on how to accomplish this If you decide to create the user from the console use the following steps As the root user run adduser by typing adduser at the prompt adduser will prompt you for a user name Enter the user name you wish to give this user Once this is done you will be back at the prompt You now need to give this user a password for them to use to access their account Type passwd username In place of username will be the user name you assigned to the user This will prompt you for a password and then prompt you again for the password to confirm it Once that is done install OpenSSL and OpenSSH on your client machine NOTE You must be root during the installation of OpenSSL and OpenSSH On distributions using RPM rpm Uhv openssl1 0 9 4_1386
255. trl Shift X Closes all windows and exits MindTerm Note that when closing windows without logging out you are aborting the SSH connection abnormally i e it is advisable to logout in the shell before closing exiting MindTerm Edit Note the system clip board is not available to applets by default In this case a local to MindTerm clip board is used Also note that in some im plementations of the Java runtime the clip board does not work with the system clip board Copy Ctrl Ins Copies selected text to clipboard Selection is done by clicking and holding down left mouse button while dragging the mouse over the area to select Paste Shift Jns Pastes the contents of the clipboard to the terminal as input i e would be the same as if typed from keyboard Copy amp Paste Does a copy followed by a paste EnGarde Secure Professional 191 Section 6 1 Connecting from Windows 9x ME NT 2000 Select All Ctrl Shift A Selects all content in scroll back buffer and in terminal Note this operation is very time consuming right now Find Ctrl Shift F Shows Find dialog from which the scroll back buffer and terminal contents can be searched for words The search can be done case sensitive or case insensitive Each word found is highlighted The bell is sounded when no more matches is found Clear Screen Clears screen and sets cursor position to upper left corner Clear Scrollback Clears contents of scroll back buffer VT Reset Resets ter
256. u add an or activate and interface at a later time you can configure it in the Firewall Setup module Service Configuration Below you are asked to define what services you would like active on this machine Currently enabled services are already checked uncheck them to disable them Service Name Enable Service Firewalling FTP Server Web Server Domain Name Server Mall Server SIMAP Server SPOP3 Server User Password Changer NOTE Domain Name Server and Firewalling must be enabled to allow broad band connection to work properly Additional information concerning PP PoE DHCP and broadband usage can be found in Sections 4 4 8 and 4 4 9 Email Configuration EnGarde Secure Linux produces nightly report summaries and other system re lated information This information can be sent via e mail to the system s admin istrator Enter the e mail address you wish to receive these reports at in this field Firewall Configuration Since the firewall package has been installed you must configure your trusted internal and untrusted external interfaces A list of all your interfaces will be in each of the pull down menus EnGarde Secure Professional 49 Section 3 5 The Initial Configuration Process Service Configuration The Service Configuration will give you a list of all the services available on your EnGarde Secure Professional machine and the option to enable or disable them To enable a service click o
257. u more control over your system By setting the capa bilities to your needs you can prevent all users from rebooting the system mounting and unmounting disks changing network settings dev control ownership control loading and unloading of kernel modules and many oth ers Root has the ability to turn LIDS off locally for just the current session or globally This can be configured so it can only be done locally and or remotely It also requires a password which is protected by Ripe MD 160 encryption EnGarde Secure Professional 247 Section 9 1 Introduction to LIDS e A built in port scanner allows you to disable promiscuous mode and still detect port scans e All attempts on the system are logged and if any user tried to break one of the LIDS rules an e mail is immediately sent to a predefined e mail address A cell phone or a pager can be configured to be alerted when this happens also so you know when someone is making an attempt on your system Some minor drawbacks to this increased method of security is it could hinder the use of certain programs by denying them access to needed files if configured incorrectly It also makes it more difficult to administer the system from the con sole but the included GD WebTool includes enhancements that integrate will with LIDS 248 User Guide THE LINUX INTRUSION DETECTION SYSTEM LIDS Chapter 9 9 2 Using LIDS LIDS be default is always running on your EnGarde system If you wil
258. u_f ailed log You can find console logins inthe var log audit pam log which will contain all successful and failed login attempts from the console Section C 2 Basic Bash Commands C 2 Basic Bash Commands Bash or the Bourne Again Shell is the successor to sh Bash is the default system shell you will be using to interface with EnGarde when you login via SSH or the console Here we will cover some basic commands for moving around the system and doing some minor work If you will be doing most of your editing from the command line we highly recommend picking up a book on using bash or general Unix commands NOTE You will find bin sh on your system It is really a link to bin bash This is done for compatibility reasons C 2 1 Moving Around the System When you first login you will be sitting in your home directory Most likely home username You can get a listing of the directory contents by typing SS or for a long view of the listing with time stamps file permissions and file owner ships type 1s l You can move from directories by typing cd directory name cd by itself will bring you back to your home directory Directories are referenced with a slash being the root directory So to go to the etc directory you simply type cd etc to reference the current directory we use a single period and to reference the previous directory we use two periods So if you are in your home director
