Do you have a question about the Gauntlet and is the answer not in the manual?
Questions and answers
Summary of Contents for Silicon Graphics Gauntlet
Page 1
Gauntlet ™ for IRIX ™ Administrator’s Guide Document Number 007-2826-004...
Page 2
Mountain View, CA 94043-1389. Silicon Graphics and the Silicon Graphics logo are registered trademarks, and IRIX and InPerson are trademarks, of Silicon Graphics, Inc. Gauntlet and the TIS logo are trademarks of Trusted Information Systems, Inc. Netscape Navigator and Netscape Proxy Server are trademarks of Netscape Communications Corporation.
Mailing Lists xxiii Frequently Asked Questions Lists xxiv White Papers xxiv How to Get Latest Security Patches xxv PART I Understanding the Gauntlet Internet Firewall Understanding the Gauntlet Firewall 3 Understanding Gauntlet Firewall Concepts 3 Design Philosophy 3 Security Perimeter 4...
Page 4
Contents How a Firewall Works 10 Dual-Homed Bastion Host 12 Processing Packets and Requests 14 PART II Configuring and Using Proxies Managing SMTP Services 19 Understanding the Proxy 19 How It Works 20 Configuring the Firewall for SMTP 20 Planning 21 Configuring the Firewall 21 Configuring Network Services 22 Configuring the Proxy Rules 22...
Page 5
Contents Managing Terminal Services 31 Understanding the Proxies 31 How the Proxies Work 32 Using the TELNET and Rlogin Proxies Without Network Access Control 33 Configuring the Firewall for Terminal Services 33 Planning 33 Configuring the Firewall 34 Configuring Network Services 34 Configuring the Proxy Rules 34 Creating Authentication User Entries 35 Verifying Your Setup 35...
Page 6
Contents Managing Rsh Services 47 Understanding the Rsh Proxy 47 How It Works 48 Configuring the Firewall for Rsh Services 48 Planning 48 Configuring Network Services 48 Configuring the Proxy Rules 49 Verifying Your Setup 49 Using Rsh Services 49 Configuring the Remote Machine 49 Managing Gopher and WWW Services 51 Understanding the Proxy 51...
Page 7
Contents Managing RealAudio Services 61 Understanding the RealAudio Proxy 61 How It Works 62 Configuring the Firewall to Use the RealAudio Proxy 62 Planning 63 Configuring Network Services 63 Configuring the Proxy Rules 63 Verifying Your Setup 63 Using the RealAudio Proxy 63 To configure the RealAudio player: 64 Managing MediaBase Services 65 Understanding the MediaBase Proxy 65...
Page 8
Configuring Network Services 81 Configuring the Proxy Rules 81 Configuring Sybase Clients 82 Verifying Your Setup 82 PART III Administering General Gauntlet Firewall Services Managing NNTP and General TCP Services 85 Understanding the Proxy 86 How It Works 87 viii...
Page 9
Contents Configuring the Firewall for NNTP 87 Planning 87 Configuring the Firewall 88 Configuring Network Services 88 Configuring the Proxy Rules 88 Informing Your News Feed 88 Configuring Your News Server 88 Verifying Your Setup 89 Using NNTP 89 Configuring the Firewall for Other Protocols 89 Planning 89 Configuring Network Services 90 Configuring the Proxy Rules 90...
Page 10
The Graphical Management Interface 115 First Time User Tips 116 Help Links 116 Hide and Unhide Buttons 116 Gauntlet Default Settings 117 When to Use Configure All 117 Using the Gauntlet Management Interface 117 Configuring Gauntlet Locally 118 Introductory Management Form 118...
Page 11
Proxy Servers Configuration Form 131 Remote (Network) Connections 131 Enabling Transparent Proxies 132 Enabling Individual Proxy Services 132 Domain Name Service (DNS) and Gauntlet 139 DNS Configuration Form 140 Configuring Fully Populated DNS Server 140 Configuring a Split DNS Server 142...
Page 12
Contents Managing User Authentication 173 Understanding the User Authentication Management System 173 How the Firewall Uses This Information 174 How Other Services Use This Information 174 The Pieces 175 Understanding Strong Authentication 176 Access Key II 176 APOP 176 SecurID 177 EnigmaLogic SafeWord 177 S/Key 177 Reusable Passwords 177...
Page 13
Contents Using the Login Shell 189 Understanding the Login Shell Program 189 How It Works 189 Configuring the Firewall to use the Login Shell Program 190 Planning 190 Enabling Remote Login 190 Adding Support for the Login Shell 190 Creating User Accounts 191 Configuring the Proxy Rules 191 Configuring the Shell 191 Creating User Authentication Records 192...
Page 14
Protecting the Integrity Database 205 Verifying System Integrity 205 Understanding the Results 205 PART IV Appendixes Gauntlet System Files 209 Viewing the Gauntlet File List 209 Netperm Table 215 Policy Rules 215 Application-Specific Rules 216 Proxies 216 Applications 217 Using This Information 217...
Page 15
How It Works 273 Encrypting the Data 273 Decrypting the Data 273 Routing the Packet 274 Configuring SSL on the Gauntlet Firewall 275 Getting Ready for SSL Configuration 275 SSL Configuration Procedure 276 Supplementary Instructions for Generating a Key Pair 277...
Figure 10-2 Hide Button 116 Figure 17-1 Unhide Button 117 Figure 17-2 Gauntlet Introductory Management Form (1 of 3) 120 Figure 17-3 Gauntlet Introductory Management Form (2 of 3) 121 Figure 17-4 Gauntlet Introductory Management Form (3 of 3) 122...
Page 18
List of Figures Authorizing Users Form 165 Figure 17-22 Add User Form 166 Figure 17-23 User Authentication 167 Figure 17-24 Yoyodyne Virtual Private Network 270 Figure C-1 xviii...
• Chapter 2, “Managing SMTP Services,” explains what the SMTP proxy does and how it works. It presents instructions for configuring the Gauntlet firewall, as well as required and potential configuration steps for mail applications. • Chapter 3, “Managing POP3 Services,” explains what the POP3 proxy does and how it works.
• Chapter 10, “Managing X Window Services,” explains what the X11 proxy does and how it works. It presents instructions for configuring the Gauntlet firewall, as well as required and potential configuration steps for the X11 applications. •...
Page 21
• Chapter 19, “Using the Login Shell,”explains what the login shell does and how it works. It presents instructions for configuring the Gauntlet firewall for more secure access. • Chapter 20, “Logging and Reporting,” explains how the system logs activity. It explains the different types of reports, how to configure them, and how to interpret...
About This Guide • Appendix D, “Configuring SSL on the Gauntlet Firewall,” explains the Secure Socket Layer protocol and how to configure it to protect remote administration sessions of the Gauntlet firewall. The Glossary presents definitions of terms used in this document.
About This Guide Installation and System Requirements Refer to the release notes with your Gauntlet firewall product for information regarding software and hardware requirements as well as installation information. Additional Resources This collection of resources is presented as a starting point for your information. It is not an endorsement of any of the products or organizations.
About This Guide Frequently Asked Questions Lists The Internet Firewalls Frequently Asked Questions list is maintained by Marcus J. Ranum and located at: http://www.v-one.com/pubs/fw-faq/faq.htm White Papers Application Gateways and Filtering Gateway: A Comparison of Firewall Designs Avolio, Frederick M. and Sebes, J. Data Security Letter, Number 59. http://www.tis.com/Home/NetworkSecurity/Firewalls/FWComp.html Firewalls Are Not Enough Avolio, Frederick M.
About This Guide How to Get Latest Security Patches The CD-ROM containing the Gauntlet firewall software contains necessary security patches (if any) at the time of product release, so be sure to install those patches. Stay in touch with the WWW site for Silicon Graphics Security Headquarters at http://www.sgi.com/Support/Secur/security.html for new security patches and...
If the paragraph above does not make any sense, do not despair. This chapter provides an overview of the Gauntlet Firewall and how it works. However, it is not a thorough discussion of firewalls or security practices. Consult “Additional Resources” on page xxiii for a list of other resources that provide excellent introductory and advanced discussions of firewalls.
Gauntlet firewall is provided so anyone can examine and confirm the programs operation. They are also examinable by any Gauntlet customer, not hidden away in some sort of black box. The security of the Gauntlet Internet firewall does not depend on secret algorithms or source code.
Page 31
Understanding Gauntlet Firewall Concepts Trusted Networks Trusted networks are the networks inside your security perimeter. Trusted networks are usually the ones that you are trying to protect. Often, you or someone in your organization administers the machines on these networks. Your organization controls the security measures for these networks.
Internet are now unknown networks and cannot pass requests through the firewall. Policy Just as you have a general security policy for your organization, the Gauntlet Internet Firewall uses policies to summarize its rules. The policies are collections of rules about what the firewall can and cannot do in particular situations.
118 for information on minimizing exposure while implementing the Gauntlet software.) All known security holes are patched as of the release of the Gauntlet product (refer to “How to Get Latest Security Patches” on page xxv for information on security patches.) As part of the firewall, the operating system has been tailored to provide...
