=begin latex \documentclass{article} \usepackage{times} \usepackage{verbatim} \oddsidemargin=0pt \evensidemargin=0pt \topmargin=0pt \textwidth=6.5in \textheight=9in \frenchspacing % disable hyphenation completely \hyphenpenalty=10000 \exhyphenpenalty=10000 \sloppy \begin{document} \title{\bf Common Criteria EAL4+ Evaluated Configuration Guide for SUSE LINUX Enterprise Server on IBM Hardware} \author{Klaus Weidner {\tt }} \date{\today; \input{CG-version}} \maketitle \thispagestyle{empty} \newpage \parindent=0pt \parskip=6pt plus 2pt minus 1pt atsec is a trademark of atsec GmbH IBM, IBM logo, BladeCenter, eServer, System x, System p, System z, OS/400, PowerPC, POWER3, POWER4, POWER4+, POWER5, S390, zArchitecture, and z/VM are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both. Intel and Pentium are trademarks of Intel Corporation in the United States, other countries, or both. Java and all Java-based products are trademarks of Sun Microsystems, Inc., in the United States, other countries, or both. Linux is a registered trademark of Linus Torvalds. UNIX is a registered trademark of The Open Group in the United States and other countries. This document is provided AS IS with no express or implied warranties. Use the information in this document at your own risk. This document may be reproduced or distributed in any form without prior permission provided the copyright notice is retained on all copies. Modified versions of this document may be freely distributed provided that they are clearly identified as such, and this copyright is included intact. Copyright (c) 2003, 2004, 2007 by atsec GmbH, and IBM Corporation or its wholly owned subsidiaries. \newpage \parskip=0pt \setcounter{tocdepth}{3} \tableofcontents \parskip=6pt plus 2pt minus 1pt \newpage \pagestyle{headings} =end latex =head1 Introduction =head2 Purpose of this document The SUSE LINUX Enterprise Server (SLES) distribution is designed to provide a secure and reliable operating system for a variety of purposes. Because security requirements obviously depend on the applications and environment, it is not possible to simply certify that the system is "secure", a more precise definition is needed. The Common Criteria (CC) provides a widely recognized methodology for security certifications. A CC evaluation is fundamentally a two-step process, consisting of defining the "security target" which describes the features that are to be evaluated, and then testing and verifying that the system actually implements these features with a sufficient level of assurance. This document is a security guide that explains how to set up the evaluated configuration, and provides information to administrators and ordinary users to ensure secure operation of the system. It is intended to be self-contained in addressing the most important issues at a high level, and refers to other existing documentation where more details are needed. The document primarily addresses administrators, but the section "Security guidelines for users" is intended for ordinary users of the system as well as administrators. Knowledge of the Common Criteria is not required for readers of this document. =head2 How to use this document The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119 . Note that the terms "SHOULD" and "SHOULD NOT" are avoided in this document. Requirements are either absolute (and marked with MUST and equivalent terms), or entirely optional (in the sense of not affecting required security functions) and marked with RECOMMENDED, MAY or OPTIONAL. If you follow the requirements in this document when setting up and using the system, your configuration will match the evaluated configuration. Certain configuration options are marked as OPTIONAL and you MAY modify them as needed, but you MUST NOT make other changes, because they will make the system fail to match the evaluated configuration. Of course, you MUST always use common sense. This document is not a formal specification, and legitimate reasons may exist to modify the system setup in ways not described here if that is necessary for the system to fulfill its intended purpose. Specifically, applying security patches released by the vendor is strongly RECOMMENDED even though that will cause a deviation from the evaluated configuration. In cases where the requirements and recommendations in this document conflict with those in other sources (such as the online documentation), the information in this Configuration Guide has higher precedence. You MUST follow the steps described here to reach the evaluated configuration, even if other documentation describes different methods. The usual convention is used in this guide when referring to manual pages that are included in the software distribution. For example, the notation I(1) means that running the C command will display the manual page for the I command from section one of the installed documentation. In most cases, the C<-S> flag and the section number may be omitted from the command, they are only needed if pages with the same name exist in different sections, =head2 What is a CC compliant system? A system can be considered to be "CC compliant" if it matches an evaluated and certified configuration. This implies various requirements concerning hardware and software, as well as requirements concerning the operating environment, users, and the ongoing operating procedures. Strictly speaking, an evaluation according to the CC represents the results of investigation of the security properties of the target system according to defined guidelines. It should not be considered as a guarantee for fitness for any specific purpose, but should provide help in deciding the suitability of the system considering how well the intended use fits the described capabilities. It is intended to provide a level of assurance about the security functions that have been examined by a neutral third party. =head3 Hardware requirements The hardware MUST be the one of the following IBM systems: System x: x3550 (rack mount), HS20 and HS21 (blades) Opteron (AMD): x3455 (rack mount), LS21 (blade) System p: any POWER5 or POWER5+ system System z: any z/Architecture compliant system or software Running the certified software on other similar hardware may