259. uardiandigital com Webmaster nick Group admin J Create Group Enable Webmail ves No Organization Name Guardian Digital Ine Domain Name quardiandigi tal coni IMAP Server a ocalhost SMTP Server Rocalhoat Create SSL Virtual Host Since the virtual host fields were explained in the previous section Creating a Virtual Host only the Webmail Setup will be discussed here Webmail Setup Webmail is an interface that allows a user to read their e mail via the web in their browser Webmail will connect to your mail server via an IMAP connection for receiving and SMTP for sending mail It will format messages into HTML for the user to view and respond to in their browser Enable Webmail Selecting Yes here will enable Webmail for this Web site If this is already set to Yes then by setting it to No you will remove the existing Webmail services including the configuration file and profiles Organization Name This organization name will show up on several Webmail screens EnGarde Secure Professional 59 Section 4 3 Virtual Host Management Domain Name This is the domain name that all outgoing e mail will be from IMAP Server This is the IMAP server that the Webmail system should connect to This should be kept as the default Localhost unless you want to connect to an external IMAP server SMTP Server This is the SMTP server that all outgoing webmail will go to This should be kept as the default Localhost un
260. uch is your data worth Does it make sense to protect your system with the level of security you might find protecting Fort Knox or would that cost more than the data itself Guardian Digital provides an extremely functional e commerce server while still retaining all the reliability configurability and scalability you have come to expect with the Linux operating system 2 3 Security Planning and Policy Assessing risk and making prudent decisions before the system is installed is the best approach You can go a long way towards providing good security by es tablishing a security policy A security policy is a written document that outlines what is permitted behavior on the system Once written it is reviewed periodi cally and distributed to all users of the system No system can be fully secure but with due diligence and attention to detail many security threats can be mitigated 10 User Guide GENERAL SECURITY Chapter 2 Linux is not susceptible to viruses in the strictest sense of the word no pun in tended but permitting content to enter the system that has not explicitly been authorized will surely lead to problems Guardian Digital s EnGarde Secure Professional has been engineered with the greatest degree of security available on any Linux Open Source e business server to date No longer is it the case that a company can purchase or contract an e commerce solution without great concern for the assurance and integrity for the d
261. umentation in the From field and type in documentation in the To field NOTE When setting up an alias the path is relative to the document path setup in the Web server A Redirect maps an old URL into a new one The new URL is returned to the client which attempts to fetch it again with the new address The browser is aware of this new address and will be visible to the user in the URL location field in their browser This could be useful if you wish to point the user to another server An example of this could be if you are moving a page http www guardiandigital com documentation october to another directory on your web site In this example we are redirecting docu ments dated from October to the archives section of the website http www guardiandigital com doc archives Using the example given above you would need to type in documentation october in the From field and doc archives in the To field 64 User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 NOTE As with aliases above the redirect paths are relative to the URL Aliases and Redirects For lockhbox g Document directory aliases From To r 2000 documentation documentation URL redirects From To ocumentation october doc larchives Hopefully you have a clearer understanding between the differences of aliases and redirects In this section you will see two fields Document directory aliases and URL redirects Document directory
262. uotas Group Quotas foot idevihde1 orre mra Edit 4 Jdev MdeS T ra enekbet Edit ar Jeeves Insatt insattes Edit Mome Jev Melt headend heetbot Bait ga is a listing z the quotas currently enabled Usersigroups with a grey highlight are currently over their quota and in their grase period e Usersigroups with a red highlight are currently over their quota To enable filesystem quotas on one of your partitions or to change the partitions options click the Edit link associated with the partition you wish to make changes to and you will be brought to the following screen EnGarde Secure Professional 127 Section 4 4 System Management Here you have two pull down menus Each option is to enable or disable group and or user quotas When you have made your selection s click the Save Changes button to have the new changes take effect w are the current quota settings for thi stem The WebTool will atternpt to remount ome with quotas enabledidisablee but should it not suceced you must reboot your system for these changes to take effect Partition dev hafs Mount Poimt home User Quotas Enabled 3 Group Quotas Enabled 3 Save Changes When finished making changes click Save Changes and you will be returned to the previous screen You will notice now your enabled filesystem quotas are listed for the selected partition in the Existing Filesystem Quotas section Currently you have enabled quotas for the selected partition