Page 34
Chapter 1: Understanding the Gauntlet Firewall Application-Level Security Services (Proxies) The software on the Gauntlet firewall includes security services on a per-application protocol basis. As noted above, all packets, and therefore all application requests, go to the firewall. On the firewall, proxy software relays information from one side of the firewall to the other.
Page 35
(for example, address and protocol) and processes or rejects the packets. It detects spoofed packets claiming to be from one network that are actually from another network. This software also allows Gauntlet to be transparent to your users for most activities. Management Utilities In addition, the Gauntlet firewall also contains several programs that ease the job of...
Consider a company, Yoyodyne, that has a connection to the Internet via an Internet service provider (ISP). They have installed a Gauntlet Internet Firewall to protect their corporate network (yoyodyne.com) from all other hosts on the Internet. They are using...
Page 37
The Yoyodyne network is first separated from the rest of the Internet by a router. The router only passes traffic from the Internet to the Gauntlet firewall when that traffic is bound for some part of the Yoyodyne internal network. More sophisticated routers can additionally strengthen a companies security perimeter by implementing certain security functions such as “IP spoofing filters”.
Chapter 1: Understanding the Gauntlet Firewall The firewall is helping to establish a security perimeter to protect the internal network. It screens all requests that need to pass from one side of the firewall to the other. Using rules Yoyodyne created based on their security policies, the firewall determines whether to accept or pass requests through (at the application level) to the other side.
How a Firewall Works Internet Gauntlet Internet Firewall e c 0 e c 1 Router Internal network Figure 1-2 Dual-Homed Bastion Host All outside network traffic enters and exits the firewall through one network interface, such as ec0. Similarly, all inside network traffic enters and exits through a network interface, such as ec1.
Chapter 1: Understanding the Gauntlet Firewall You can also use two firewalls to create a virtual private network (or a virtual Note: network perimeter), exchanging encrypted information across an untrusted network. Because of United States government export regulations, this feature is generally not available outside the United States and Canada.
Page 41
How a Firewall Works proxy configured to accept a packet, the firewall drops the packet and drops the failed access. Next, the firewall examines the source address of the packet and the interface on which it received the packet. This process verifies the information against configuration tables, which prevents the firewall from accepting IP spoofed packets.
Page 42
Chapter 1: Understanding the Gauntlet Firewall documents. Requesting applications think they are talking to an actual server, not a proxy. The proxies also check to determine if the request is permitted for the destination. For some services, the proxies can perform the additional step of authenticating the user.
Our design philosophy of reductionism frowns upon the direct use of sendmail as a critical security component of the Gauntlet Firewall. The Gauntlet Firewall includes a two-part proxy that securely handles the transfer of SMTP mail between the inside and outside networks.
(mail.yoyodyne.com), in which case sendmail will transfer the mail to the mail hub using SMTP. Configuring the Firewall for SMTP Configuring the Gauntlet firewall involves planning, configuring the firewall, configuring the proxies to enforce your policy, advertising your mail exchanger, and configuring your internal mail hub.
Configuring the Firewall If you wish to allow SMTP traffic through the firewall, configure the firewall using the gauntlet-admin interface. The interface stores this information using configmail in conjunction with the auto-configuring version of the sendmail.cf configuration file. To configure the firewall for SMTP, follow these steps: 1.
You do not need to modify the IRIX configuration files on the firewall to support SMTP traffic. This is a standard service, and you can use gauntlet-admin to modify the configuration files. If you need to, you can instruct gauntlet-admin to not make modifications so you can make the customizations for your site.
Mail -v bouncer@bbnplanet.com Subject: Test Configuring Mail and the Gauntlet Firewall This is a test. The verbose mode ensures that you see the details of the delivery. The bouncer service sends you a return message shortly.
The POP3 proxy included with the Gauntlet Firewall allows administrators to selectively allow outside hosts to exchange mail with a POP3 mail server through the firewall. The POP3 server must use APOP for authenticating the user.
POP3 servers outside the perimeter. However, in most security policies (including the Gauntlet Firewall default), this is not considered a good idea. The POP3 protocol assumes that the SMTP proxy has already checked the formatting in the headers of incoming mail messages.
Configuring the Proxy Rules If you are using the Gauntlet Firewall default configuration, you need to modify the proxy rules for POP3 services. This involves accessing the gauntlet-admin Proxies form, where you can enter the name of the destination POP3 server and modify the timeout value if you desire.
Chapter 3: Managing POP3 Services Setting APOP Passwords on the Firewall Use the authentication management system to add users to the Gauntlet user authentication database for any users who need to authenticate when using POP3 services. See Chapter 18, “Creating Users” on page 181 for details.
Page 55
Using POP3 to Exchange Mail Figure 3-1 Eudora Pro Configuration for APOP John, working on his laptop (cavalier.yoyodyne.com) at home, configures his mail reader to connect to the firewall (firewall.yoyodyne.com) to get his mail. Next, John retrieves his mail. As part of the connection, the proxy requests authentication information from the user agent, which prompts him.
Terminal service access to other computers can be a vital part of many network activities. The TELNET and rlogin protocols are used for making these terminal connections, and they are not without risk. The Gauntlet Firewall includes proxies for both the TELNET and rlogin protocols, which securely handle terminal services between the inside and outside networks.
Chapter 4: Managing Terminal Services Used together, these access controls and log files allow you to have much more control over the connections to and from your system than you have when you use the standard IRIX TELNET and rlogin programs. Note that you can use the TELNET proxy without the rlogin proxy, or rlogin without TELNET.
Configuring the Firewall for Terminal Services Configuring the Gauntlet firewall involves planning, configuring the firewall, indicating which daemons the system will run, configuring the proxies to enforce your policy, and adding the users who will need to authenticate to the Gauntlet user authentication database. Planning 1.
TELNET or rlogin traffic. Configuring the Proxy Rules If you are using the Gauntlet Firewall default configuration, you do not need to modify the proxy rules for TELNET, rlogin and TN3270services. If you have chosen different welcome or other messages, you must modify /usr/gauntlet/config/template.netperm-table to reflect your configuration.
Using Terminal Services Creating Authentication User Entries Use the authentication management system to add users to the Gauntlet user authentication database for any users who need to authenticate when using TELNET and rlogin services. See Chapter 18, “Creating Users” on page 181 for more information.
Chapter 4: Managing Terminal Services TELNET and Rlogin With Authentication If you have configured any terminal services to require authentication, users must follow different procedures to use TELNET or rlogin. For example, to TELNET using authentication, follow these steps: 1. TELNET to the firewall itself. 2.
Using Terminal Services In this example, Scooter, working at a client site (blaze.clientsite.com), needs TELNET access to the dimension.yoyodyne.com system behind the firewall. He first telnets to the firewall for Yoyodyne (firewall.yoyodyne.com). The TELNET proxy on firewall prompts him to authenticate. Scooter provides his authentication user ID (scooter). When the proxy prompts, he enters the response to the authentication challenge.
Sometimes the easiest way to transfer information from one machine to another is to actually transfer the relevant files. The file transfer protocol (FTP) is one of several protocols that make this possible. The Gauntlet firewall includes a proxy that securely allows the transfer of files between trusted and untrusted networks.
The default policy does not allow either inside or outside hosts to FTP directly to the firewall itself. If you configure your Gauntlet firewall to allow anonymous FTP to the firewall, hosts connect to the firewall with an FTP request. The firewall starts the netacl daemon.
Configuring the Proxy Rules If you are using the Gauntlet Firewall default configuration, you do not need to modify the proxy rules for FTP services. Use the gauntlet-admin Proxies form if you want to enable FTP or anonymous FTP. If you have chosen a different denial message, you must modify /usr/gauntlet/config/template.netperm-table to reflect your configuration.
Chapter 5: Managing FTP Services Verifying Your Setup Verify your configuration by transferring files to an inside host from an outside host. For example, connect to your favorite FTP site and download their README file. See the section below for instructions. Using FTP Services The idea behind the FTP proxy is that most users working on the trusted networks behind the firewall will not see a change in their daily FTP activities.
Using FTP Services ftp> user clancy@dimension 331- (-----GATEWAY CONNECTED TO dimension----) 331- (220 dimension FTP server ready.) 331 Password required for clancy. Password: ######### 230 User clancy logged in. ftp> In this example, the user Clancy, working at a client site (blaze.clientsite.com), needs FTP access to a machine behind the firewall (dimension.yoyodyne.com).
Gauntlet for IRIX allows you to run the standard IRIX FTP server (ftpd) in an isolated chrooted environment as an anonymous FTP server (but you give up the ability to allow authenticated users from untrusted networks to use ftp-gw to access trusted networks).
Page 71
Use checksums to watch for file changes. • Back up frequently. You can also use the Info Server included with the Gauntlet firewall as an anonymous FTP server on the firewall itself. See “FTP Server” on page 102 for more information.
The Rsh service allows users to do this. The Rsh program is not without risks: it runs programs on another machine and requires some privileges to login. The Gauntlet firewall includes a proxy that securely handles the execution of Rsh requests from machines inside the network to machines outside the network.
Rsh requests. Configuring the Firewall for Rsh Services Configuring the Gauntlet firewall involves planning, indicating which daemons the system will run, configuring the Rsh proxy to enforce your policy, turning on the proxy, and rebooting your firewall.
