OBSOLETE Patch-ID# 109734-03 Keywords: ENCRYPTION EFS security international HA Logdump FTP fragmentation proxy Synopsis: Obsoleted by: 109734-04 SunScreen 3.1 (Sparc) miscellaneous fixes. Date: Apr/05/2001 ****************************************************** The items made available through this website are subject to United States export laws and may be subject to export and import laws of other countries. You agree to strictly comply with all such laws and obtain licenses to export, re-export, or import as may be required. Unless expressly authorized by the United States Government to do so you will not, directly or indirectly, export or re-export the items made available through this website, nor direct the items therefrom, to any embargoed or restricted country identified in the United States export laws, including but not limited to the Export Administration Regulations (15 C.F.R. Parts 730-774). ****************************************************** Solaris Release: 2.6 7 8 SunOS Release: 5.6 5.7 5.8 Unbundled Product: SunScreen EFS Unbundled Release: 3.1 Xref: This patch is available for x86 as Patch 109735. Topic: Relevant Architectures: sparc BugId's fixed with this patch: 4326689 4328055 4333069 4347381 4347894 4347899 4347905 4351317 4355078 4355752 4365144 4366229 4368757 4370757 4371831 4373963 4373964 4377098 4377829 4380217 4395538 4400107 Changes incorporated in this version: 4347381 4351317 4355752 4365144 4366229 4368757 4370757 4371831 4266794 4373976 4048429 4373972 Patches accumulated and obsoleted by this patch: Patches which conflict with this patch: Patches required with this patch: Obsoleted by: Files included with this patch: /kernel/drv/screen /kernel/strmod/efs /kernel/strmod/spf /opt/SUNWicg/SunScreen/admin/cgi-bin/html_logdump /opt/SUNWicg/SunScreen/lib/getlog /opt/SUNWicg/SunScreen/lib/logdump /opt/SUNWicg/SunScreen/lib/screeninfo /opt/SUNWicg/SunScreen/lib/ss_compiler /opt/SUNWicg/SunScreen/lib/ss_had /opt/SUNWicg/SunScreen/lib/ss_logd /opt/SUNWicg/SunScreen/proxies/httpp /opt/SUNWicg/SunScreen/ssadm/edit /opt/SUNWicg/SunScreen/ssadm/log /opt/SUNWicg/SunScreen/ssadm/logdump /opt/SUNWicg/SunScreen/ssadm/logstats /opt/SUNWicg/SunScreen/support/packages /opt/SUNWicg/SunScreen/support/versions /usr/kernel/drv/screen_skip /usr/kernel/misc/screen_ftp NOTE: 64bit sparcv9 kernel modules not included in x86 patch. Files changed in this version of the patch: /opt/SUNWicg/SunScreen/proxies/httpp /opt/SUNWicg/SunScreen/lib/screeninfo /opt/SUNWicg/SunScreen/support/packages /opt/SUNWicg/SunScreen/support/versions /opt/SUNWicg/SunScreen/lib/ss_had /usr/kernel/misc/screen_ftp /kernel/drv/screen /opt/SUNWicg/SunScreen/lib/ss_logd /opt/SUNWicg/SunScreen/lib/getlog /opt/SUNWicg/SunScreen/ssadm/logstats /opt/SUNWicg/SunScreen/ssadm/log Problem Description: 4355078 - performance in stealth mode slower than SPF-200 4400107 - something consuming large amounts of kernel memory 4395538 - ss_logd core dumps causing the system to hang 4377829 - HA screen will become passive if cable is unplugged. 4377098 - ss_had has a file descriptor leak. 4380217 - SunScreen 3.1 with patch 109734-01 can panic in stealth mode. 4373963 - screeninfo output gets truncated. 4266794 - screeninfo does not return if ip forwarding status 4373976 - misc enhancements to screeninfo. 4048429 - Configurations names with spaces don't work 4373966 - screeninfo does not get SCCS versions of all files. 4373972 - screeninfo should perform consistancy checks on packages. 4373964 - Patch information retrieved by screeninfo can be incorrect. 4365144 - Fix not correctly implemented for Trusted Solaris. (from 109734-02) 4347381 - ss_had stops when "ssadm activate" is done 4351317 - HTTP POST does not work without CRLF 4355752 - SunScreen http proxy core dumps when URI password included in URL 4365144 - ftp state engine can't handle tcp option tstamp 4366229 - Possible for encryption rules to generate system panic 4368757 - "*" service includes iptunnel service which could be misunderstood and lead to an insecure screen 4370757 - ftp with NAT has sequence number problem which was introduced after fix for PASV FTP attacks 4371831 - "Fragmentation Needed but DF bit set" message sent out in error when encryption rules are used (from 109734-01) 4326689 - Passive HA stealth screen sends ARP's 4328055 - Logdump -i file -x0 does not display hex dump of packet 4333069 - Traffic passes to undefined addresses when interface addr grp used in rules. 4347894 - Protection against PASV FTP attacks 4347899 - File containing something that looks like FTP commands could be misinterpreted 4347905 - Protection against jolt2.c fragmentation attacks Patch Installation Instructions: ----------------------------------------------- Special Install Instructions: ----------------------------- Instructions for Installing on the Administration Station --------------------------------------------------------- 1. Become root on the Administration Station. 2. If you are running Solaris 2.6 on the administration station, ensure that you have already installed the latest version of Solaris patch 106125. Version 106125-06 is available on your EFS 3.1 CD. 3. Transfer the patch file to the Administration Station. 