Do you have a question about the Sentry and is the answer not in the manual?
Questions and answers
Summary of Contents for Fitzgerald & Long Sentry
Page 1
SENTRY The Integrated Security System Release 4 User Guide Fitzgerald & Long 12341 E. Cornell Avenue, #18 Aurora, Colorado 80014-3323 USA Phone: (303) 755-1102 FAX: (303) 755-1703...
Page 2
NOTICE The information contained in this guide is subject to change without notice. Fitzgerald & Long, Inc. shall not be liable for technical or editorial omissions made herein; nor for incidental or consequential damages resulting from the furnishing, performance, or use of this material. This guide contains information protected by copyright.
SENTRY User’ s Guide USING THIS GUIDE The SENTRY User's Guide is comprehensive in its descriptions of all of SENTRY's menus, data entry screens and reports. The Guide follows the same structure as the SENTRY menu system. There are four major sections in SENTRY. These are: 1.
Page 6
Introduction - 2 SENTRY User’ s Guide PI/open the command prompt is indicated by a colon “:” while for uniVerse the prompt is a greater-than sign “>”. Fitzgerald & Long...
DEPARTMENT = “MIS” USER.NAME HELP Enter the word HELP at any input prompt in SENTRY. A HELP screen will be displayed containing a brief explanation of the expected input and syntax where appropriate. Press <RETURN> to exit the HELP screen.
Page 8
When you wish to delete the data in a field and make the field null, address the field using the appropriate line number, then enter a space followed by <RETURN>. A blank (null) field will be displayed. Fitzgerald & Long SENTRY User’ s Guide No data appearing on the...
INSTALL SENTRY. Be safe, call us for assistance and instruction on installation. We want to help. SENTRY will require approximately 5 to 10 MB of disk space in one filesystem on your computer. This is an estimate. The actual size will vary depending on the number of files on your system and the cross referencing for those files.
Page 10
9. Now enter the command "SENTRY". You will see a copyright screen which identifies your company and computer system. If there are discrepancies in the data on this screen, please contact us. SENTRY is licensed only for use at the company and on the system described on the copyright screen.
Page 11
4. Utilities Menu Please select one of the above: Figure 1 - Main Menu 11. At this point you are ready to begin loading your data into the SENTRY database. This procedure is described in the following section “Getting Started”. Main Menu 07 AUG 2000 Fitzgerald &...
TCL in another account use the TCL “LOGTO” command. Since SENTRY is a security product, it won’ t allow just any user to use it to modify your system! Only users whose UNIX UID is 0 (zero) will be permitted to enter SENTRY. Users with the UID of 0 are referred to as “super users”...
Page 13
Figure 3 - This screen is displayed immediately after the copyright screen in the previous figure. You will see the second line “You must be super user to use SENTRY” only if your user ID has a UID other than 0 (zero).
Page 14
Introduction - 10 This is a safety precaution. SENTRY is a very powerful tool and should only be used by the System Administrator or his designee. SENTRY is designed to be a single user utility. Therefore, only one user at a time is allowed into SENTRY.
Page 15
Reports Menu will print a variety of useful reports which will allow you to view the data you have collected. The Utilities Menu contains a number of tools which will occasionally be useful. Complete documentation for each menu and selection in SENTRY is contained in the next sections of this User Guide.
4. Utilities Menu Please select one of the above: 1 Figure 4 - This is an example of SENTRY’ s Main Menu which provides access to the four submenus and divides SENTRY into four logical sections. These four selections outline the four logical divisions of SENTRY. Each division is a collection of programs which perform related tasks.
Page 17
The third selection on SENTRY's Main Menu invokes the Reports Menu. This submenu provides access to reports. These reports describe all aspects of the SENTRY database from the perspectives of system, users, groups, permissions, access violations and SENTRY protected database commands.
1. INTRODUCING THE DATABASE CREATION AND VALIDATION MENU The first selection of SENTRY's Main Menu is Database Creation and Validation. This menu provides access to programs which will build SENTRY’ s database from your existing user, group and file system data. SENTRY 1.
1.0 DATABASE CREATION AND VALUDATION MENU This is the first submenu accessible from SENTRY's Main Menu. It is also the first selection you will make after installing SENTRY. Through this menu, you will execute programs which load all the UNIX passwd and group information on your system into SENTRY's database.