Using Rsh Services Configuring the Proxy Rules Configure the Rsh proxy to enforce your security policies. This involves modifying . See Appendix B for more information on rsh-gw options, /usr/local/etc/netperm-table netperm-table options and order of precedence. To configure the netperm-table: 1.
Page 76
Chapter 6: Managing Rsh Services For example, Penny, who works at Yoyodyne, needs to execute something remotely using her account at Big University. She adds a line to the file in her account at Big .rhosts University: penny@fire-out.yoyodyne.com...
file transfer mechanisms and require logging and access control consistent with FTP and terminal services. The HTTP proxy and authenticating HTTP proxy included with the Gauntlet Firewall securely handles requests for information via hypertext, Gopher, and file transfer. The proxy supports hypertext transfer via the HTTP, SHTTP, and SSL protocols; Gopher transfer via Gopher and Gopher+ protocols;...
The proxies log all successful and unsuccessful connection attempts, and the amount of data transferred. The Gauntlet authenticating HTTP proxy works in conjunction with the HTTP proxy to authenticate users. Using the authenticating HTTP proxy, you can configure the proxy to allow connections based on username.
If the host has permission, ahttp-gw prompts the user to authenticate. It verifies the information with Gauntlet authentication database. If the user provided proper authentication, ahttp-gw passes processing over to the HTTP proxy.
firewall calls the SSL plug proxy for all requests on port 443. Configuring the Firewall for WWW and Gopher Services Configuring the Gauntlet firewall involves planning, indicating which daemons the system will run, and configuring the proxies to enforce your policy. Planning 1.
SHTTP, SSL, Gopher, or FTP. Configuring the Proxy Rules If you are using the Gauntlet Firewall default configuration, you do not need to modify the proxy rules for HTTP and Gopher services. If you have chosen other options, you must modify /usr/gauntlet/config/template.netperm-table to reflect your configuration. See Appendix B for more information on http-gw options, netperm-table options, and order of precedence.
Chapter 7: Managing Gopher and WWW Services If you are using the authenticating HTTP proxy, users must use a proxy-aware browser. It must support persistent connections if you wish to use strong authentication. Once you have configured their web browser, they are aware of the proxy because they must authenticate to access outside sites.
Page 83
Using Web Services 6. Specify the names of hosts for which you do not want to access the HTTP proxy in the No Proxy section. These are generally hosts on your trusted networks. These include: • inside IP address of your firewall (if you plan to use the graphical user interface to configure your firewall) •...
Chapter 7: Managing Gopher and WWW Services If you have configured the proxies to block certain types of services (for example, no Gopher services) or to block certain destinations (for example, no educational [.edu] sites) users do see your denial messages. Accessing Web Services with Authentication Once configured, users are aware of the proxy.
Using Gopher Services The firewall configuration for the http-gw proxy for Gopher services is transparent to the user if transparent proxies have been enabled using gauntlet-admin. Users can continue to point their Gopher clients to Gopher servers as they did before.
Use checksums to watch for file changes. • Back up frequently. You can also use the Info Server included with the Gauntlet firewall as a WWW server on the firewall itself. See Chapter 15, “Managing Information Services on the Firewall,” for more information.
files is not without risk, so they require logging and access control, as with other services. The RealAudio protocol allows people to play and listen to audio material. The Gauntlet Firewall includes a RealAudio proxy that securely handles requests to listen to audio data.
RealAudio requests access the proxy. There is no way to start the RealAudio server daemon needed to service RealAudio requests. Configuring the Firewall to Use the RealAudio Proxy Configuring the Gauntlet firewall involves planning, indicating which daemons the system will run, and configuring the RealAudio proxy to enforce your policy.
files on the Gauntlet firewall. Configuring the Proxy Rules If you are using the Gauntlet firewall default configuration, you do not need to modify the proxy rules for the RealAudio server. To enable the RealAudio server, use the gauntlet-admin Proxies form to enable the server.
Chapter 8: Managing RealAudio Services If you are not using transparency or you have installed the firewall on the RealAudio default proxy port (1080), you need to configure your RealAudio player to know about the proxy and the other port. To configure the RealAudio player: 1.
MediaBase is a collection of multimedia and hypertext that allows users to select and play videos using their Web browser. The Gauntlet Firewall includes a MediaBase proxy that securely handles outside user requests to view video data on a MediaBase server inside the firewall.
MediaBase server on the firewall itself—there is no way to start a MediaBase server to accept such requests. Configuring the Firewall to Use the MediaBase Proxy Configuring the Gauntlet firewall involves planning, indicating which servers may be accessed, and configuring the MediaBase proxy to enforce your policy. Planning Determine which internal users and hosts can use MediaBase, and determine whether you want to run the MediaBase proxy.
Note: Configuring the Proxy Rules If you are using the Gauntlet firewall default configuration, you do not need to modify the proxy rules for the MediaBase server. To enable the MediaBase server, use the gauntlet-admin Proxies form to enable the server.
Most sites do not want to provide this sort of free access to their machines, but administrators recognize that these services can be useful. The X11 proxy included with the Gauntlet Firewall allows administrators to selectively allow X11 services through their firewall.
X requests and connections. How the X11 Proxy Works Unlike some of the other Gauntlet proxies, the firewall does not start the X11 proxy when it receives display requests. Instead, users must explicitly start the X11 proxy from either the TELNET or Rlogin proxy. The firewall denies all requests for services on the standard X port (6000).
TELNET and Rlogin proxies are the only programs that can start the X proxy, and they read their configuration information from the netperm-table file. Configuring the Proxy Rules To enable the X11 proxy for TELNET and Rlogin users, use the gauntlet-admin Proxies form. Alternatively, you may modify /usr/gauntlet/config/template.netperm-table to configure the X11 proxy to enforce more specific security policies.
Chapter 10: Managing X Window Services Using X11 Services Users need to follow slightly different procedures to use X11 services through a firewall. The minimal time needed for these additional steps outweighs the time and money you would spend to recover after someone hijacks your display and thereby penetrates security.
Using X11 Services Clancy indicates he wants to start an X proxy. The firewall displays an X status window on Clancy’s display, showing the port (see Figure 10-1). Figure 10-1 Example X Window Port Information He then TELNETs to the client machine (blaze.clientsite.com). tn-gw>...
Page 100
Chapter 10: Managing X Window Services Figure 10-2 Example X Window Confirmation Finally, Clancy views the results on his screen inside the firewall.
firewalls. Others might want to be able to print from a remote system, for example a mobile PC, to a printer behind a firewall. The Gauntlet Firewall includes an lp proxy that securely handles the transfer of print requests.
The default policy does not allow any hosts to print to the firewall. Configuring the Firewall for lp Services Configuring the Gauntlet firewall involves planning, indicating which daemons the system will run, and configuring the lp proxy to enforce your policy.
Configuring the Firewall for lp Services Configuring Network Services To configure network services with the gauntlet-admin, enable lp in the Proxies form, and modify the idle timeout if desired. You can use the gauntlet-admin Proxies form to create virtual queues on the firewall, which will be translated to the real servers and queues you specify.
Chapter 11: Managing LP Services Verifying Your Setup Verify your configuration by printing a file from a host inside your firewall to a host outside your firewall. If you are configured to do so, print a file from a host outside your firewall to a host on the inside of your firewall.
Database services are essential in most organizations. As with other services you offer, you want to securely configure database access. Sybase is a relational database management system in use in many organizations. The Gauntlet firewall includes a proxy that securely allows connections between Sybase clients on the inside network and servers on the outside network.
You can configure the Sybase proxy to allow Sybase clients on untrusted hosts to access Sybase servers on your trusted networks. According to most security policies, including the Gauntlet firewall default, it’s not a good idea. If you must allow this sort of service, consider using client-side password encryption. Consider limiting the databases and data to which users have access as all of the data is transferred unencrypted.
Configuring Network Services You do not need to modify the IRIX configuration files on the firewall to support NNTP. This is a standard service, included in the default versions of these files on the Gauntlet Firewall. Configuring the Proxy Rules In most cases, you do not need to modify the proxy rules for NNTP.
Chapter 12: Managing Sybase Services Configuring Sybase Clients Add or modify the interfaces file on the client (using a tool like sybinit or SQLEdit) to provide information about the Sybase server: Specify the port number you selected for the Sybase proxy. 2.
The plug proxy included with the Gauntlet firewall allows administrators to tunnel NNTP-based news feeds through their firewall. The NNTP connections come from known sites (as opposed to the multitude of sites that may connect via SMTP to deliver mail).
Chapter 13: Managing NNTP and General TCP Services Understanding the Proxy The Gauntlet plug proxy is a TCP gateway that provides configurable access control and logging mechanisms. The plug proxy, which runs on the firewall, passes NNTP or other application requests through the firewall, using rules you supply. It essentially tunnels information from a port on the firewall to a specific port on another machine.
For example, the firewall runs an instance of the plug proxy on port 119 to handle NNTP requests if you have enabled NNTP from gauntlet-admin. When the plug proxy receives a request on its port, it checks its configuration information (in the netperm-table file) and determines whether the initiating host has...
Configuring Network Services You do not need to modify the IRIX configuration files on the firewall to support NNTP. This is a standard service, included in the default versions of these files on the Gauntlet Firewall. Configuring the Proxy Rules In most cases you do not need to modify the proxy rules for NNTP.