result in an equivalent security level, but the certification does not apply if the hardware is different from that used for the testing processes during the evaluation. =head3 Requirements for the system's environment The security target covers one or more systems running SLES, networked in a non-hostile network, with a well-managed and non-hostile user community. It is not intended to address the needs of an Internet-connected server, or the case where services are to be provided to potentially hostile users. It is assumed that the value of the stored assets merits moderately intensive penetration or masquerading attacks. You MUST set up the server (or servers) in a physically secure environment, where they are protected from theft and manipulation by unauthorized persons. You MUST ensure that all connections to peripheral devices and all network connections are protected against tampering, tapping and other modifications. Using the secured protocols SSHv2 or SSLv3 is considered sufficient protection for network connections. All other connections must remain completely within the physically secure server environment. =head3 Requirements for connectivity All components in the network such as routers, switches, and hubs that are used for communication are assumed to pass the user data reliably and without modification. Translations on protocols elements (such as NAT) are allowed as long as those modifications do not lead to a situation where information is routed to somebody other than the intended recipient system. Any other systems with which the system communicates MUST be under the same management control and operate under the same security policy constraints. Be aware that information passed to another system leaves the control of the sending system, and the protection of this information against unauthorized access needs to be enforced by the receiving system. If an organization wants to implement a consistent security policy covering multiple systems on a network, organizational procedures MUST ensure that all those systems can be trusted and are configured with compatible security configurations enforcing an organization wide security policy. How to do this is beyond the scope of this Configuration Guide. If you set up a communication link to a system outside your control, please keep in mind that you will not be able to enforce any security policy for any information you pass to such a system over the communication link or in other ways (for example, by using removable storage media). =head3 Requirements for administrators There MUST be one or more competent individuals who are assigned to manage the system and the security of the information it contains. These individuals will have sole responsibility for the following functions: (a) create and maintain roles (b) establish and maintain relationships among roles (c) Assignment and Revocation of users to roles. In addition these individuals (as owners of the entire corporate data), along with object owners will have the ability to assign and revoke object access rights to roles. The system administrative personnel MUST NOT be careless, willfully negligent, or hostile, and MUST follow and abide by the instructions provided by the administrator documentation. In CAPP mode, every person that has the ability to perform administrative actions by switching to root has full control over the system and could, either by accident or deliberately, undermine security features of the system and bring it into an insecure state. This Configuration Guide provides the basic guidance how to set up and operate the system securely, but is not intended to be the sole information required for a system administrator to learn how to operate Linux securely. It is assumed, within this Configuration Guide, that administrators who use this guide have a good knowledge and understanding of operating security principles in general and of Linux administrative commands and configuration options in particular. We strongly advise that an organization that wants to operate the system in the evaluated configuration nevertheless have their administrators trained in operating system security principles and security functions, properties, and configuration. Every organization needs to trust their system administrators not to deliberately undermine the security of the system. Although the evaluated configuration includes audit functions that can be used to make users accountable for their actions, an administrator is able to stop the audit subsystem and reconfigure it such that his actions no longer get audited. Well trained and trustworthy administrators are a key element for the secure operation of the system. This Configuration Guide provides the additional information a system administrator should obey when installing, configuring and operating the system in compliance with the requirements defined in the Security Target for the Common Criteria evaluation. =head3 Requirements for the system's users The security target addresses the security needs of cooperating users in a benign environment, who will use the system responsibly to fulfill their tasks. Authorized users possess the necessary authorization to access at least some of the information managed by the system and are expected to act in a cooperating manner in a benign environment. Note that system availability is I addressed in this evaluation, and a malicious user could disable a server through resource exhaustion or similar methods. The requirements for users specifically include: =over =item * User accounts MUST be assigned only to those users with a need to access the data protected by the system, and who MUST be sufficiently trustworthy not to abuse those privileges. For example, the system cannot prevent data from being intentionally redistributed to unauthorized third parties by an authorized user. =item * Rights for users to gain access and perform operations on information are based on their membership in one or more roles. These roles are granted to the users by the administrator. These roles MUST accurately reflect the users job function, responsibilities, qualifications, and/or competencies within the enterprise. =item * A limited set of users is given the rights to