Figure 7 - This is an example of the “SENTRY Database Load” screen. Enter “OK” to execute the program. This is the first program you will execute after SENTRY is installed. After the initial upload you will use this program on a regular basis to insure that SENTRY is consistent with your UNIX files.
Page 23
Because every site is unique, please discuss your system requirements with us if you are undecided about the frequency with which you should be uploading (recreating) the SENTRY database. The program that loads the UNIX passwd and group data into SENTRY can be run outside SENTRY’ s menu system, in “batch” mode.
To execute as a background job enter: PHANTOM SENTRY.FILE.LOAD (BATCH) You must be in the “sentry” directory to execute this job. Therefore, if you plan to use cron, the cron process must “cd” into the “sentry” directory BEFORE executing the command.
This program is used to check the consistency of the users, groups and permissions which have been loaded into the SENTRY database via the first two programs described in this section. user IDs, groups, and their usage in the file system are analyzed and inconsistencies are reported. For example, the validation report might point out a file whose owner is not registered or a home pathname which does not exist on the system.
Page 26
SENTRY. Others choose to have users manage their own passwords and not to maintain them in SENTRY. If you are not tracking user passwords, the “missing password” messages will be of little use to you.
Page 27
6. “Group XXXXX is not on the SENTRY.GROUPS file.” - A Group name was found in SENTRY’ s control list which does not exist in the SENTRY.GROUPS file. This indicates that one of SENTRY’ s database files is damaged and should be rebuilt. Upload the passwd and group files to fix this problem.
Page 28
“/ZZZZZ”. However, the group does not exist in SENTRY. Possibly, the group once existed but has been deleted. The group for this disk object should be replaced with a valid group on the system. Alternatively, a new or existing group could be assigned the same group number (GID).
Through the data entry programs you may quickly access an unwanted group and remove all references to it. When SENTRY is used to remove a user ID, references to that ID are removed. SENTRY provides the maintenance link between the file system permissions, the passwd file and the group file.
Section 2 - 2 2.0 DATABASE MAINTENANCE This is the second sub-menu accessible from SENTRY’ s Main Menu. It is the menu you will use to make changes to the SENTRY database. You may create or modify users, groups and permissions through this menu.
Page 33
6. User Defined Items. This is a special SENTRY feature which allows you to define SENTRY security objects. These objects may be accessed through subroutine calls to solve unique security problems which may not be met through permissions and VOC item security facilities.
System Profile from the secondary Maintenance Menu. When this program is executed, the profile data will be read from the SENTRY database and displayed in the appropriate fields. There are 18 items defined on this screen. A detailed description of the data entry screen and prompts follows.
Page 35
SENTRY data entry programs you will be REQUIRED to enter a password for the user or allow SENTRY to generate one for you if this field is set to “N”. This is not a UNIX parameter.
Page 36
“LC”. This parameter is intended to assist System Administrators who wish to be consistent in their usage of case when creating users and groups. If you do not want SENTRY to alter the case for users and groups set this field to “LIT” (literal). SENTRY will not alter the characters you have entered. The default and recommended value for this field is “LC”...
Page 37
“wtmp” which contains a log of user logins. The UNIX accounting feature which updates “wtmp” may be turned on and off. SENTRY has no way of knowing if accounting is turned on or not, so it looks for recent activity in the “wtmp” file. If no activity is found in the file during the last number of days specified in this parameter, SENTRY assumes that accounting is turned off and doesn’...
Figure 13 - This is an example of the ”Custom User Default Maintenance” data entry screen. To execute this program, enter “1” System Profile Maintenance from the Main Sentry menu, after recalling an exiting user or entering a new user you may enter “C” at the bottom prompt. Entering “C” invokes this program.
Page 39
SENTRY User’ s Guide Section 2 - 9 1. Minimum password change (days): Enter the number of days before a user is allowed to change his existing password. For example, if UNIX has just expired a users password and the user enters a new one, you can use this parameter to prevent the user from resetting his password to the old one for the number of days you specify.
Payroll department, get his name and telephone number and call to inquire what process he is executing. To execute this program, select 2. Database Maintenance Menu from SENTRY’ s Main Menu; then, select 2. User Maintenance from the Database Maintenance Menu. The User Maintenance program will be invoked.
