M e r i d i a n I I U s e r M a n u a l
59
"Smarter Timing Solutions"
Chapter
Five
Security
Your Meridian II Precision TimeBase incorporates several important security features to prevent
unauthorized tampering with its operation. Many of these are standard multiple-user access control
features of the underlying Linux operating system which controls the Meridian II. Others are pro-
vided by the additional protocol servers selected for inclusion in your Meridian II, and the way that
they are configured.
Secure user authentication and session privacy while performing routine monitoring and maintenance
tasks are provided by the OpenSSH implementations of the “secure shell” daemon,
sshd
and its com-
panion “secure copy” utility,
scp
. The Apache implementation of the Hyper Text Transfer Protocol
(HTTPS) with Secure Sockets Layer (SSL) daemon (
httpd
) provides for a secure, encrypted session
with a digital certificate. The NET-SNMP implementation of the Simple Network Management
Protocol (SNMP) daemon,
snmpd
conforms to the latest Internet standard, known as SNMPv3, which
also supports secure user authentication and session privacy. In addition, the Network Time Proto-
col daemon,
ntpd
supports client-server authentication security measures to deter spoofing of NTP
clients by rogue NTP servers. This chapter describes these security measures and gives the advanced
network administrator information that will allow custom configuration to fit specific security needs.
SSH, Telnet, SNMP and HTTPS are all enabled with default passwords. To ensure security, change the
passwords or disable the protocols. To change the passwords for SSH, Telnet and HTTPS use the
passwd
command. To change the passwords/community strings for SNMP see
Chapter 6 - SNMP
.
By default all hosts are allowed access via SSH, Telnet and SNMP. To restrict access via these protocols to
specific hosts, see
Restrict Access - Telnet, SSH and SNMP
below. All hosts are allowed access via
HTTPS as well. To restrict access via HTTPS, see
Restrict Access - HTTPS
below.
To completely disable any or all of these protocols see
Disable Protocols
below.
Linux Operating System
The Linux operating system versions are shown in
Appendix K - Specifications
. Linux supports a
complete set of security provisions:
•
System passwords are kept in an encrypted file,
/etc/shadow
which is not accessible by users other
than
root
.
IMPORTANT
Summary of Contents for Meridian II
Page 2: ......
Page 20: ...M e r i d i a n I I U s e r M a n u a l This page intentionally left blank...
Page 139: ...119 M e r i d i a n I I U s e r M a n u a l R E A R P A N E L I O...
Page 216: ...M e r i d i a n I I U s e r M a n u a l 196 A P P E N D I X J...
Page 235: ...215 M e r i d i a n I I U s e r M a n u a l S P E C I F I C AT I O N S...
Page 236: ...M e r i d i a n I I U s e r M a n u a l 216 A P P E N D I X K...
Page 239: ......