If you have simple plug gateway needs, you can add custom plug gateways using Note: the gauntlet-admin proxies page. If you use that method, you may still need to modify /etc/services, but do not need to modify /etc/init.d/network.local or /usr/gauntlet/config/template.netperm-table.
Configuring the Proxy Rules Configure the plug proxy to enforce your security policies. This involves modifying /usr/gauntlet/config/template.netperm-table. You may use the gauntlet-admin Proxies form. In the section called “Plug Gateways,” enter the source host, the firewall port, the destination host, and the destination port for each plug gateway.
Configuring Multiple Newsfeeds To configure the netperm-table file directly, follow these steps: 1. Create a plug proxy section for your service, specifying the inside host(s) that can use this service and destination servers and ports: qotd-gw: port qotd 10.0.1.* -desthost qotd.bigu.edu -destport qotd which indicates that any inside hosts can send Quote of the Day requests to the server at Big University.
Chapter 13: Managing NNTP and General TCP Services For example, you have configured news.myisp.net as your primary news feed through the gauntlet-admin interface. To add support for a secondary news feed from news.bigu.edu (192.168.1.202) to your internal news machine news.yoyodyne.com (10.0.1.3), use the following lines in your netperm-table file:...
Understanding the Circuit Proxy The Gauntlet circuit proxy is an authenticated TCP gateway that provides configurable access control and logging mechanisms. The proxy, which runs on the firewall, authenticates users and passes TCP-based application requests through the firewall, using rules you supply.
Chapter 14: Managing General TCP Services With Authentication This is not an exhaustive list. The circuit proxy is protocol neutral, so you can tunnel a variety of other stream-based applications. Weigh the risks carefully for each application. You can configure the circuit proxy to allow connections based on: •...
Configuring the Firewall for Authenticated TCP Services Configuring the Gauntlet firewall involves planning, indicating which daemons the system will run, configuring the proxies to enforce your policy, starting your proxy, rebooting your firewall, and configuring your service.
Use the same service name or port number you specified in /etc/services. PORT=oracle VARIABLE name of the variable used to identify the service in the Gauntlet administration menus to turn the proxy on and off. VARIABLE=proxy_custom2...
ARGS=”-as qotd-gw” Do NOT use the -daemon option with the circuit proxy, as you would with other Gauntlet proxies. The circuit proxy automatically starts as a daemon. • Note that you do NOT need to add information about the service to the startup script.
Chapter 14: Managing General TCP Services With Authentication 3. Indicate the authentication server the circuit proxy uses: hosts host port ck-gw: authtype [-authhost ] [-authport • where: authtype hosts indicates the hosts for which the circuit proxy authenticates. Specify individual machines, entire networks, or subnets. Use IP addresses or host names.
Page 125
Using the Circuit Proxy 5. Confirm the client application connection. 6. Use your application. The example below shows a user working on the trusted network inside the defense perimeter. The company has a policy to authenticate the use of some outside services. He is accessing an Oracle database on a machine outside the perimeter at a client site.
Page 126
Chapter 14: Managing General TCP Services With Authentication Then he starts his client application. Because Yoyodyne is using transparency (the default configuration), he indicates that the database server is on the remote host (db.clientsite.com). If Yoyodyne was not using transparency, Robert would tell the client that the database server was the inside address of the firewall (fire-in.yoyodyne.com), allowing the firewall to connect to the database server on his behalf.
• source hostname You would use the Gauntlet Info Server in place of another HTTP server (such as the CERN or Netscape HTTP servers), Gopher server (such as the University of Minnesota Gopher server), or the FTP server included with your operating system.
If the host has permission to use the service, the Info Server uses its internal database (by default in /usr/gauntlet/infodb) to find the requested file or to go to the requested directory. The client thinks it is talking to a regular HTTP or Gopher server, even though it is not.
If the host has permission to use the service, the Info Server uses its internal database (by default in /usr/gauntlet/infodb) to find the requested file or to go to the requested directory. The client thinks it is talking to a regular FTP server, even though it is not.
Page 130
Chapter 15: Managing Information Services on the Firewall looks for the directory D/D00/D00/Detc. Because the root directory of the database is actually /usr/gauntlet/infodb, the Info Server is actually looking for /usr/gauntlet/infodb/D/D00/D00/Detc. The Info Server always looks for files within its own directory tree. It does not and cannot move back out of its directory tree to other areas of the systems, as some HTTP, Gopher, or FTP servers might.
files that you want anyone to view, even though you have other files in the directory. Configuring the Firewall Configuring the Gauntlet firewall to run an Info Server involves planning, indicating which daemons the system will run, configuring the Info Server to enforce your policy, and verifying your setup.
files on the Gauntlet firewall. Configuring the Proxy Rules If you are using the Gauntlet firewall default configuration, you do not need to modify the proxy rules for the info server. To enable the info server, use the gauntlet-admin Proxies form to enable the info server, select an idle timeout period, and specify an information directory.
To set up your files for use with the Info Server on the firewall, follow these steps: 1. Create your directory structure under /usr/gauntlet/infodb/D. Prefix each directory with the letter D when you create the directory. For example, if you want to keep all...
Page 134
• cttext—Text header Consult /usr/gauntlet/infodb/tools for a list of currently available sample headers. Use these files as templates to create your own header files, if necessary. Repeat this process for every file you wish to have accessible via the Info Server.
Using the Info Server Consult /usr/gauntlet/infodb/tools for a list of currently available sample headers. Use these files as templates to create your own header files, if necessary. Repeat this process for every binary file you wish to have accessible via the Info Server.
Chapter 15: Managing Information Services on the Firewall To create Gopher menus, follow these steps: 1. Execute the list command and redirect it to a file that starts with G. You may wish to restrict the files that the command displays, so that it looks like a normal Gopher menu.
Chapter 16 Using the Network Access Control Daemon The proxies included with the Gauntlet Internet Firewall allow you to determine whether or not you wish to allow certain hosts to access certain services. If you permit a particular host to use the TELNET proxy, they can TELNET from trusted networks to untrusted networks.
firewall. Consult the existing UNIX and Gauntlet firewall configuration files for examples of the network access control daemon in use. This section describes using the network access...
Configuring Network Services You do not need to modify the IRIX configuration files on the firewall to support NNTP. This is a standard service, included in the default versions of these files on the Gauntlet Firewall. Configuring the Proxy Rules In most cases you do not need to modify the proxy rules for NNTP.
Chapter 17 The Graphical Management Interface The Gauntlet system uses a Web browser interface (“forms-based”) to make it easy for you to quickly configure and run the firewall system. The Gauntlet management interface supports all common Gauntlet administrative functions and is organized (like this chapter) into the following browser forms: •...
Chapter 17: The Graphical Management Interface First Time User Tips Each section in this chapter describes a Gauntlet management form. The forms-based interface is designed to be self-sufficient, and it may present enough information for you to make all appropriate configuration decisions. While this chapter provides additional background information, it also duplicates much of the information that is available on the forms.
Gauntlet remotely. Using the Gauntlet Management Interface To configure the Gauntlet firewall, you can start the management interface locally from the firewall itself or from a remote host (including a remote X display). You can also perform secure remote management.
“Configuring Gauntlet for Remote Administration” on page 168 or “Configuring Gauntlet for Secure Remote Administration” on page 170. Configuring Gauntlet Locally To start the management interface and configure Gauntlet locally, use this procedure on the firewall host: 1. Log in to the firewall as root.
Page 145
Introductory Management Form Caution: Do not select Configure All until you configure all forms appropriately— running “Configure All” interrupts all current connections! The introductory management form describes how to use the forms-based interface, and contains a list of form names. From this list, you can access any other form, go to the next form, or configure your system.
ISDN Setup if you want to configure ISDN. Click PPP Setup if you want to configure PPP. To run the Network Setup tools directly from the Gauntlet forms-based interface, Note: you must be working at the Gauntlet host console. You can use the Network Setup tools without the Gauntlet interface from any location.
Page 150
Chapter 17: The Graphical Management Interface Figure 17-6 Networks and Interfaces Configuration Form (1 of 2)
Page 151
Networks and Interfaces Configuration Form Figure 17-7 Networks and Interfaces Configuration Form (2 of 2)
firewall to guard against IP address spoofing, a ruse in which network packets are tagged with a falsified trusted network address. When you designate trusted interfaces, Gauntlet verifies that packets tagged with a trusted network address actually arrived on a trusted interface.
“hop” metric to each network you add. Use a metric of “0” if the gateway is an interface on the Gauntlet host, and a metric of “1” if it is anywhere else. Explicit routes are stored in /usr/gauntlet/config/explicit_routes.
Page 155
Routing Configuration Form Figure 17-8 Routing Configuration Form...
Figure 17-9 If hosts on your internal network are running a routing daemon, they eventually acquire the default route from the Gauntlet host. The default route can also be explicitly assigned to those hosts by their administrators. Additional Routing Information For additional general routing information or information on routing using IRIX commands, refer to the section “Setting Up a Router”...
