Follow Techotopia on Twitter

On-line Guides
All Guides
eBook Store
iOS / Android
Linux for Beginners
Office Productivity
Linux Installation
Linux Security
Linux Utilities
Linux Virtualization
Linux Kernel
System/Network Admin
Programming
Scripting Languages
Development Tools
Web Development
GUI Toolkits/Desktop
Databases
Mail Systems
openSolaris
Eclipse Documentation
Techotopia.com
Virtuatopia.com
Answertopia.com

How To Guides
Virtualization
General System Admin
Linux Security
Linux Filesystems
Web Servers
Graphics & Desktop
PC Hardware
Windows
Problem Solutions
Privacy Policy

  




 

 

NOTE: CentOS Enterprise Linux 5 is built from the Red Hat Enterprise Linux source code. Other than logo and name changes CentOS Enterprise Linux 5 is compatible with the equivalent Red Hat version. This document applies equally to both Red Hat and CentOS Enterprise Linux 5.

17.24. Security

17.24.1. Removing a Domain Security Label

You can use xm to remove a domain security label:

 
xm rmlabel [domain-id] [configfile] 

This removes the acm_policy label entry from the configfile.

17.24.2. Creating a Resource Security Label

You can use xm to create a resource security label:

 
xm addlabel [labelname] res [resource] [policy] 

17.24.3. Removing a Resource Security Label

You can use xm to remove a Resource Security label:

 
mx rmlabel [domain-id] res [resource] 

This removes the global resource file.

17.24.4. Configuring Access Control

Red Hat Virtualization access control consists of two major components. The Access Control Policy (ACP) defines access rules and security labels. When domains request access resources, to communicate The Access Control Module (ACM) interprets the policy and handles access control decisions. The ACM determines access rights from the domain security label. Then the ACP enables the security labels and access rules and assigns them to domains and resources. The ACP uses two different ways of label management:

Label Description

Simple Type Enforcement

The ACP interprets the labels and assigns access requests to domains that require virtual (or physical access). The security policy controls access between domains and assigns the proper labels to the respective domain. By default, access to domains with Simple Type Enforcement domains is not enabled.

Chinese Wall

The Chinese Wall security policy controls and responds to access requests from a domain.

Table 17.6. ACP Label Management

A policy is a separated list of names that translates into a local path and points to the policy XML file (relative to the global policy root directory). For instance, the domain file chinese_wall.client_V1 pertains to the the policy file /example/chinese_wall.client_v1.xml.

Red Hat Virtualization includes these parameters that allow you to manage security policies and assign labels to domains:

17.24.5. Creating a Policy

You can use xm to create a binary policy:

 
 xm makepolicy [policy]

This creates the binary policy and saves it as binary file [policy.bin].

17.24.6. Loading a Policy

You can use xm to load a binary policy:

 
xm loadpolicy [policy.bin] 

17.24.7. Creating a Policy for Boot Configuration

You can use xm to make a binary policy and add it to the boot configuration file:

 
xm cfgbootpolicy [kernelversion] 

This copies the binary policy into the /boot directory and modifies the corresponding line in the /boot/grub/menu.1st file.

17.24.8. Creating a Label

You can use xm to create a label:

 
xm addlabel [configfile] [policy]

Adds a security label with to a domain configfile. It also verifies that the respective policy definition matches the corresponding label name.

17.24.9. Displaying Policy Labels

You can use xm to view policy labels:

xm labels [policy] [type=dom | res | any] 

This displays labels of a type you specify (default is dom) that you define when you create the policy.

17.24.10. Displaying Domain Security Labels

You can use xm to view security labels for a domain:

 
xm getlabel domain-id [configfile] 

17.24.11. Displaying Resource Security Labels

You can use xm to view security labels for a resource:

 
xm getlabel res [resource] 

17.24.12. Configuring Access Control Secuirty

To enable the Red Hat Virtualization access security, you must modify these parameters in the xen_source__dir/Config.mk

ACM_SECURITY ?= y
ACM_DEFAULT_SECURITY_POLICY ? =
ACM_CHINESE_WALL__AND_SIMPLE_TYPE_ENFORCEMENT_POLICY

17.24.13. Compiling a Security Policy

This example demonstrates how to successfully compile a security policy:

 
xm makepolicy chinesewall_ste.client_v1 

This creates client_v1.map and client_v1.bin files in the /etc/xen/acm-security/policies/example/chinesewall_ste directory.

17.24.14. Loading the Security Policy

You can use xm to activates the client_v1.bin :

 
xm loadpolicy example.chwall_ste.client_v1 

17.24.15. Configuring a Boot Security Policy

You can use xm to configure the boot loader to load client_v1.bin :

 
xm cfgbootpolicy chinesewall_ste.client_v1 

This causes the ACM to use this label to boot Red Hat Virtualization.

17.24.16. Displaying Security Labels

You can use xm to view the defined labels:

xm labels  chinesewall_ste.client_v1 type=dom 

The output displays all policies with dom:

dom_StorageDomain
dom_SystemManagement
dom_NetworkDomain
dom_QandA
dom_R&D

17.24.17. Attaching a Security Label

You can use xm to attach a security label to a domain configuration file (this example uses the SoftwareDev label):

 
xm addlabel myconfig.xm dom_SoftwareDev 

Attaching the security label ensures that the domain does not share data with other non-SoftwareDev user domains. This example includes the myconfig.xm configuration file represents a domain that runs workloads related to the SoftwareDev's infrastructure.

Edit your respective configuration file and verify that the addlabel command correctly added the access_control entry (and associated parameters) to the end of the file:

kernel = "/boot/vmlinuz — 2.6.16 —xen"
ramdisk="/boot/U1_SoftwareDev_ramdisk.img"
memory = 164
name = "SoftwareDev"
vif = [ '' ]
dhcp = "dhcp"
access_control = [policy=example.chwall_ste.client_v1, label=dom_SoftwareDev]

If anything does not appear correct, make the necessary modifications and save the file.


 
 
  Published under the terms of the GNU General Public License Design by Interspire