4. Then type: # uncompress 109734-03.tar.Z # tar xf 109734-03.tar # patchadd 109734-03 Instructions for Installing on Locally Administered Screens ----------------------------------------------------------- 1. Become root on the Screen. 2. If you are running Solaris 2.6 on the Screen, ensure that you have already installed the latest version of Solaris patch 106125-06. Version 106125-06 is available on your SunScreen EFS 3.1 CD. 3. Transfer patch file to the Screen using a diskette or ftp (with 3 MB free). 4. Type the following: # uncompress 109734-03.tar.Z # tar xf 109734-03.tar # patchadd 109734-03 5. Reboot the Screen. Instructions for Installing on Remotely Administered Screens in Stealth Mode --------------------------------------------------------------- Use this procedure ONLY if you cannot otherwise transfer the patch to the Screen. 1. Become root on the Administration Station. 2. If you are running Solaris 2.6 on the Screen, ensure that you have already installed the latest version of Solaris patch 106125-06. Version 106125-06 is available on your SunScreen EFS 3.1 CD. 3. Transfer the patch file to the Administration Station. 4. Type the following: # ssadm -r patch install < 109734-03.tar.Z Instructions for Installing on High Availability (HA) clusters. -------------------------------------------------------------------- 1. Determine which screen is ACTIVE within the HA Cluster using the following command on each: # ssadm ha status 2. Follow appropriate patch installation instructions from this README file to install the patch on the CURRENTLY ACTIVE SCREEN within the HA Cluster (determined from the previous step). 3. Be sure to reboot that screen upon completion of the patch installation. 4. After the reboot, the screen which the patch was just installed on will come up in PASSIVE mode and some other member of the HA cluster will become ACTIVE. 5. Repeat steps 1-4 until the patch has been applied to all members of the HA cluster. Notes on patching HA clusters: If the patch is installed on a PASSIVE screen before it is installed on an ACTIVE screen, the HA daemon ss_had can core dump, this gives symptoms similar to bug 4347381. The SunScreen HA model works by having 2 or more firewalls in parallel. Both firewalls see the same packets and hence calculate the same statetable entries. If a packet matches a statetable entry, then it is passed through the screen. If the ACTIVE screen is rebooted, one of the PASSIVE firewall(s) will take over. Existing connections will still be maintained as the PASSIVE firewall(s) which has just become ACTIVE will have the statetable entries. Once the originally ACTIVE firewall has been rebooted, it will have an empty statetable. This firewall will add any new connections made since it was rebooted to its statetable, but will not know about connections established before it was rebooted. If the currently ACTIVE screen is rebooted, some connections may get dropped. Its not possible to say exactly how long it will take for both (all) the firewalls to have the same statetable entries as this will depend on the type of connection being passed and the lifetime of this connection. Running the following command on both (all) firewalls in the cluster will give the administrator a good indication of when it is safe to reboot the second firewall, without significant loss of service: # ssadm lib/statetables | grep ESTABLISHED | wc -l Instructions for Identifying Patches Installed on System -------------------------------------------------------- 1. To identify the patch level on your locally administered Screen, type the commands: # ls -lt /var/sadm/patch > screen.pkginfo # pkginfo -l >> screen.pkginfo 2. To identify the patch level on your remotely administered Screen in stealth mode: # ssadm -r lib/support packages > screen.pkginfo This shows (1) ls -lt /var/sadm/patch, (2) pkginfo -l, and (3) the contents of /var/log/patch.log. 3. To identify the patch level on your Administration Station, type the commands: # ls -lt /var/sadm/patch > admin.pkginfo # pkginfo -l >> admin.pkginfo Instructions to remove the patch from the Administration Station ---------------------------------------------------------------- 1. Become root on the Administration Station. 2. Then type: # patchrm 109734-03 Instructions to Remove the Patch from Locally Administered Screen ----------------------------------------------------------------- 1. Become root on the Screen. 2. Type the following: # patchrm 109734-03 Instructions to Remove the Patch from Remotely Administered Screens in Stealth Mode ---------------------------------------------------------------------- Use this procedure ONLY if you cannot otherwise obtain access to a login prompt on the Screen. 1. Become root on the Administration Station. 2. If you are running Solaris 2.6 on the Screen, ensure that you have already installed the latest version of Solaris patch 106125-06. Version 106125-06 is available on your SunScreen EFS 3.1. 3. Type the following: # ssadm -r patch backout 109734-03 Additional Patch Installation Instructions ------------------------------------------ Refer to the "Install.info" file within the patch for instructions on using the generic 'installpatch' and 'backoutpatch' scripts provided with each patch. README -- Last modified date: Monday, May 21, 2001