Proxy Servers Configuration Form The proxy server configuration form (Figure 17-10 and Figure 17-11) allows you to control network services that are available through the Gauntlet firewall. You can enable and disable particular services, specify timeout values and port numbers, and so on.
firewall runs a daemon to support it. For example, enabling TELNET means that a proxy TELNET server will run on the Gauntlet firewall to mediate and enable TELNET connections. The proxy will be a transparent TELNET proxy if you have enabled transparent proxies.
Page 159
Proxy Servers Configuration Form You can select which services, if any, to offer untrusted network users on the FTP port: ftp-gw, anonymous FTP using IRIX ftpd, and anonymous FTP using Gauntlet the info server. TELNET If you enable the TELNET proxy, enter a timeout value (number of seconds) for idle connections;...
Page 160
This can be extremely useful if users are traveling, for example. Remote users must be using client software that supports POP3 APOP authentication. This allows users to authenticate themselves to the Gauntlet firewall, so the firewall can then “plug” the connection through to the internal POP3 server, performing the identical authentication exchange with the internal POP3 server.
Page 161
Custom Configured Plug Gateways Custom plug gateways allow you to create proxies for protocols that are not specifically included in the Gauntlet proxies group (see “Configuring the Firewall for Other Protocols” in Chapter 11 for more information). If you configured custom plug gateways, click Enable to enable them.
Page 162
Chapter 17: The Graphical Management Interface Figure 17-10 Proxy Servers Configuration Form (1 of 3)
Page 163
Proxy Servers Configuration Form Figure 17-11 Proxy Servers Configuration Form (2 of 3)
Page 164
Chapter 17: The Graphical Management Interface Proxy Servers Configuration Form (3 of 3) Figure 17-12...
DNS server on the external host. In either case, the Gauntlet host is commonly chosen to run a DNS server, either as the external member of a dual-DNS configuration, or as the single DNS server for the site.
DNS server in this case. Enter the IP address of your DNS server: Enter the IP address which corresponds to the host name you gave above. If that’s your Gauntlet firewall, then enter one of the external IP addresses for the firewall.
Page 167
Sendmail (not DNS) page, and then consult IRIX Admin: Networking and Mail for details on how to get your Gauntlet firewall host to deliver all internal email through your separate domain-level mail hub.
/path/filename on the host hostname. The hostname “firewall” is used for the Gauntlet firewall host; “ns” is used for the internal DNS server host, assumed to be running the bind DNS server. (It is possible that various bind configuration files are not located at the paths given below on your ns host;...
Page 169
DNS Configuration Form The configuration you have set up is often known as split-DNS, and is commonly used at firewalled sites. Outside hosts cannot successfully query your internal DNS server for internal host names and IP addresses. However, on the firewall itself, applications can resolve internal host names;...
Page 170
Chapter 17: The Graphical Management Interface Figure 17-13 DNS Configuration Form (1 of 2)
Page 171
DNS Configuration Form Figure 17-14 DNS Configuration Form (2 of 2)
MX record for domain_name pointing at your external mail hub machine. Unless you’re willing to let such email bounce, you’re going to have to be able to deal with email directly sent to your Gauntlet firewall anyway.
However, Gauntlet does not run sendmail to accept incoming email; rather, it runs a very simple program called smap that accepts and queues incoming email.
Chapter 17: The Graphical Management Interface relay.corp.example.com. They are as much for informing internal sendmail or other analogous mail transfer agents as for informing sendmail on the firewall. • The mail hubs that resource records point to should be able to deliver email to domains ending in SUBDOMAIN.example.com for the corresponding subdomain.
Page 175
Sendmail on Gauntlet Servers Enter the host name of your firewall: The value in this field is the hostname of the interface to the external network. For example, in Figure 17-9, this is hostname assigned to the interface whose address is 192.132.122.12.
Page 176
This behavior and the fact that the Silicon Graphics sendmail.cf.auto file tries to deliver email to username@sub_domain.DOMAIN_NAME to username@relay.sub_domain.DOMAIN_NAME if it can find a host named relay.sub_domain.DOMAIN_NAME, makes it easy to support multiple subdomains for...
Page 177
Sendmail on Gauntlet Servers Sendmail Configuration Form Figure 17-15...
Both peers in the VPN must be running Gauntlet software. See Appendix C for detailed information on swIPe and VPNs. Figure 17-16 illustrates two Gauntlet servers acting as peers in a VPN. Notice that in this figure the path connecting the peers is the Internet.
Gauntlet host Internal network Figure 17-16 Gauntlet Hosts Using swIPe in a VPN Authentication and Encryption Schemes The swIPe protocol verifies that IP packets contain authentic source and destination addresses. This verification protects against IP address spoofing; it can be used in...
Prepare to synchronize the firewalls as you configure them. You do not need to modify the IRIX configuration files on the firewall to support encrypted traffic. This is a standard service, included in the default versions of these configuration files on the Gauntlet Firewall.
Page 181
swIPe Configuration Form Figure 17-17 illustrates the configuration form for swIPe. Figure 17-17 swIPe Configuration Form...
Chapter 17: The Graphical Management Interface Configuring a Server for swIPe Perform the following procedure while the administrator of the remote network does the same at the remote peer site. It is important that both firewalls are configured at the same time because the encrypted packets must stay synchronized.
swIPe Configuration Form Add swIPe Key Form Figure 17-18 2. Enter the key ID for authentication and encryption. To create a trusted or private link, you must specify the key you wish to use by its Key ID. Enter a number from 1 to 99. Click Authenticate packets and Encrypt packets to put either or both of these protection schemes into effect on this peer connection.
Chapter 17: The Graphical Management Interface 3. Type an alphanumeric entry to create a key string. 4. Select Add to configure the path between this peer and its remote counterpart. After your selection, the Add swIPe Path Form is displayed: Figure 17-19 Add swIPe Path Form 5.
Logfiles and Reports Configuration Form Use the reports and logfiles form (Figure 17-20) to configure basic reporting mechanisms on the Gauntlet firewall. The system automatically generates reports, and you can specify yourself and other users (in a comma-separated list) to receive these reports by e-mail. You can select the first three links on the Reports form at any time to view the most recently generated...
Page 186
You should assign either yourself or another trusted user as the system Postmaster. This user receives any generic mail addressed to “Postmaster” at the Gauntlet host. Example 17-2 contains an example of Gauntet log file entries (lines have been shortened for readability).
Page 187
Logfiles and Reports Configuration Form Figure 17-20 Reports and Logfiles Form (1 of 2)
Page 188
Chapter 17: The Graphical Management Interface Reports and Logfiles Form (2 of 2) Figure 17-21 Refer to Appendix A for command-line and file information on reports.
Bellcore that uses a challenge-response model to implement authentication. S/Key is included “as is” with the Gauntlet firewall. The IRIX executable that users need for generating responses is /usr/bin/key; it can be copied to other IRIX 5.3 or later systems.
Page 190
The group field lets you associate groups of users. Adding users and groups here does not create IRIX accounts or groups for the Note: users—just proxy server authorization. Figure 17-24 illustrates user authentication on the Gauntlet host.
Page 191
Authorizing Users Form Figure 17-22 Authorizing Users Form...
Page 192
Chapter 17: The Graphical Management Interface Figure 17-23 Add User Form...
Page 193
Authorizing Users Form Internet Gauntlet Firewall host p l i c a t i o p r o Internal network Hosts on local network User Authentication Figure 17-24 Example 17-3 shows an S/Key authentication session from the point of view of a user on a remote client.
S/Key server challenge (662 in the previous example). Configuring Gauntlet for Remote Administration To configure Gauntlet remotely, you must first run the management interface locally on the firewall to set the remote management option on. After this option is set, you can configure the firewall from a remote host or an X display at any time.
Page 195
2. Access the Gauntlet administration interface and display the introductory management form. (See steps 1 through 3 of “Configuring Gauntlet Locally” on page 118 if you need instructions.) Find the Proxy Servers Configuration option on the introductory form (shown in Figure 17-4).
Web Browsers” on page 56 for instructions. Accessing the Administration Tool from an X Display You can also use remote X display from a remote host to run the Gauntlet administration interface. To run the administration interface on a remote X display, do this: 1.
Page 197
5. Access the Gauntlet administration interface and display the introductory management form. (See steps 1 through 3 of “Configuring Gauntlet Locally” on page 118 if you need instructions.) Find the Proxy Servers Configuration option on the introductory form (shown in Figure 17-4).
Page 198
Chapter 17: The Graphical Management Interface 10. Reset the port number and timeout value, if necessary. The default port for remote Gauntlet administration is 21001; normally, it is not necessary to change this port assignment. However, if port 21001 is unavailable (because another service is using it, for example), you can assign a different port for remote administration by entering a new port number in the port number field.
Chapter 18 Managing User Authentication As discussed in other chapters, the Gauntlet firewall can permit or deny access based not just on hostname, but also on user name. In addition, your security policy may require that users use some form of strong authentication each time they access a particular host or service within their perimeter.
Using the default Gauntlet policies, this occurs any time a user from an untrusted network tries to access a service inside the perimeter. Recall that untrusted networks are those from which the firewall accepts requests only after authentication by the user.
