20.8 ENHANCED SECURITYOpenView supports industry standard system security features. These features introduce multiple layers of security enhancements. Some of these are at the socket layer and go up through the application layer. In this section, we discuss some of the most popular security components available for TCP/IP environments. When the enhanced security options are installed on the management server, you have the option to choose the security method to configure on a node-by-node basis. 20.8.1 Data Encryption Standard (DES)Private KeyDES is a single-symmetric key used for encryption and decryption. The key is a single large random-number (from 64 up to 128 bits), used by the client and server to encrypt and decrypt messages. Here is an example of how the algorithm works: Node A sends a message that is encrypted with the fully qualified domain name (FQDN) of the node. A message arrives at the server after transmission over the network is decrypted using the client's FQDN. When authenticated, the message moves to the next upstream process. The message is decrypted and authentication of the server is performed on the managed node by a decryption routine. 20.8.2 RSAPublic KeyDeveloped by Ronald Rivest, Adi Shamir, and Leonard Aldeman, RSA differs from DES because the encryption algorithm uses two keys. RSA is based on a standard called Public-Key Cryptography (PKC). Originally based on the ANSI draft standard X9.42 an algorithm developed by Diffie-Hellman, one key is private and the other key is public. The size of the key generated by the algorithm is up to 512 bits. The PKC servers keep users' public keys. The server validates the users' ownership of their public keys. Here is an example of how the algorithm works: Node A sends a message to server encrypted with the server's public key. At the server, the server's private key is used to decrypt the message. When the server sends a message to the client, it is encrypted with the client's public key and decrypted by the client using a private key known only to the client. 20.8.3 KerberosKerberos was developed as part of the Massachusetts Institute of Technology project Athena (and specified in RFC 1510). Kerberos is an add-on service that provides authentication and can be used with many network protocols including RPC. Kerberos uses Data Encryption Standard (DES) encryption to protect data as it travels across the network. DES uses tickets (also called keys) that are encrypted with a secret password and the ticket can only be decrypted at the other end with the same secret password. The secret password is stored on the Kerberos server.The Kerberos server provides a centralized authentication service. This key distribution function is to mutually authenticate clients to servers. There are three services involved in completion of the user or process authentication: Key Distribution Center (KDC), Authentication Service (AS), and Ticket Granting Service (TGS). The six steps in the authentication process are outlined here for reference:
20.8.4 Distributed Compute Environment (DCE)Distributed Computer Environment (DCE), developed by the Open Software Foundation (OSF) provides configuration management, distributed file sharing, remote procedure calls, and user authentication. DCE enhances the Kerberos authentication model by using a combination of packet encryption, time-based authentication credentials, and a security server (called a "trusted third-party"). The DCE security server maintains an access control list similar to a database of users, servers, and security policies (this collection of data is referred to as the registry service). Authenticated RPC requires that each DCE principal (user, application program, computer, DCE cell, or DCE service) use a key known only to the client and the security server. The key is generated from a users secret password and is maintained by the registry service. Clients and servers use authenticated RPC based on the key (also called a ticket). The steps involved with obtaining the ticket are outlined here for reference: 20.8.5 GSS APIsThe Generic Security Service (GSS)-Application Program Interface (API) is provided with OVAS as a customizable security solution that enables you to develop and implement your own security requirements. GSS is defined by RFC-2743 and is incorporated as OVO's security protocol. When installed, the GSS functionality is enabled for the managed node communications via Actions 20.8.6 HTTP and S-HTTPSSL encryption for HTTP ensures the integrity of transactions and the confidentiality of information exchanged via HTTP. The early development of the S-HTTP is a joint effort between Enterprise Integration Technologies (EIT) and the National Center for Supercomputing Applications (NCSA) at the University of Illinois and RSA Data Security. Several S-HTTP web servers are based on RSA's public-key cryptography and EIT's Secure HTTP software. S-HTTP provides application-level transaction security and supports digital signatures at the application level. OpenView uses the Public-Key Encryption model provided by Entrust.Additional information about HTTP and S-HTTP can be found at http://www.dmc.ie/maim2002/mairead/practice/projects/MP4/indesl and http://www.eit.com/projects/s-http. Also refer to the HP OpenView Operations HTTPS Agent Concepts and Configuration Guide. 20.8.7 Secure Socket Layer (SSL)SSL is an application-independent protocol. Sockets live at layer-5 of the OSI model. Sockets are either connection-oriented or connectionless. Connection-oriented sockets allow data flow (back and forth as needed) between the client and server. As socket, when established, represents the IP address and a known port number and is represented as follows:10.2.12.14:23 represents the IP address and the well known telnet portSockets are used locally for inter-process communications (IPC) and for Internet connections, as shown in the previous example. In using a TCP Socket, the connection setup uses a file descriptor for subsequent read and write operations. Check the established connections with the command netstat in from the command line. Basic operation of SSL transmissions include the following steps: 20.8.8 PAM AuthenticationThe HP Configuration Guide for Kerberos Products on HP-UX states the following about PAM authentication: "HP-UX provides Kerberos authentication as part of the Pluggable Authentication Module (PAM) architecture that is specified in RFC 86 of the Open Group. PAM allows multiple authentication technologies to coexist on HP-UX. A configuration file determines which authentication module to use, in a manner transparent to the applications that use the PAM library."OVO user accounts exist in two places on the management server, the database and the password file. The account names and passwords for each configured OVO user are authenticated by the PAM modules that are installed on the management server operating system. PAM authentication is configured in the /etc/pam.conf files. The configuration requires valid entries for each user in the OVO database (new users are added via the GUI) and the /etc/passwd file (with entries for all users accounts that access OVO). 20.8.9 SOAP (XML)The World Wide Web Consortium (www.w3c.org) defines SOAP Version 1.2 as a lightweight protocol intended for exchanging structured information in a decentralized, distributed environment. It uses XML technologies to define an extensible messaging framework providing a message construct that can be exchanged over a variety of underlying protocols. The framework has been designed to be independent of any particular programming model and other implementation specific semantics.SOAP (XML) technology replaces the DCE-RPCs for use with the HTTPS-based agent. |