Page 41
Section 2 - 11 SENTRY database using the user’ s name, enter “@” followed by the first or last name of the user. For example, if you wanted to search for user IDs for Peggy Long, you could enter “@long”. If there were more than one “long”...
Page 42
“pick” list. The name of the group will display in parentheses to the right of the file. If you enter an “N” SENTRY assumes that you wish to create a new group. The next available GID will be assigned and you will be prompted to provide a Group Name.
Page 43
Figure 15 - This is an example of the ”Custom User Data Maintenance” data entry screen. To execute this program, enter “2.” User Maintenance from the Main Sentry menu, after recalling an exiting user or entering a new user you may enter “C” at the bottom prompt. Entering “C” invokes this program.
Page 44
(where the user was a file owner) and later reassign that old user’ s UID to a new user. It is possible that the new user would then have access to files he should not be allowed to use. SENTRY will notify the System Administrator of this issue when a user ID is deleted.
Page 45
(Figure 16). Enter “A” to view this list. In the following screen note that SENTRY displays a list of all files owned by this user. This is a scrolling window if there are more files than can be displayed on one screen. User “F” or “B” to scroll forward or backward.
Page 46
File System maintenance screen. To select this global change option, enter “C”. SENTRY will display the file pathname and it’ s progress through the list of files. Here is a sample of the screen SENTRY displays when this choice is invoked (Figure 19).
Page 47
In summary, the User Maintenance screen allows you to create new users, modify existing users and delete users. Remember that file ownership is linked to users via the UID. SENTRY will advise you when deleting a user will cause a file to have an “unregistered” owner.
GID for a user or a supplementary group. To execute this program, select 2. Database Maintenance Menu from the SENTRY main menu then select 3. Group Maintenance from the Database Maintenance Menu. This program will be invoked.
Page 49
If you have only changed or added a description, this is not stored in the UNIX file and there is no need to update UNIX. Entering “DIS” will cause SENTRY to display a list of users who are members of the group which you have retrieved from the SENTRY database. SENTRY will display the following screen.
Page 50
It is possible the users in the new group would then have access to files they should not be allowed to use. SENTRY will notify the System Administrator of this issue when a group is deleted.
Page 51
File System maintenance screen. To select this global change option enter “C”. SENTRY will display the file pathnames and its progress through the list of files. Here is a sample of the screen SENTRY displays when this choice is invoked (Figure 25).
Page 52
Section 2 - 22 SENTRY User’ s Guide D) Do not delete this group. This option allows the user to return to the main Group Maintenance menu without altering the group or the file system. No changes are made. To select this option enter “D”.
With this program you may change owners, groups and the permissions for any file or directory in your file system. With Sentry’ s extensive B-tree system of cross references, you may use this program to locate the path to any object on your system.
Page 54
Note the “d” to the left of the permissions string defines which entries are directories. Next enter “EXP”. SENTRY will repaint the screen displaying the contents of the targeted subdirectory. To move from a subdirectory to one level “up” use “I”mplode.
Page 55
/usr/spool/cron/crontabs/peggy bottom Figure 28 - This is an example of the cross reference list SENTRY provides through the General File Utility screen. To invoke the cross reference function, enter “@”. From the cross reference display, you may choose many of the standard commands. For example, to go to the directory containing one of the displayed files, position to that line and enter “I”...
Page 56
If the file is not a standard UNIX type SENTRY will report it as “Unknown File Type”. In the right top half of the screen SENTRY displays the I-node number and the number of links plus three date/time stamps. The following paragraphs are quoted from UNIX documentation for these three dates.
Page 57
1. Owner - SENTRY displays the UID of the file owner plus the user ID (may be more than one) for the displayed UID. To change the owner, enter “1” followed by <RETURN>. You will be prompted “Enter the user to be the file owner”.
There are not defaults (as there were with ACL implementation on the Prime). Sentry provides a data entry screen to allow you to create and modify ACLs. To access this data entry screen, invoke the second selection from the Main Menu, “2. Database Maintenance Menu”. For the Database Maintenance Menu select number four "4.
Page 59
To change the owner of this file enter the field number (which is located to the left of the field label) “1” followed by <ENTER>. Sentry will then prompt you at the bottom of the screen “Enter user to be the file owner.”...