263. urance that its assets are secure The port forwarding func tionality provides small organizations with the ability to redirect Internet service requests to servers within the internal network Network Address Translation provides security by masquerading requests by internal clients for Internet services as well as enabling organizations to use a single IP address for all their internal workstations to reach the Internet Intrusion Detection and Prevention The intrusion detection features will detect and notify you of possible threats and security related events User Guide INTRODUCTION Chapter 1 System Logging and Auditing Extensive logging is performed to insure that you have the latest system information e Host Security Security of the host itself has been significantly increased Enforcement of longer user passwords control of expiration dates and uti lization of the latest in advanced forms of password encryption close one of the most common and easily exploitable means of intrusion Electronic Mail Server The included e mail server has been engineered to provide security and stability and can control e mail for hundreds of do mains with the click of a mouse Mail can then be retrieved in a secure format using conventional mail clients Additional security improvements have been made including protection from common threats as well as re stricting unsolicited e mail e PHP Embedded Scripting The PHP HTML embedded scri
264. used with FTP tunnels don t enable this if you are not sure what you are doing Real ip address of SSH server if it is behind address translation used when portftp is enabled Address to listen on for local tunnels Sets whether to verify identity of the SSH server using its host key through matching with saved value in the file known_hosts Force allocation of PTY e g necessary to nable when executing a single command on the SSH serverthat requires a non dumb terminal Used to force the local outgoing port of the connection to the SSH server to use a so called privileged port i e lt 1024 Enables hosts other than the one running indTerm to connect through SSH tunnels Terminal Ctrl Shift T In this dialog you can set the basic terminal parame ters such as terminal type size font and colors The initial window position can optionally also be set It is given as a string with the syntax lt gt lt x position gt lt gt lt y position gt a negative sign means it s relative to the right or bottom A value of zero means aligned to the border i e left right top bottom e g 0 0 means aligned to bottom right corner The parameters set in this dialog are names as given in paragraph 5 te Terminal type EnGarde Secure Professional 193 Section 6 1 Connecting from Windows 9x ME NT 2000 gm Terminal geometry number of lines columns and optionally initial position fg Foreground color n
265. username Password This is the users password Please note that this is kept in cleartext on the machine Once you are returned to the main menu the user will appear there You can now add another user or edit a user by clicking on their username From the edit menu you can delete the user WORKGROUP nick SIRSKA Create New User 160 User Guide THE GUARDIAN DIGITAL WEBTOOL Chapter 4 4 7 System Backup Backing up your system is one of the most crucial roles of system administration The system backup section allows you to completely backup all characteristics of your system You can backup configuration files user home directories define your own backups or backup the whole system from here Welcome to the System module w pou can dle ups execute backups and restore backups Click on the help link below for general help on this module System Backup Configuration Define the backup method and configure named backups Perform Directory Maintenance initialize the system backup software Create a New Backup Execute a backup immediately Restore a Backup Select a backup to restore View Changes Since Backup See what files have been removed and altered System Backup Help View the help page for this module 4 7 1 System Backup Configuration The System Backup Configuration menu contains general configuration options and your backup options EnGarde Secure Professional 161 Section 4 7 System Backup Backup Method Bac
266. ut this example with the assigned drive letter of your CD ROM drive From a prompt type the following C gt x dosutils rawrite exe f x boot boot img d a Once this has completed your boot floppy is ready for use B 2 Rescue mode EnGarde Secure Professional includes a rescue mode in the installer Rescue mode will boot up a working Linux system off of the EnGarde CD ROM and allow you to trouble shoot your system 272 User Guide ADVANCED INSTALLER ISSUES Appendix B Rescue Mode can be accessed by typing in rescue or linux rescue at the LILO boot prompt Rescue mode requires that the EnGarde CD ROM be in the drive regardless if you are booting from the CD or a boot floppy The rescue system is located on the CD WARNING Rescue mode is for experienced Linux users only An existing En Garde installation can possibly be damaged if used improperly Once the system boots you will have a working Linux system which includes many programs to help you recover your system To reboot from rescue mode simply make certain all your hard drives have been unmounted and simply press CTRL ALT DEL and remove all bootable media from the machine B 3 Automatic partition scheme When selecting Automatic Partitioning the installer will partition up your drive with predefined rules Here is how the installer decides how to break your drive up e root will be 25 of the drive but no less than 320MB and no greather than 2048MB
