Movatterモバイル変換


[0]ホーム

URL:


Skip Navigation Links
Exit Print View
Link to oracle.comman pages section 1M: System Administration Commands    Oracle Solaris 11 Information Library
Oracle Technology Network
Library
PDF
Print View
Feedback
search filter icon
search icon
 Search Scope:

Document Information

Preface

Introduction

System Administration Commands - Part 1

System Administration Commands - Part 2

mail.local(1M)

makedbm(1M)

makemap(1M)

makeuuid(1M)

masfcnv(1M)

mdlogd(1M)

mdmonitord(1M)

mdnsd(1M)

medstat(1M)

metaclear(1M)

metadb(1M)

metadetach(1M)

metadevadm(1M)

metahs(1M)

metaimport(1M)

metainit(1M)

metaoffline(1M)

metaonline(1M)

metaparam(1M)

metarecover(1M)

metarename(1M)

metareplace(1M)

metaset(1M)

metassist(1M)

metastat(1M)

metasync(1M)

metattach(1M)

mib2mof(1M)

mibiisa(1M)

mkbootmedia(1M)

mkdevalloc(1M)

mkdevmaps(1M)

mkfifo(1M)

mkfile(1M)

mkfs(1M)

mkfs_pcfs(1M)

mkfs_udfs(1M)

mkfs_ufs(1M)

mknod(1M)

mkntfs(1M)

mkpwdict(1M)

modinfo(1M)

modload(1M)

modunload(1M)

mofcomp(1M)

mofreg(1M)

monacct(1M)

monitor(1M)

mount(1M)

mountall(1M)

mountd(1M)

mount_hsfs(1M)

mount_nfs(1M)

mount_pcfs(1M)

mount_smbfs(1M)

mount_tmpfs(1M)

mount_udfs(1M)

mount_ufs(1M)

mpathadm(1M)

mpstat(1M)

msgid(1M)

mvdir(1M)

named(1M)

named-checkconf(1M)

named-checkzone(1M)

named-compilezone(1M)

ncaconfd(1M)

ncheck(1M)

ncheck_ufs(1M)

ndd(1M)

ndmpadm(1M)

ndmpd(1M)

ndmpstat(1M)

netadm(1M)

netcfg(1M)

netcfgd(1M)

netservices(1M)

netstat(1M)

netstrategy(1M)

newaliases(1M)

newfs(1M)

newkey(1M)

nfs4cbd(1M)

nfsd(1M)

nfslogd(1M)

nfsmapid(1M)

nfsref(1M)

nfsstat(1M)

nscadm(1M)

nscd(1M)

nscfg(1M)

nslookup(1M)

nsupdate(1M)

ntfscat(1M)

ntfsclone(1M)

ntfscluster(1M)

ntfscmp(1M)

ntfscp(1M)

ntfsfix(1M)

ntfsinfo(1M)

ntfslabel(1M)

ntfsls(1M)

ntfsprogs(1M)

ntfsresize(1M)

ntfsundelete(1M)

nulladm(1M)

nwamd(1M)

obpsym(1M)

oplhpd(1M)

parted(1M)

pbind(1M)

pcitool(1M)

pginfo(1M)

pgstat(1M)

picld(1M)

ping(1M)

pkg2du(1M)

pkgadd(1M)

pkgadm(1M)

pkgask(1M)

pkgchk(1M)

pkgcond(1M)

pkgrm(1M)

plockstat(1M)

pntadm(1M)

polkit-is-privileged(1M)

pooladm(1M)

poolbind(1M)

poolcfg(1M)

poold(1M)

poolstat(1M)

ports(1M)

poweradm(1M)

poweroff(1M)

powertop(1M)

pppd(1M)

pppoec(1M)

pppoed(1M)

pppstats(1M)

praudit(1M)

prctmp(1M)

prdaily(1M)

projadd(1M)

projdel(1M)

projmod(1M)

prstat(1M)

prtacct(1M)

prtconf(1M)

prtdiag(1M)

prtdscp(1M)

prtfru(1M)

prtpicl(1M)

prtvtoc(1M)

psradm(1M)

psrinfo(1M)

psrset(1M)