For example, you can configure the X11 proxy to permit service to everyone in group sales. Just as is the case with user names, the groups that you create in the Gauntlet user authentication management system are not the same as the groups you create on the firewall or on the internal network.
firewall prompts for authentication it provides a challenge. The user enters their PIN (if one is required) and the challenge into the Access Key II. The Access Key II responds with a password. The user enters this value at the Gauntlet prompt, and the Gauntlet authentication server verifies this value.
Bellcore's S/Key Version 1 software. The OPIE package is available for FTP from ftp.nrl.navy.mil in /pub/security/nrl-opie/. Reusable Passwords This system, a part of the user authentication system included with the Gauntlet firewall, is a reusable password option. It is designed for administrator testing only. Every time...
Configuring Third Party Systems See the online configuration help available for the third-party systems by clicking on the authentication system name on the gauntlet-admin Authentication page. File locations may verily from those specify in these procedures. To Note: Safeword Authentication Server You must create or modify one file on the firewall so it knows where the Safeword...
ACE/Server: firewall authsrv:securidhost • where firewall is the host name of the Gauntlet firewall that you registered as the client host name on the ACE/Server. authsrv:securidhost fire-in.yoyodyne.com Configuring Network Services You do not need to modify the IRIX configuration files on the firewall to support the authentication management system.
Configuring Authentication Management System Rules If you are using the Gauntlet Firewall default configuration, you do not need to modify the configuration rules for the user authentication management system. If you have chosen a different port or a different location for your database, you must modify /usr/gauntlet/config/template.netperm-table to reflect your configuration.
Managing Users Remember that the groups that you create in the Gauntlet system are not necessarily the same as the IRIX groups you create on the firewall or on your internal network. You can of course use the same names, for easier administration.
Page 208
6. Make the information active by saving these changes (in gauntlet-admin). Creating Default Users Creating a default user allows you to authenticate users without manually creating entries for every user in the Gauntlet authentication database. Note that this option is only available for: •...
4. Leave the password for this user empty. The authentication server uses the value registered with the appropriate server. 5. Make the information active by saving these changes (in the gauntlet-admin and gauntlet-gui menuing systems) or exiting the authentication server.
You must create a new user name, assign appropriate groups and privileges, and delete the old user name. You can, however, change the long name information for a user using the gauntlet-admin interface To change the long name information, follow these steps: 1.
Managing Users Changing Protocols To change protocols, follow these steps: 1. Configure the user information in the third party authentication system if you want the user to use that system. 2. Select the record for the user name you wish to modify. 3.
Chapter 18: Managing User Authentication The example below shows a sample S/Key password change from the TELNET proxy: dimension-83: telnet firewall Trying... Connected to firewall.yoyodyne.com Escape character is ‘^’. tn-gw-> password Changing passwords Username: john Skey Challenge: s/key 644 fi58297 LOAM WOOD BOIL VASE TELL TINY New Password: ############## Retype New Password: ############## ID john s/key is 664 fi582901...
Managing Users Deleting Users Deleting users removes them from the user authentication management system. It does not remove users from your firewall or from your internal network. To delete a user, follow these steps: 1. Select the delete option for the record for the user name you wish to delete. 2.
One way of doing this is to login to the firewall using some form of strong authentication that uses one-time passwords or time-based responses. The login shell program included with the Gauntlet firewall allows you to use the same strong authentication scheme for logging into the firewall itself as you do for activity between opposite sides of your security perimeter.
Enabling Remote Login You must configure the firewall to allow remote login from other hosts. To enable remote login, use the gauntlet administration tools to turn on remote login to allow the firewall to run the TELNET daemon. Adding Support for the Login Shell You must add support for the login shell so that the operating system recognizes the login shell as a valid shell.
4. Add the user to group wheel so that they can su to root. Use vi to edit /etc/groups. Configuring the Proxy Rules If you are running the Gauntlet firewall default configuration, you do not need to modify configuration rules for the login shell. If you have chosen a different authentication server or a different location for your shell file information, you must modify...
Chapter 19: Using the Login Shell To configure the shell: • Edit the shellfile file (/usr/etc/login-shellfile) and add information about the final shell for that user: username executable parameters where username same user name that you specified when you created the user's account on the firewall.
Using the Login Shell Program not recommended), changing file permissions will prevent them from changing their shell. 2. Verify that the su command is not aliased to 'su -m' in your account (.cshrc, .login, etc.) on the firewall. The -m option attempts to retain the current environment. This causes your login shell (in this case, login-sh) to be executed by user root.
Chapter 19: Using the Login Shell Changing Password for User Account When you are using the login shell, the password is actually the strong authentication password, not the standard UNIX password. Do not use the passwd or chpass programs on your UNIX system. To change your password, you must follow the instructions for changing your strong authentication information as described on page 135.
Disk space is a lot cheaper than spending many hours debugging a problem that a program would have written to the logs. For these reasons, the components of the Gauntlet Firewall log a wide variety of activities and attributes.
ASCII text. People and shell scripts can easily parse the information. Every night the cron daemon runs a shell script that rotates, compresses, truncates, and removes the log files. The Gauntlet script /usr/gauntlet/bin/daily rotates the reports and compresses (using gzip) older log files.
files and summarize the information. The firewall automatically generates the reports that are selected in gauntlet-admin. The cron daemon is used to run a set of shell scripts that parse the information in /var/adm/SYSLOG. You do not need to do anything special to create the reports;...
100 clients by amount of traffic, and the top 100 denied clients. Each night the cron daemon on the firewall runs the daily script (/usr/gauntlet/bin/daily). When the daily report option is turned on (it is on by default), this script calls a daily report script (/usr/gauntlet/bin/daily-report) which calls other shell scripts to summarize the logs for each service.
Configuring Reports Configuring Reports The default reporting options included with the Gauntlet Firewall meet the needs of most security policies. You do not need to set or modify any options if you wish to use the default configuration, which e-mails weekly Service Summary reports and the Exception report to root as the default recipient of email sent to firewalladmin.
Chapter 20: Logging and Reporting Reading Logs and Reports The logs and reports that the firewall writes are in ASCII, easy for you and reporting scripts to read. This section presents a brief overview of what the logs and reports look like, and what the items indicate.
The example below shows the information for a fifteen-minute interval on the firewall: Security Alerts --------------- Dec 12 10:18:35 gauntlet kernel: securityalert: tcp from 10.0.1.17 on unserved port Dec 12 10:19:13 localhost authsrv[2190]: securityalert: repeated bad auth attempts penny (rlogin-gw unknown/10.0.1.17)
Page 228
Dec 12 10:19:10 localhost authsrv[2190]: BADAUTH penny (rlogin-gw unknown/10.0.1.17) Dec 12 10:19:13 localhost authsrv[2190]: BADAUTH penny (rlogin-gw unknown/10.0.1.17) Dec 12 10:19:14 localhost authsrv[2190]: BADAUTH penny too many tries (rlogin-gw unknown/10.0.1.17) Dec 12 10:20:00 gauntlet kernel: uid 0 on /: file system full...
To back up the data on your firewall, use standard IRIX backup procedures as described in the IRIX Advanced Site and Server Administration Guide. In particular, you should be sure to back up the following: • /usr/gauntlet/cgi-data • /usr/gauntlet/config •...
Even though you’ve created only one account on the firewall for the administrator, you still want to ensure that no person or process has modified your system. The Gauntlet Internet firewall is designed to make it easy to verify system integrity.
Review the changes noted in the weekly report and ensure that they are acceptable changes. For example, you may have changed the root password on the Gauntlet firewall during the past week, resulting in the report of a change in /etc/passwd. This would be an...
GUI. Viewing the Gauntlet File List If you want to see a list of the files that the Gauntlet software manipulates, click the view link in the “Managing Your Firewall” portion of the introductory form. If you do not want to use the forms-based interface, you can directly edit these files, although that is...
Page 236
Appendix A: Gauntlet System Files The online list of Gauntlet files is always the most current list. Use the online view Note: link to see the current Gaunlet file list. Table A-1 The Gauntlet File List Filename Safe? Description /*/*.old.12345 To save copies of certain configuration...
Page 237
The Gauntlet File List Filename Safe? Description config/subdomain Subdomains which will be accepted by the firewall for mail delivery if you have selected to let Gauntlet rewrite sendmail.cf. config/explicit-routes Lists explicit (static) routes to be installed into the routing tables via /etc/gated.conf. config/frequentcheck.ignore Lists egrep-style regular expressions which will be used to filter the system...
Page 238
Sendmail configuration file. It is safe to modify this file only if you have selected preserving sendmail.cf on the sendmail page. /etc/aliases Gauntlet modifies the alias for root on the firewall machine, and adds a firewalladmin alias. /etc/group Gauntlet may need to add groups to this file for various application...
Page 239
“minimize_exposure” more than once, afterwards you may tweak this file to suit your needs. /etc/inetd.conf Gauntlet will comment out all but a few IRIX-specific services which it itself needs to run. /etc/skeykeys If you add or edit a user’s...
Page 240
DNS configuration file. It is safe to modify this file only if you have selected preserving your DNS configuration on the DNS page. /var/spool/cron/crontabs/root Gauntlet adds various jobs to run at regular intervals. /usr/etc/resolv.conf Maybe DNS configuration file. It is safe to modify this file only if you have...