These are the rights available to this user for each item displayed. SENTRY will evaluate the owner and group to determine if either set of permissions apply to this user. If Fitzgerald & Long...
Page 62
Fitzgerald & Long SENTRY User’ s Guide 14:34:37 18 AUG 2000 (32 entries.) .elm .profile .profile.orig .rhosts .sh_history .ustk_root .uvhome IDMERROR.console IDMERROR.pty-ttyp3 Mail SYSBCKUP exl_usr hp-ux...
Page 63
SENTRY User’ s Guide FILE.MANAGER Path : / Access shown for group piadm (9) top... --> drwx------ -r--r--r-- -r--r--r-- -rw------- -rw-rw-rw- -rw-rw-rw- -r--r--r-- -rw-rw---- -rw-rw---- drwx------ -rwxr-xr-x drwxr-xr-x drwxr-xr-x drwxr-xr-x drwxr-xr-x -rwxr-xr-x -rwx-----x Enter the group name or GID to view (@ for X-ref).piadm Figure 31 - This is an example of the permissions in force for group “piadm”.
2.5 COMMAND MAINTENANCE This program is used to update protection of VOC items in uniVerse, PI/open and UniData accounts. It is also a convenient means of reviewing the existing protection (created by SENTRY) which may be in effect. COMMAND.MAINT Account Name : /usr/sentry.dev VOC Command 1.
Page 65
Account Name - Enter the full pathname for the account containing the VOC item you wish to protect. SENTRY will search for the account. If it is not found on the disk, you will be prompted to re-enter the account name. This field is NOT cross referenced.
Page 66
4. Users - Enter the user ID for which you wish to define protection rights. The user ID must already exist on the SENTRY database. Type “@ name” for a listing of all user IDs having “name” in their user name.
Page 67
<RETURN> will position you at the Account Name prompt. A <RETURN> at this prompt will cause SENTRY to return to the Database Maintenance Menu. Enter Line # of Groups (or Users) (1-N), "A"dd, "F"orward or "B"ack Page: - When using the Groups or Users windows, you will see the prompt “Enter line # of Group (or User) (1-n) or (A)dd”.
Section 2 - 38 2.6 USER ITEM PROTECTION MAINTENANCE This is a special SENTRY feature which allows you to define SENTRY security objects. These objects may be accessed through subroutine calls to solve unique security problems which may not be met through permissions and VOC item security facilities.
Page 69
VOC in the account where users will be executing the call. If you wish to use an account other than SENTRY you must first create a file in the desired account called "SENTRY.USER.ITEMS". SENTRY will search this file first (if it exists) for your User Item.
Page 70
ID simply type over the existing entry. 4. User Rights - If you enter a new user ID (which is not in the current list) in this screen, SENTRY will prompt you for the rights. Enter the access rights for the user. Rights must be specified for each user named.
Page 71
SENTRY User’ s Guide Section 2 - 41 To save changes you have made to the User Items, enter "F" to file. After filing or deleting a User Item, the screen will be repainted and you will be prompted for a User Item name. To enter another Account Name press <RETURN>.
Page 72
Section 2 - 42 SENTRY User’ s Guide Enter Line # of Groups (or Users) (1-N), "A"dd, "F"orward or "B"ack Page: - When using the Groups or Users windows, you will see the prompt "Enter line # of Groups (or Users) (1-n) or "A"dd. If there are more than five entries in a window, "F"orward page or "B"ack page will be appended to this...
SENTRY Command and User Item protection. Although system wide reports for users, groups, and permissions are not readily available through UNIX, SENTRY provides reports from several perspectives; showing all users, groups, and their relationships. Additionally, SENTRY's Command Protection entries are also reported.
Figure 35 - All reports are executed through this report menu Through these selections you may print comprehensive reports describing your system's users, groups, and their relationships, plus the SENTRY Command Protection reports (selections 4 and 5). The first selection is System Profile.
Page 75
A list of accounts where that command is protected is displayed. Choosing selection six, Access Violations, prints the SENTRY Violations Log. Entries are printed in chronological order. Each record includes date, time, port number, USER ID, pathname and the protected command which was executed creating the violation.