pwck(1M)

pwconv(1M)

quot(1M)

quota(1M)

quotacheck(1M)

quotaoff(1M)

quotaon(1M)

raidctl(1M)

ramdiskadm(1M)

rarpd(1M)

rcapadm(1M)

rcapd(1M)

rctladm(1M)

rdate(1M)

rdisc(1M)

reboot(1M)

rem_drv(1M)

remove_allocatable(1M)

removef(1M)

reparsed(1M)

repquota(1M)

restricted_shell(1M)

rexd(1M)

rexecd(1M)

rlogind(1M)

rmmount(1M)

rmt(1M)

rmvolmgr(1M)

rndc(1M)

rndc-confgen(1M)

roleadd(1M)

roledel(1M)

rolemod(1M)

root_archive(1M)

route(1M)

routeadm(1M)

routed(1M)

rpcbind(1M)

rpc.bootparamd(1M)

rpcinfo(1M)

rpc.mdcommd(1M)

rpc.metad(1M)

rpc.metamedd(1M)

rpc.metamhd(1M)

rpc.rexd(1M)

rpc.rstatd(1M)

rpc.rusersd(1M)

rpc.rwalld(1M)

rpc.smserverd(1M)

rpc.sprayd(1M)

rpc.yppasswdd(1M)

rpc.ypupdated(1M)

rquotad(1M)

rsh(1M)

rshd(1M)

rstatd(1M)

rtc(1M)

rtquery(1M)

runacct(1M)

rusersd(1M)

rwall(1M)

rwalld(1M)

rwhod(1M)

sa1(1M)

sa2(1M)

sadc(1M)

sar(1M)

sasinfo(1M)

savecore(1M)

sbdadm(1M)

scadm(1M)

sckmd(1M)

scmadm(1M)

sconadm(1M)

sdpadm(1M)

sendmail(1M)

sf880drd(1M)

sftp-server(1M)

shadowd(1M)

shadowstat(1M)

share(1M)

shareall(1M)

sharectl(1M)

share_nfs(1M)

share_smb(1M)

showmount(1M)

shutacct(1M)

shutdown(1M)

slpd(1M)

smattrpop(1M)

smbadm(1M)

smbd(1M)

smbiod(1M)

smbiod-svc(1M)

smbios(1M)

smbstat(1M)

smrsh(1M)

smtnrhdb(1M)

smtnrhtp(1M)

smtnzonecfg(1M)

smtp-notify(1M)

sndradm(1M)

sndrd(1M)

sndrsyncd(1M)

snmpdx(1M)

snmp-notify(1M)

snmpXwbemd(1M)

snoop(1M)

soconfig(1M)

soladdapp(1M)

soldelapp(1M)

solstice(1M)

sppptun(1M)

spray(1M)

sprayd(1M)

srptadm(1M)

sshd(1M)

ssh-keysign(1M)

startup(1M)

statd(1M)

stclient(1M)

stmfadm(1M)

stmsboot(1M)

strace(1M)

strclean(1M)

strerr(1M)

sttydefs(1M)

su(1M)

sulogin(1M)

svadm(1M)

svcadm(1M)

svccfg(1M)

svc.configd(1M)

svc.ipfd(1M)

svc.startd(1M)

swap(1M)

sync(1M)

syncinit(1M)

syncloop(1M)

syncstat(1M)

sysconfig(1M)

sysdef(1M)

syseventadm(1M)

syseventconfd(1M)

syseventd(1M)

syslogd(1M)

talkd(1M)

tapes(1M)

tcxconfig(1M)

telnetd(1M)

tftpd(1M)

th_define(1M)

th_manage(1M)

tic(1M)

tncfg(1M)

tnchkdb(1M)

tnctl(1M)

tnd(1M)

tninfo(1M)

tpmadm(1M)

traceroute(1M)

trapstat(1M)

ttymon(1M)

tunefs(1M)

turnacct(1M)

txzonemgr(1M)

tzreload(1M)

tzselect(1M)

uadmin(1M)

ucodeadm(1M)

ufsdump(1M)

ufsrestore(1M)

umount(1M)

umountall(1M)

umount_smbfs(1M)

unlink(1M)

unshare(1M)

unshareall(1M)

unshare_nfs(1M)