Netperm Table The network permissions table (/usr/gauntlet/config/netperm-table) contains configuration information for the Gauntlet Internet Firewall. The kernel, proxies and other applications read their configuration information from this table. The rules in the table include two types of information: policy rules and application-specific rules.
Appendix B: Netperm Table describing what these hosts can and cannot do. The default Gauntlet configuration defines two policies: an inside policy and an outside policy. The inside policy defines the general policies for requests from the inside (trusted) networks. This policy indicates that proxies can send requests to any destination. By default it permits some of the more commonly used proxies for inside requests: TELNET, rlogin, FTP, NNTP, HTTP, and X11.
file, the FTP proxy uses the restrictive rule and denies requests to ftp.bigu.edu. Applications Other Gauntlet applications such as the authentication server also read configuration information from the netperm-table file. Using This Information As part of the startup process a proxy or application reads the netperm-table file looking...
Modifying the Netperm Table File Modify the /usr/gauntlet/config/template.netperm-table file using your favorite text editor. Be sure to make a backup copy. You do not need to restart the proxies to make the changes take effect.
Netperm table Syntax Format Each line in the netperm-table file contains a separate configuration rule in the format: keyword: attribute valuelist where • keyword indicates the application to which the rule on that line applies. The wildcard (*) indicates that the rule is valid for all applications and proxies. Comma-separated lists of multiple keywords indicates that the rules apply to the proxies or applications listed.
Appendix B: Netperm Table Keywords This table lists some default and common keywords for policies, proxies and other applications. You can create your own keywords. Be sure that the keyword matches the value for the -as name flag you used when starting any custom proxies. Table B-1 Default and Common Keywords Keyword...
4. Place the policy lines above or below the generic policies as appropriate. For example, the generic policy for Yoyodyne uses the default Gauntlet inside policy. The security policy for Yoyodyne calls for restricting a particular group of machines (and set...
Page 248
Note that this type of policy may not prevent users on this inside network from reading news and sending e-mail. The recommended setup for the Gauntlet firewall calls for central mail and news servers on the inside networks. The news readers and mail agents on the restricted subnet communicate directly with the news and mail servers.
Adding Proxy Services Adding Proxy Services You can add or remove proxy services at any point as your security policies change. This section addresses the changes you must make to the netperm-table file to use the proxy. Consult the chapter for each proxy for more information on other configuration requirements.
Appendix B: Netperm Table For example, Yoyodyne does not want anyone on a host at Big University to have TELNET access to Yoyodyne: tn-gw: deny-hosts *.bigu.edu Later, Yoyodyne determines they only need to deny access from the dialin machines at Big University: tn-gw: deny-hosts dial*.bigu.edu...
* These commands prevent any other users who are not members of group developer (in the Gauntlet authentication database) from using the Rlogin proxy. Operation You can permit or deny access to certain proxies by time of day: To control access by time of day: 1.
Appendix B: Netperm Table 3. Add the attribute to the appropriate policy or proxy, indicating extended-permissions that the authentication server should check information specified by the operations keyword. For example, Yoyodyne wants to deny TELNET between 5:00 pm and 11:00 pm: authsrv: deny-operation user * tn-gw * * time 17:00 23:00 authsrv:...
Attribute Reference To deny access for all applications:, add a line to the appropriate deny-destination policy. Note that the smap proxies do not use the policy rules, so you can still send mail to the denied host or network. For example, Yoyodyne does not want anyone on the inside network to communicate with Big University: policy-inside: deny-destination *.bigu.edu...
Page 254
Appendix B: Netperm Table Syntax authenticate * Provided for future extensibility. Example This example requires all requests from hosts on the outside network to authenticate: policy-outside: authenticate * authserver • ftp-gw • policy-policy • pop3-gw • rlogin-gw • tn-gw Specifies the host running the authentication server that the proxies use for authenticating users.
Page 255
Attribute Reference authtype • ck-gw Specifies the host running the authentication server that circuit proxy uses. The attribute takes precedence over the attribute. authtype authserver Syntax authtype hosts [-authhost host ] [-authport port host Specifies indicates the hosts for which the circuit proxy authenticates. Specify individual machines, entire networks, or subnets.
Page 256
Appendix B: Netperm Table Example This example indicates that the authenticating HTTP proxy passes processing to /usr/local/etc/http-gw: ahttp:backend /usr/local/etc/http-gw badadmin • policy-policy • smapd Specifies the user name to which the smapd server forwards mail that it cannot deliver. Syntax badadmin user user Specifies the name of a user or alias.
Page 257
Attribute Reference Example This example places the undelivered mail in the /var/spool/smap/badmail directory: smapd: baddir /var/spool/smap/badmail badsleep • authsrv Specifies the amount of time the authentication server disallows logins from a user who has attempted (and failed) to login five times in a row. Syntax badsleep seconds seconds...
Page 258
Appendix B: Netperm Table • plug-gw • pop3-gw • • rlogin-gw • rsh-gw • syb-gw • tn-gw • policy-policy Specifies the maximum number of child processes that each daemon allows to run at a given time. Syntax child-limit processes processes Specifies the maximum number of child processes that each daemon allows to run at a given time.
Page 259
Attribute Reference Syntax circuitexec programs programs Specifies the location and name of the program that the circuit proxy runs once it allows a connection from the client program. Example This example indicates that the circuit proxy is in /usr/local/etc ck-gw: circuitexec /usr/local/etc/circuit circuitsperuser •...
Page 260
Appendix B: Netperm Table Syntax circuit-timeout minutes minutes Specifies the number of minutes that there is no client/server activity before disconnecting. Example This example indicates that the client/server activity can be idle for 15 minutes before disconnecting: ck-gw: circuit-timeout 15 client •...
Page 261
Attribute Reference lpcommands Specifies the lp commands that the clients can issue when sending jobs through the proxy. The space between the "{" and "}" and the list entries is required. Valid keywords, which correspond to the first level lp protocol commands, are: restart, print, status_sh, status_ln, remove Indicates that the deny or log command applies to all lp commands.
Page 262
Appendix B: Netperm Table Example This example indicates that the authentication server uses the authentication database in /usr/local/etc/fw-authdb: authsrv: database /usr/local/etc/fw-authdb denial-msg • ftp-gw • policy-policy • rlogin-gw • tn-gw Specifies the file that the proxy displays when it denies access to a user because they do not have permission to use the proxy.
Page 263
Attribute Reference Specifies the file that the proxy displays when it denies access to a user because they are trying to access a destination they are not permitted to access. Syntax denydest-msg file file Specifies the name of the file the proxy displays when it denies access to a user because they are trying to access a destination that they are not permitted to access.
Page 264
Appendix B: Netperm Table Syntax [permit |deny]-destination destination-list permit Indicates hosts to which the proxies and applications can send requests. deny Indicates hosts to which the proxies and applications cannot send requests. destination-list Specifies single hosts, entire networks, or subnets. Specify by IP address or hostname.
Page 265
Attribute Reference Specifies the directory that the proxy makes its root directory before providing service. This option is equivalent to the -chroot option in previous versions. Syntax directory directory directory Specifies the directory that the proxy makes its root directory before providing service.
Page 266
Appendix B: Netperm Table exec • netacl Specifies a program that the proxy invokes to handle the service. This option is equivalent to the -exec option in previous versions. Syntax exec program [ options ] program Specifies the name of the program to invoke. options Specifies the command line options for the program.
Page 267
Attribute Reference Example This example indicates that the proxies check for extended permissions when authenticating users from the outside network: policy-outside: extended-permissions feature • http-gw Allows the proxy to control general features rather than specific portions of the HTTP protocol. Syntax 1 Specifies particular features of that are explicitly permitted or denied.
Page 268
Appendix B: Netperm Table force_source_address • plug-gw Specifies that the plug proxy uses the IP address of the originating host as the source address of the packet when sending the request on to the destination host. Syntax force_source_address true If this option is not specified, the firewall uses its IP address as the source address of the packet, causing all packets to look like they originated on the firewall.
Page 269
Attribute Reference Syntax forward pattern -protocol protocol -tohost host:port pattern Specifies the pattern in the URL for which the HTTP uses this rule. Quotes are not required. protocol Specifies the protocol that the HTTP proxy uses when talking to the remote host. Valid values are: FTP, GOPHER, HTTP host:port Specifies the host and port to which the HTTP proxy forwards requests and the...
Page 270
Appendix B: Netperm Table • FTP—FTP Requests • GOPHER—Gopher Requests • HTTPREQ—HTTP Requests • PLUS—Gopher+ Commands • TEXT—Read Files • UNKNOWN—Unknown Requests • WAIS—Search Commands • WRITE—Write Data Example This example indicates that the FTP proxy does not allow people to retrieve (RETR) files: ftp-gw: deny-function RETR This example indicates that the HTTP proxy does not allow people to perform FTP requests through the HTTP proxy:...
Page 271
Attribute Reference • smapd • tn-gw • x-gw Specifies the group ID the proxy uses when running. Syntax groupid group group Specifies the name of the group as either a name or numeric id from the /etc/group file. Example This example indicates that the Info Server runs using the group ID of uucp: info-gw: groupid uucp...