SENTRY data entry programs you will be REQUIRED to enter a password for the user or allow SENTRY to generate one for you if this field is set to “N”. This is not a UNIX parameter. It is used only by SENTRY.
Page 77
Password Format Mask - This field is used by the User Profile data entry screen if you use SENTRY’ s generate new password option in the password field. If you plan to use this functionality you may select a “mask” of either ALPHA or ALPHANUM which generates either alphabetic or alphanumeric passwords.
Page 78
“LC”. This parameter is intended to assist System Administrators who wish to be consistent in their usage of case when creating users and groups. If you do not want SENTRY to alter the case for users and groups, set this field to “LIT” (literal). SENTRY will not alter the characters you have entered. The default and recommended value for this field is “LC”...
Page 79
ID. Most UNIX systems allow up to 8 alphanumeric characters. This field is used by the User Profile data entry screen to limit the length of user IDs created through SENTRY’ s data entry screen. The recommended and default value is 8.
Page 80
Special characters such as “.” and “-” or “_” are used in file or directory names to make a compound name more readable. SENTRY’ s B-trees will use the set of characters defined here to break out the components of a compound name such as “payroll.ledger”. This file would be indexed on the word “payroll”...
SENTRY User’ s Guide 3.2 USER PROFILES The SENTRY User Profile Report displays all parameters in effect for each user registered in your system. Additionally such information as the users name, department and telephone may be added to the system data.
Page 82
This report was created by the reporting language in your database system. The paragraph which generated this report is VOCLIB/SENTRY.USERS.REPORT. The data file used is SENTRY.USERS. In addition to the data displayed here you may create a report which displays the last login date and time.
3.3 GROUPS REPORT The SENTRY Groups Report displays, in a very concise format, all data related to groups on your system. Along with the name and description of each group are all user IDs associated with the group. The user’ s relationship with each group (GID or supplementary) is reported also.
Page 84
Description - This is a free form text field to be used by the System Administrator to document the usage of groups on your UNIX system. This report is produced by the database reporting language on your system. The paragraph can be found in VOCLIB/SENTRY.GROUPS.REPORT. The database file is SENTRY.GROUPS. Fitzgerald & Long...
SENTRY User’ s Guide 3.4 ACCOUNT PROTECTION REPORT This is a report of all protected commands on your system. It is sorted by account such that there is one page per account printed. Note that the account pathname appears in the title of the report.
Page 86
Section 3 - 14 SENTRY User’ s Guide Description - The description field is used for documentation and may be entered through the Database Maintenance program for Database Commands. Group Name & Rights - This field displays the names of groups (if any) used to define the access to this command and the rights given to these groups.
SENTRY User’ s Guide 3.5 COMMAND PROTECTION REPORT The SENTRY Command Protection Report presents an alphabetical listing of all commands protected through SENTRY's Database Commands program. SENTRY.COMMANDS.REPORT Commands: Verbs, Sent, Menu, PA or PQ Type Description ============== ==== ================= DELETE...
Page 88
System Administrator in the data entry screen for Command Maintenance. This report is written in the database reporting language used by your system. The paragraph which generates this report is sentry/VOCLIB/SENTRY.COMMANDS.REPORT. The database file is SENTRY.COMMANDS.
01:55PM One record listed. Figure 41 - This is a sample report of the SENTRY Violations Log. Each attempt to use a restricted command by an unauthorized user is reported. Each attempt to use a restricted command is logged in SENTRY's violation log and may also be displayed at the system console if desired.
Page 90
Messages beginning with "PERFORM Command" indicate that use of the Protected Command occurred at the database prompt. In addition to the standard SENTRY reports, we encourage you to use the database reporting language to create custom reports or to perform inquiries (e.g. LIST SENTRY.VIOLATIONS WITH DATE AFTER "01/01/95"...
Profile for length and format. A special report is available to assist the System Administrator in notifying users of the changes. Should SENTRY’ s cross reference files become damaged, you can easily rebuild them through this menu. Additionally, we have provided a utility to “re-install” SENTRY’ s command protection on an account.
This menu provides access to five utility programs designed to save the System Administrator data entry effort and time in performing global tasks such as generating and protecting an account "like" another account, purging the Violations Log on a selective basis, and changing passwords in SENTRY's database.