System Administration Commands - Part 3

tncfg

- configure trusted networking properties

Synopsis

tncfg [-ttemplate] [-e|-S [files|ldap]] [subcommand]
tncfg [-ttemplate] [-e|-S [files|ldap]]-fcommand_file
tncfg-zzone [-e] [subcommand]
tncfg-zzone [-e]-fcommand_file
tncfg help

Description

Thetncfg utility creates, modifies, and displays the configuration of various networkingproperties related to Trusted Extensions. The command requires that the SMF service,svc:/system/labeld is enabled. It can be executed only in the global zone.

Templates

A template is a collection of network security properties that define therules for labeling packets received from remote hosts. Two host types aresupported:cipso andunlabeled. Each template must specify one of these twohost types. Hosts that are trusted to specify their own labels are assignedtocipso templates. Otherwise, hosts may be assigned tounlabeled templates, inwhich a single default label must be specified.

Hosts can be specified using hostnames, IP addresses, or masks. When masksare used, a prefix length that specifies how many bits are requiredfor a match must be appended . Hosts cannot be assigned tomore than one template. When masks are used, the entry with thelongest matching prefix is used to associate a host with a template. Packetsfrom hosts without a matching template are dropped.

Each template must include an upper and lower bound specifying the accreditationrange of accepted labels. Additionally, up to four auxiliary labels can bespecified to enumerate labels outside of this range. Services bound to multilevelports can accept packets from hosts whose labels are within the accreditation range,or match one of the auxiliary labels.

Normally, the template settings and their corresponding hosts are persistently maintained inlocal files or by means of an LDAP directory, depending on the-S option. These settings are automatically loaded into kernel memory when theuser commits the updates. If the-e (ephemeral) option is specified, only thecurrent in-memory properties are displayed and updated. However, the list of hostsassociated with an in-memory template is generally incomplete. To view the matchingtemplate for a specific host, use theget subcommand.

By default, an unlabeled template,admin_low, is installed with a default labelofADMIN_LOW, and two mask entries matching any IPv4 or IPv6 address,so that the global zone is initially able to contact anyunlabeledhosts. It is recommended to remove these two mask entries once your networksecurity policy is established. An additional template,cipso, is installed with nomatching hosts. By default all local IP addresses are implicitly associated withthis template, but it is recommended that they should be explicitly added tothis or a newcipso-type template.

Searches for template and host entries are resolved in the order specifiedby means of the name service configuration file,/etc/nsswitch.conf. The keywords,tnrhdbandtnrhtp, are used to specify the search order for hosts andtemplates, respectively. Both thefiles andldap repositories are supported, but it isrecommended to specifyfiles first.

Creating or modifying a template requires the authorizationsolaris.label.network.manage, which is includedin the Object Label Management rights profile.

Zones

Zones are isolated execution environments described inzones(5). Trusted Extensions requires azone brand calledlabeled to which special properties apply. Each labeled zone musthave a unique label property at which it executes processes. This isalso the label at which it will accept packets from remote hostsfor services bound to single-level ports. Explicit multilevel port can also bespecified. Services with the privilegenet_bindmlp can bind to these ports, andaccept packets within the accreditation range or the auxiliary label set associatedwith the remote host.

Non-global zones must be configured usingzonecfg(1M) prior to configuring these properties.In general, updates to each zone's properties, including the global zone, are appliedwhen it is booted. However, the multilevel port properties of running zonesare reloaded into kernel memory when updates are committed. If the-e(ephemeral) option is specified, the zone must be in the ready orrunning state, and only its multilevel port properties can be updated.

Creating or modifying a zone's trusted networking properties requires the authorizationsolaris.label.zone.manage,which is included in the Object Label Management rights profile.

Properties

The set of valid properties depends on whether the-t or-zoption was used. The two sets are referred to as the templatecontext and the zone context.

Only a single property value can be specified at a time. Valuescontaining white space must be quoted. An equal sign is required betweenthe property and its value.