267. word It will store the password in Ripe MD 160 encryption sbin lidsadm S Switch LIDS on off and capabilities 250 User Guide THE LINUX INTRUSION DETECTION SYSTEM LIDS Chapter 9 sbin lidsadm r View current status of LIDS sbin lidsadm h Help The next section will contain more detailed information about the lidsadm options 9 2 2 Adding an Entry Using this option allows you to add a new item to the LIDS config You have the options to add a single file with an attribute give a file permission to override another files permissions and change the capabilities of a file lidsadm A s subject o object t j TARGET To protect a file enter the filename and path using the o flag followed by the attribute READ WRITE IGNORE DENY or APPEND under the j attribute If your object is a capability setting you need to use the t flag to tell lidsadm it s a special option s is used to point the object to a subject In the case of capabilities you are pointing a capability to the subject or giving the subject the capability Same idea with file protections If you deny access to a file but want the subject to use it you point to the denied file object to the file to give access to subject then tell it what kind of access to give it 7 Here s an example of protecting a file lidsadm A o path to protected_file j DENY Now to give a binary full access to the file that was denied to everyone else lidsadm
268. y This will scan the drive for physical damage before using it If it finds a bad portion of the disk it will ignore this portion when writing the filesystem 20 User Guide INSTALLING ENGARDE SECURE PROFESSIONAL Chapter 3 NOTE Running the disk integrity test can be very time consuming depending on the disk size Step 3 Mount Point The last step of creating a partition is defining where the partition will be mounted on the system You will need to type in the full path of the partition You can also choose to make this partition a swap partition by selecting the swap partition check box NOTE If you choose to make the partition a swap partition anything typed into the entry box will be disregarded Step 4 Completion of a Partition After selecting the mount point you will be returned to the main screen You will see the partition you just created in the partition listbox Once a partition has been created you can e Continue with the installation e Add more partitions e Delete the partition EnGarde Secure Professional 21 Section 3 2 The EnGarde Secure Professional Installer e Edit the partition To delete a partition move to the partition listbox by using the tab key Highlight the partition you wish to delete by using the arrow keys on the keyboard Then using the tab key select the Delete button to delete the partition The partition will be removed from the listbox and its space will be allocated back to the
269. y and you want to go to a different users directory you can type 276 User Guide GENERAL LINUX Appendix C cd images different user which is equivalent to cd home different user At any point using the TAB key after typing a few characters in at the bash prompt will make bash fill in the rest of the file or directory name that matches what you have typed If there is more than one match tap the tab key twice and it will list all the matches C 2 2 File Manipulation There are many ways to alter files on your system You can copy delete move change attributes etc Here is the three basic file manipulation commands cp rm and mv gt Copy remove and move They are used as follows cp filel file2 ex cp home nick new_httpd conf etc httpd conf httpd conf rm file ex rm home nick new_httpd conf mv filel file2 ex mv home nick new_httpd conf etc httpd conf httpd conf You also have control over the attributes and ownership of a file Running chown and chgrp you can change the files ownerships chown nick html chgrp nick html The above two commands will give user nick complete ownership over every html file in the current directory You can shorten the above command by typing chown nick nick html This changes both the ownership and group in one shot You can change the file permissions using the chmod program By typing chmod 644 html That will change the access to
270. y issuing a lidsadm L will present you with a list of all the items in the configuration and their attributes You must have lidsadm turned off to use this option Now the entire package is done Reload the config into LIDS and finally enable LIDS again 256 User Guide THE LINUX INTRUSION DETECTION SYSTEM LIDS Chapter 9 lidsadm S RELOAD_ CONF lidsadm S LIDS Now you are ready to go When LIDS is initially configured for EnGarde a script was created that contains all file attributes This script can be run at any time to reset you back to the system defaults Additionally you can create your own script file for any additions you make This makes it much easier if you make a mistake and have to start over from scratch A simple command to launch your script will put you back where you were instead of typing everything back in If you are using the GD WebTool this is already done for you The script can be something basic here is a sample script using the example above bin bash LIDS configuration 9 13 00 Configuration for my_package rpm lidsadm A o etc my_package conf j READ lidsadm A o var log my_package log j APPEND lidsadm A o var lib my_package j DENY lidsadm A s sbin my_package_binary o var lib my_package j IGNORE lidsadm A o sbin my_package_binary j READ lidsadm A s sbin my_package_binary o CAP_SETUID j INHERIT lidsadm A s sbin my_package

Download Pdf Manuals

image

Related Search

Related Contents

Mise en contexte Mode d`emploi Composition du formulaire Types  Detector de Gas con Dispositivo Antisísmico  USER MANUAL - Global Mining Products  Descargar manual de instrucciones  Villavent  取扱説明書  Sony UNIONEP520C7 surveillance camera  Navigator G2 -Bedienungsanleitung - TRIUS  Manuel “Implémentation et suivi du VAP bundle”  Maytag M3DH30B2A Dehumidifier  

Copyright © All rights reserved.
Failed to retrieve file