Page 93
Selection five, Update Protected Commands to Account VOC Files. It is possible that through the use of the editor or upgrading to a new release that Sentry’ s Command Protection could be overwritten. To re-install the Command Protection into the VOC of an account, use this program.
VOC protection without the necessity of entering each item in a number of accounts. To invoke this program enter 4, Utilities Menu, from the SENTRY Main Menu; then, select 1, Protect a Database Account Like an Account Already Protected.
SENTRY User’ s Guide 4.2 PUGING THE VIOLATIONS LOG This program provides a convenient method of selectively purging the SENTRY Violations Log. You may purge by record key, dates, ports, USER ID, or account name. To invoke this program enter 4, Utilities Menu, from the SENTRY Main Menu;...
Page 96
Section 4 - 6 SENTRY User’ s Guide This program is constructing a query sentence to SELECT the items to be purged. When entering your criteria, think of it as though you were completing the phrase "WITH field.name EQ (or LT, GT)" to the items you enter.
2. user IDs - Enter a list of user IDs separated by spaces for which you would like to generate new passwords. The new passwords are written into the SENTRY.USERS file in an encrypted format. The System Administrator may access these passwords through the Sentry Users Maintenance screen.
Page 98
Section 4 - 8 SENTRY User’ s Guide MM/DD/YY. Sentry will select all users whose password update date is earlier than this date. If there is no date in this field, the record will not be selected. Fitzgerald & Long...
Page 99
SENTRY.GROUPS file. 6. User Names - Sentry maintains a cross reference list by the user’ s name as entered into the Sentry Users data entry program. If you have used this field in your data entry, you may use it in this program to select by user name instead of by user ID (selection criteria 2).
4.4 REBUILD CROSS REFERENCE FILES SENTRY maintains a number of traditional inverted lists which are used for cross referencing. When you use the “@” function you are accessing one of these lists. Should you encounter a list where an item appears as “NOT FOUND”...
Once you have entered the pathname to the account SENTRY will validate the pathname and ask if you are ready to continue with the updates. To continue with the updates enter “OK”. Enter <ESC> to abort this program.
"accidents" which might cause data corruption we must remind you that you are fully responsible! Be careful ..practice safe computing. All subroutines are catalogued globally as "*SENTRY...". We recommend the following example of BASIC syntax as the preferred technique for calling the SENTRY Subroutines SENTRY.USER.ITEM.CONTROL="*SENTRY.USER.ITEM.CONTROL"...
There are an almost infinite number of encryption techniques. SENTRY uses a method which can be classified as "private key encryption". The encryption subroutine is SENTRY.ENCRYPT. The subroutine has three arguments -- DATA.STRING, RETURN.STRING and ENCRYPTION.KEY.
It's POWERFUL and potentially dangerous. Subroutine: SENTRY.USER.ITEM.CONTROL SENTRY.USER.ITEM.CONTROL is a subroutine used to determine access rights of a user ID to items defined by the user with the SENTRY User Item Maintenance Screen (Section 2-6).
Page 106
/usr/sentry/SENTRY.USER.ITEMS. If the item is found in either step 1 or 2, the value will be 1. If the SENTRY.USER.ITEMS file in the SENTRY account cannot be accessed or the item is not found in either step 1 or step 2, the value returned will be 0.
Page 107
SENTRY User’ s Guide Appendix 1 - 5 If an error was encountered by the subroutine, an error message will be returned. If no error occurred ERROR.TEXT will be null. Fitzgerald & Long...
Free format text description of the violation. This is a routine similar to the one which logs violations to the SENTRY Violations Log when a user with insufficient rights attempts to use a SENTRY protected command. It will create a new entry in the SENTRY.VIOLATIONS.LOG file.
Page 111
<escape> character followed by <return>. This may create a conflict for sites using certain communications packages. By modifying the KEY.BINDINGS record, the user may customize his version of SENTRY to use whatever series of keystrokes is desired for each of the functions.
Page 112
Appendix 2 - 2 SENTRY User’ s Guide environment and reenter SENTRY in order for the changes to take effect because these variables are read into named COMMON. NOTE: DO NOT enter the quote marks. Fitzgerald & Long...
Need help?
Do you have a question about the Sentry and is the answer not in the manual?
Questions and answers