The values that can be specified in the template context properties aredescribed below.

name=template_name

The initial value for the name is specified using-t option using the command line. If the name is changed, the current template properties are applied to the newly named template. In this way an existing template can be cloned for subsequent editing. However, to avoid conflicts, the host entries from the initial template are not copied to the new template. The specified name must not match an existing template.

host_type=cipso|unlabeled

When theunlabeled host type is used, the value specified using the thedef_label property is implicitly applied to the received packets. Thecipso host type is used for hosts that are trusted to explicitly label their packets. The default isunlabeled.

def_label=sensitivity_label

The default label assigned to IP packets that are not explicitly labeled by means ofcipso or IPsec.

doi=integer

A positive integer specifying the Domain of Interpretation for the binary representation of the labels. The default is1.

min_label=sensitivity_label

The minimum label in the accreditation range for IP packets that are accepted by multilevel services.

max_label=sensitivity_label

The maximum label in the accreditation range for IP packets that are accepted by multilevel services.

aux_label=sensitivity_label

Additional labels, outside of the accreditation range, for IP packets that are accepted by multilevel services. Up to four labels may be specified, using theadd subcommand repetitively.

host=hostname|IP address[/prefix]

A hostname or an IP address to which the template properties apply. For IP addresses, both IPv4 and IPv6 formats can be used, followed by an optional slash and prefix length specifying the number of bits to match again IP addresses. The IPv4 address0.0.0.0 has an implied prefix length of zero, and matches any IPv4 address. Multiple host values can be specified, using theadd subcommand repetitively. There is no specific limit.

The values that may be specified in the zone context properties aredescribed below.

name=zone_name

The name of the zone, which must have previously been configured usingzonecfg(1M). The initial value for the name is specified using-z option on the command line. If the name is changed, the current zone properties are applied to the newly named zone. In this way an existing template can be cloned for subsequent editing. However, to avoid conflicts, the initial label value is not copied to the new zone configuration. The specified name must correspond to an existing zone without a trusted networking configuration.

label=sensitivity_label

The sensitivity label of the zone. It must be unique for each zone. The global zone value must beadmin_low.

visible=yes|no

Specifies whether the zone responds to ping requests from hosts whose labels don't match the zone's label. The default isno.

mlp_private=port|[-port2]/tcp|udp

A single port number, or a range of ports that privileged services can bind to and then accept requests from clients whose labels are with the accreditation range or the set of auxiliary labels specified in their matching templates. The port specification must be followed by a a protocol, eithertcp orudp. This value applies to all interfaces that are private to the zone. Multiplemlp_private values can be specified, using theadd subcommand repetitively. This is only limited by the number of available ports.

mlp_shared=port|[-port2]/tcp|udp

A single port number, or a range of ports that privileged services can bind to and then accept requests from clients whose labels are with the accreditation range or the set of auxiliary labels specified in their matching templates. The port specification must be followed by a protocol, eithertcp orudp. This value applies to anyall-zones interfaces, and must not overlap with themlp_shared ports specifications for other zones. Multiplemlp_shared values can be specified, using theadd subcommand repetitively. This is only limited by the number of available ports.

Options

The following options are supported:

-e

Specifies that the data is ephemeral, affecting only what is currently loaded into kernel memory.

-fcommand_file

Specifies the name oftncfg command file.command_file is a text file oftncfg subcommands, one per line.

-ttemplate

Specifies the template name. If the named template does not exist, a new template is created. If neither-t nor-z is specified, the template context is assumed usingcipso as the default template name.

-Srepository

The valid repositories arefiles andldap. The repository specifies which name service will be updated. The default repository is files.

-zzone

Specifies the zone name. The zone must have previously been configured by means ofzonecfg(1M).

Sub-commands

Subcommands can be provided on the command line or interactively. Multiple subcommands,separated by semicolons, can be specified on the command line by enclosingthe entire set in quotation marks. The lack of subcommands implies aninteractive session, during which auto-completion of subcommands can be invoked using the tabkey.

The add, clear, and remove subcommands are used for properties that canaccept multiple values. However, only one value can be specified at atime.

Subcommands which can result in destructive actions or loss of work havean-F option to force the action. If input is from aterminal device, the user is prompted when appropriate if such a subcommandis given without the-F option. Otherwise, the action is disallowed, witha diagnostic message written to standard error.