create new data objects and they become owners for those data objects. The organization is the owner of the rest of the information under the control of system. =item * Users are trusted to accomplish some task or group of tasks within a secure IT environment by exercising complete control over their data. =item * All users of the system MUST be sufficiently skilled to understand the security implications of their actions, and MUST understand and follow the requirements listed in section L<"Security guidelines for users"> "Security guidelines for users" of this guide. Appropriate training MUST be available to ensure this. =back It is part of your responsibility as a system administrator to verify that these requirements are met, and to be available to users if they need your help in maintaining the security of their data. =head1 Installation The evaluation covers a fresh installation of SLES, on one of the supported hardware platforms as defined in section L<"Hardware requirements"> "Hardware requirements" of this guide. On the platforms that support virtualization (VM) or secure logical partitioning (LPAR), other operating systems MAY be installed and active at the same time as the evaluated configuration. This is if (and only if) the VM or LPAR configuration ensures that the other operating systems cannot access data belonging to the evaluated configuration or otherwise interfere with its operation. Setting up this type of configuration is considered to be part of the operating environment and is not addressed in this guide. On the other platforms, the evaluated configuration MUST be the only operating system installed on the server. =head2 Supported hardware You MAY attach the following peripherals without invalidating the evaluation results. Other hardware MUST NOT be installed in or attached to the system. =over =item * Any storage devices and backup devices supported by the operating system (this includes hard disks, CD-ROM drives and tape drives). =item * All Ethernet and Token Ring network adapters supported by the operating system. Modems, ISDN and other WAN adapters are not part of the evaluated environment. =item * PCL 4 or PostScript level 1 compatible printers attached to the system using a parallel port or USB connection. You MAY also use a network printer. =item * Operator console consisting of a keyboard, video monitor, and optionally mouse. Additionally, you MAY directly attach supported serial terminals (see section L<"Using serial terminals"> "Using serial terminals" of this guide), but I modems, ISDN cards, or other remote access terminals. =back USB keyboards and mice MAY be attached, as some of the supported hardware platforms would otherwise not have supported console input devices. If a USB keyboard or mouse is used, it MUST be connected before booting the operating system, and NOT added later to a running system. Other hot-pluggable hardware that depends on the dynamic loading of kernel modules MUST NOT be attached. Examples of such unsupported hardware are USB and IEEE1394/FireWire peripherals other than mice and keyboards. =head2 Selection of install options and packages This section describes the detailed steps to be performed when installing the SLES operating system on the target server. All settings listed here are REQUIRED unless specifically declared otherwise. =over =item 1 It is RECOMMENDED that you disconnect all network connections until the post-install system configuration is finished. You MAY use a network if required for the installation (for example when using a NFS file server instead of CD-ROMs). If you do use a network, you MUST ensure that this network is secure, for example by directly connecting the new system to a standalone NFS server with no other network connections. =item 1 Verify that the installation CD or DVD is an authentic SUSE distribution CD/DVD for SLES 10 SP1. The original media are shipped in a sealed sleeve. If using downloaded ISO images, you MUST verify that the MD5 checksums of the image files are correct. The checksums are shown on the SUSE/Novell download web page and signed with the SUSE package signing GPG key. You MUST obtain the SUSE package signing key and ensure that the key is authentic, for example by getting the key from older SUSE distribution media that were previously authenticated, or from a trusted key server or other distribution method. The ISO images and signed MD5sums are available at these URLs: System x/Opteron, System p: http://download.novell.com/protected/Summary.jsp?buildid=2FNtOnmkx-w~ System z: http://download.novell.com/protected/Summary.jsp?buildid=HfBRh4TspiE~ After verifying and importing the SUSE package signing key (using C), use the following command to check if the signature is authentic: gpg --verify FILENAME Run C to view the checksums for the downloaded image files, and compare them with those shown on the web page. You MUST use B. Make sure that you are using the appropriate version for your platform, refer to section L<"Hardware requirements"> "Hardware requirements" of this guide for the list of supported hardware and the corresponding version needed. =item 1 Launch the installer program contained on the CD-ROM. The details of how to do this depend on the hardware platform, please refer to the installation guide that is part of the printed manual accompanying the CD. For example: =over =item * System x, System p, Opteron-based eServer: Insert the first CD and boot from CD-ROM. =item * System z: Details depend on the operation mode (VM, LPAR or native). The process generally involves copying the installer onto the server and launching the installer using the host's management interface. =back =item 1 You MAY choose text-mode installation instead of the default graphical installation by pressing the C key at the boot prompt, or add the option C. You MAY also use a serial console to do a text-mode installation. To do so, connect a serial terminal (or a computer with terminal emulator software; such a computer MUST be appropriately secure) to the server's serial port, and boot from the SLES CD. When the boot prompt appears, add the option C (use the appropriate name of the serial device if not using ttyS0) and press C to start the installation. =item 1 B