Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Table of Contents

Introduction

The critical point when it comes to job scheduling is the fact that it perfectly implements code injection across your network - which is what is usually

...

called a vulnerability.

  • Jobs are code, frequently shell commands,

...

  • which are forwarded to remote servers and are executed in unattended mode.
  • Users have to open their network and make their firewalls look like swiss cheese to allow a central server where a job scheduling product is operated to access any remote servers in their network.

The JS7 introduces digital signing for the deployment of objects such as workflows and jobs.

  • Digital signatures are created automatically and do not increase the effort for deployment of objects.
  • The security mechanism includes to have having certificates for digital signatures ready with the Controller and the Agents that execute jobs. If the signature does not match the available certificates then deployment is denied. This mechanism does not prevent an authorized person from deploying workflows and , but it prevents attackers from hijacking a user's identity and deploying malicious code.

Digital Signing

Digital signing is applied to

...

workflows when performing JS7 - Deployment of Scheduling Objects.

  • The signing process is performed by the JOC Cockpit and includes:
    • the user to be is assigned a private key Private Key and a certificate Certificate (X.509) or a public/private key Public Key (PGP),
    • to create a signature from the JSON representation of the respective inventory object workflow by use of the user's private keyPrivate Key.
  • The verification process is performed by the Controller and Agent that is which have been assigned the respective workflow and jobrelevant scheduling object such as a workflow:
    • Both Controller and Agents Agent instances look up available X.509 certificates Certificates and PGP public keys Public Keys from files with the following locations:
      • Unix
        • X.509 certificates: ./config/private/trusted-x509-keys
        • PGP public key: ./config/private/trusted-pgp-keys
      • Windows
        • X.509 certificates: .\config\private\trusted-x509-keys
        • PGP public key: .\config\private\trusted-pgp-keys
    • If a
    • certificate
    • Certificate or
    • public key
    • Public Key is found then the signature of the deployed scheduling object is verified
    • like this
    • as follows:
      • X.509: 
        • the Root CA
    • certificate
        • Certificate or Intermediate CA
    • certificate has to be in place
        • Certificate that was used originally to sign the user's
    • private key
        • Signing Certificate has to be in place or
        • the user's
    • certificate
        • self-issued Signing Certificate has to be in place.
        • Using the Root CA
    • certificate
        • Certificate or Intermediate CA
    • certificates
        • Certificates simplifies certificate management as a single certificate file
    • only
        • has to be present
    • with
        • for any Controller or Agent
    • instance
        • instances. At the same time, security-aware administrators might prefer to deploy individual user
    • certificates
        • Signing Certificates to Controller and Agent instances for more fine-grained control
    • to
        • of which
    • Agent
        • workflows and other objects can be deployed by a specific user to a given Agent. Similarly a specific Intermediate CA can be used to sign user Signing Certificates.
      • PGP: the
    • public key
      • Public Key available for the given user who signed the deployed scheduling object has to be present.
    • Controller and Agent instances make use of
    • any certificate
    • all Certificate files and
    • public key
    • Public Key files
    • found
    • available in the directories mentioned above. If
    • non
    • none of the files matches the signature of a
    • deployable
    • deployed scheduling object then deployment
    • is denied.
    • will be denied.

For creation of certificates for digital signing see JS7 - How to create X.509 Signing Certificates.

Security Levels

The JOC Cockpit is installed for one of the following security levels

...

, see the JS7 - Security Architecture article for more information.

  • Security Level Low
    • Inventory objects are automatically signed with the

...

    • Private Key that is stored with the root account.
    • Signing is automatically applied when performing the Deploy operation.
  • Security Level Medium
    • Inventory objects are automatically signed with the

...

    • Private Key that is stored with the

...

    • user's account.
    • Signing is automatically applied when performing the Deploy operation.
  • Security Level High

      ...

        • Scheduling objects are signed outside of JOC Cockpit:

          ...

              • Scheduling objects are exported using the Export operation

          ...

              • and the option

          ...

              • For signing.
              • The export archive file is transferred to a secure device, e.g. to a secure desktop machine.
              • The export archive file is extracted and each

          ...

              • scheduling object file included is signed individually

          ...