The following subcommands are supported:

addproperty-name=property-value

Adds the specified value to the current property values. This subcommand can only be applied to properties that accept multiple values. Use theset subcommand for single-value properties.

clearproperty-name

Clears all of the values for the property. Only those properties that accept multiple assignments, using theadd subcommand, can be cleared.

commit

Commits the current configuration from memory to stable storage and into the kernel. The configuration must be committed for the changes to take effect. Until the in-memory configuration is committed, you can remove changes with therevert subcommand. The commit operation is attempted automatically upon completion of atncfg session. Since a configuration must be correct to be committed, this operation automatically does averify.

delete [-F]

Deletes the specified template or zone configuration from the current name service.

Specify the-F option to force the action. If the deletion is allowed, its action is instantaneous and the session is terminated.

export [-foutput-file]

Displays configuration to standard output. Use the-f option to display the configuration tooutput-file. This option produces output in a form suitable for use in a command file.

get host=hostname |IP address[/prefix]

Displays the template name corresponding to the specified host using the kernel's in-memory mapping.

help [usage] [subcommands] [properties] [subcommand] [property]

Displays general help or help about a given topic.

infoproperty-name

Displays information about the current template or zone, or the specified property in a parseable format.

list

Lists the names of the templates or zones that have been configured.

removeproperty-name=property-value

Removes the specified value from the property. Only those properties that accept multiple assignments, using theadd subcommand, can be removed.

setproperty-name=property-value

Sets a given property name to the given value. Properties that can take multiple values are assigned using theadd subcommand, instead ofset.

verify

Verifies the current configuration for correctness:

  • The required properties are specified;

  • the values are valid for each key word;

  • the user is authorized to specify the values.

revert [-F]

Causes the configuration to revert to the last committed state. The-F option can be used to force the action.

exit [-F]

Exits thetncfg session. Acommit is automatically attempted if needed. You can also use an EOF character to exittncfg. The-F option can be used to force the action.

Examples

Example 1 Using theinfo Subcommand

The command below displays the properties of acipso template are displayed.The subcommand is specified on the command line.

example%tncfg -t cipso info             name=cipso             host_type=cipso             doi=1             min_label=ADMIN_LOW             max_label=ADMIN_LOW             host=10.5.233.74

Example 2 Using theexport Subcommand

The following example shows an interactive session that exports the configuration ofa zone in a format the could be imported to another machinewith an equivalent zone.

example%tncfg -t publictncfg:public>exportset name=publicset host_type=unlabeledset doi=1set def_label="PUBLIC"set min_label="PUBLIC"set max_label="CONFIDENTIAL : NEED TO KNOW"add aux_label="SANDBOX PLAYGROUND"add host=myserver.oracle.comadd host=10.5.0.0/16tncfg:public>exit

Example 3 Assigning Properties to a Zone

In the following example, the public zone is configured to be amulti-level NFS server.

example%tncfg -z publictncfg:public>info     name=public     label=PUBLIC     visible=notncfg:public>add mlp_private=111/tcptncfg:public>add mlp_private=111/ucptncfg:public>add mlp_private=2049/tcptncfg:public>committncfg:public>exit

Exit Status

0

Successful completion.

1

An error occurred.

Files

Attributes

Seeattributes(5) for descriptions of the following attributes:

ATTRIBUTE TYPE
ATTRIBUTE VALUE
Availability
system/trusted
Interface Stability
See below.

The invocation and subcommands are committed. Output, except for theexport andinfo subcommands, is Not-an-Interface.

See Also

tnctl(1M),tnd(1M),tninfo(1M),txzonemgr(1M),zonecfg(1M),nsswitch.conf(4),attributes(5),labels(5),zones(5)

Notes

The Labeled Zone Manager,txzonemgr(1M), is an alternative application for configuring TrustedExtensions. It invokes thetncfg command internally, and provides an interactive GUI-based userinterface.

Copyright © 2011, Oracle and/or its affiliates. All rights reserved.Legal Notices
PreviousNext

[8]ページ先頭

©2009-2025 Movatter.jp