Page 272
Appendix B: Netperm Table Example This example indicates the HTTP proxy on the firewall inside the network (fw-engineering.engineering.yoyodyne.com) hands all requests to the firewall between the corporate network and the Internet (firewall.yoyodyne.com): http-gw: handoff firewall.yoyodyne.com header • http-gw Specifies HTTP headers that the proxy permits or denies. Denying a header causes the HTTP proxy to remove that information from the request when it sends it to the destination host.
Page 273
Attribute Reference help-msg • ftp-gw • policy-policy • rlogin-gw • tn-gw Specifies the file that the proxy displays when the user accesses the help command. Syntax help-msg file file Specifies the name of the file the proxy displays when the user accesses the help command.
Page 274
Appendix B: Netperm Table • tn-gw • x-gw Specifies the hosts for which the proxy uses a particular policy, or the hosts that can use the proxy. Specifies the hosts that cannot use the proxy. Syntax permit-hosts hosts -policy policy deny-hosts hosts permit Indicates hosts for which the proxy uses a particular policy, or the hosts that can...
Page 275
Attribute Reference authsrv: permit-hosts 127.0.0.1 • ftp-gw • http-gw • info-gw • lp-gw • policy-policy Specifies that proxies log only the operations listed, rather than all operations (the default). This option is equivalent to the -log command in previous versions. Syntax log operations operations...
Page 276
Appendix B: Netperm Table Valid values for the HTTP proxy are: • BINARY Read Files • List Directories • EXEC Exec Commands • FTP Requests • GOPHER Gopher Requests • HTTPREQ HTTP Requests Example This example requests that the trusted policy log only retrieve (RETR) and storage (STOR) activities: policy-inside: RETR STOR...
Page 277
Attribute Reference nobogus authsrv Specifies that the authentication server indicates when a userid does not exist when users attempt to login and fail. Syntax nobogus true If this option is not specified and a user enters a non-existent user name, the authentication server always responds with a bogus challenge.
Page 278
Appendix B: Netperm Table service Specifies the name of a service for which this rule applies. Valid values are: ftp-gw—FTP proxy rlogin-gw—Rlogin proxy rsh-gw—Rsh proxy tn-gw—TELNET proxy *—all of these proxies destination Specifies the hosts to which the proxies can or cannot send requests. Specify individual machines, entire networks, or subnets.
Page 279
Attribute Reference Syntax ourname hostname hostname Specifies the name of the host that the HTTP proxy uses when prepending URLs. Specify an individual interface. Use an IP addresses or host name. Example This example indicates that the HTTP proxy (if needed) prepends firewall.yoyodyne.com (the inside interface of the firewall) to all URLs when attempting to access them: http-gw:...
Page 280
Appendix B: Netperm Table This example allows users to change their passwords using the TELNET proxy. If this is the only permit-password change rule in the netperm-table file, users can only change their password from the TELNET proxy (not from the Rlogin proxy). tn-gw: permit-password change pop-server...
Page 281
Attribute Reference hosts Specifies hosts from which connections can originate. Specifies single hosts, entire networks, or subnets. Specify by IP address or hostname. The wildcard * is valid desthost Indicates hosts to which the plug proxy connects. hosts Specifies single hosts, entire networks, or subnets. Specify by IP address or hostname.
Page 282
Appendix B: Netperm Table printer Indicates the printer queue name. serverqueue Specifies the name of the remote printer queue to which proxy sends the print jobs. If server queue is not specified, the client's queue name will be used as server queue name.
Page 283
Attribute Reference Syntax [permit | deny]-proxy proxy-list permit Indicates proxies that this policy allows to run. deny Indicates hosts that this policy does not allow to run. Including a deny-proxy rule has the same effect as not including those proxies in a permit-proxy rule. proxy-list Specifies the name of the proxy.
Page 284
Appendix B: Netperm Table sendmail • smapd Specifies an alternate path for sendmail, or another mail delivery program you are using to deliver your mail inside your perimeter. Syntax sendmail program program Specifies an alternate path for the sendmail executable or other program you are using to deliver mail.
Page 285
Attribute Reference -timeout minutes Specifies the number of minutes the client/ server connection is idle before disconnecting for this service -nookay Specifies that the proxy does not prompt the user to confirm before listening on the service port for a connection. Example This example indicates that the circuit proxy provides service for an Oracle server on the host db.clientsite.com:...
Page 286
Appendix B: Netperm Table • policy-policy • pop3-gw • rap-gw • rlogin-gw • rsh-gw • smap • smapd • tn-gw • x-gw Specifies the amount of time the proxy is idle (with no network activity) before disconnecting. Syntax timeout seconds seconds Specifies the number of seconds the proxy is idle before disconnecting.
Page 287
Attribute Reference Syntax permit-unknown names names Specifies a list of names, separated by spaces. The wildcard * is valid. If the user name is not in the authentication database, or in the list of names, the authentication server logs the attempt and indicates that the user is not valid. If the user name is found in the list of names, the authentication server assigns the user name to the group “unknown.”...
Page 288
Appendix B: Netperm Table unknown • authsrv Specifies a list of additional names that the authentication server checks (in addition to the authentication database) when checking for extended permissions on a per user basis. If the user name is not in the authentication database, or in the list of names, the authentication server logs the attempt and indicates that the user is not valid.
Page 289
Attribute Reference Example This example indicates that you do not want to see the carriage return / line feed characters in any URLs: http-gw: url-filter %0D%0A userid • ftp-gw • http-gw • info-gw • lp-gw • netacl • plug-gw • policy-policy •...
Page 290
Appendix B: Netperm Table Example This example indicates that the smap and smapd processes run as the uucp: smap, smapd: userid uucp user-servers • ck-gw Specifies the servers a particular user can access. Also specifies which services a particular users sees when they use the circuit proxy menu. Syntax user-servers { user user | group group } [-deny] service user user...
Page 291
Attribute Reference Syntax user-timeout minutes minutes Specifies the number of minutes the proxy is active with no client connections before disconnecting. Example This example indicates that the proxy waits 10 minutes without an active client connection before disconnecting: ck-gw: user-timeout 10 wakeup •...
Page 292
Appendix B: Netperm Table Specifies the file that the proxy displays as a welcome banner upon successful connection to the proxy. Syntax welcome-msg file file Specifies the name of the file the proxy displays as a welcome banner upon successful connection to the proxy. If no file is specified, the proxy generates a default message.
Page 293
Attribute Reference xgateway • policy-policy • rlogin-gw • tn-gw Specifies X11 proxy permissions. Syntax [permit | deny]-xgateway * permit Indicates that the TELNET and Rlogin proxies can accept requests to start the X11 proxy. deny Indicates that the TELNET and Rlogin proxies do not accept requests to start the X11 proxy.
Virtual Private Networks This appendix explains how you can use your Gauntlet Internet Firewall to exchange encrypted traffic with other Gauntlet Firewalls. This feature is only available in the Unites States domestic version of the Gauntlet Note: product. Packets on the Internet flow through a variety of wires and fibers owned and managed by a variety of organizations.
Understanding Virtual Private Networks A VPN is considered private because all of the traffic that passes through the firewall to another part of the virtual private network, is encrypted. Any program watching the packets flow by would simply see a stream of encrypted data. Without the key used to encrypt the data, snoopers cannot make much use of the information.
Appendix C: Virtual Private Networks Privacy Without Trust (Private Link) A VPN without trust does not expand the concept of trust to include the machines within the remote defense perimeter. In this case, the traffic between the two networks is encrypted, providing the privacy.
How It Works You can create passthrough links for host-to-host, network-to-network, or host-to-network communications. The most common use of a passthrough link specifies a host-to-host link for two firewalls. How It Works The Firewall handles VPNs by examining all outbound traffic and encrypting any traffic between hosts that are marked as encrypted peers.
Appendix C: Virtual Private Networks Routing the Packet If the VPN between the two networks uses privacy with trust, the routing layer forwards the packet on to the appropriate host on the inside network. If the VPN between the two networks uses just privacy with no trust, the routing layer hands the packet to the appropriate service or proxy.
Getting Ready for SSL Configuration You configure SSL on the Gauntlet firewall using the Netscape administration utility. If you perform this procedure on a host other than the firewall, you can use a Netscape browser to access the firewall after you start the administration utility.
Appendix D: Configuring SSL on the Gauntlet Firewall type on both entries lines unless you have changed the defaults. admin 2. Go to the Netscape Server Selector page. This page lets you choose the Netscape server that you want to configure. If you are configuring the firewall from a remote host, use this URL to access the Netscape...
4. Save your entries in the key pair file in the correct location. Use this full pathname as the keyfile location when you save it: /usr/ns-home/httpd-gauntlet/config/ServerKey.db Supplementary Instructions for Generating a Certificate After you generate the key pair (see “Supplementary Instructions for Generating a Key Pair”...
Help screens for the install certificate procedure: 1. Choose Request Certificate from the sidebar menu on the Encryption page. 2. In the Certificate Name field, enter the fully qualified hostname of the Gauntlet firewall.
Page 306
Tell Us About This Manual As a user of Silicon Graphics products, you can help us to better understand your needs and to improve the quality of our documentation. Any information that you provide will be useful. Here is a list of suggested topics: •...
Need help?
Do you have a question about the Gauntlet and is the answer not in the manual?
Questions and answers