This product includes software developed by the Apache Software Foundation (http://
www.apache.org/).” SWOP® is a registered trademark of SWOP, Inc.
DocuSP includes use of GNU source and object code, which is subject to the terms of
the GNU GPL. Please review the GNU GPL terms and conditions to understand the
restrictions under this license. For more information on GNU, please go to http://
www.gnu.org/licenses/gpl.txt.
As a requirement of the GNU GPL terms and conditions, source code of the above
programs list can be found on the www.xerox.com website for the applicable DocuSPbased product or can be ordered from Xerox.
This information is provided for information purposes only. Xerox Corporation makes
no claims; promises or guarantees about the accuracy, completeness, or adequacy of
the information contained in this document and disclaims all liability concerning the
information and/or the consequences of acting on any such information. Performance
of the products referenced herein is exclusively subject to the applicable Xerox
Corporation terms and conditions of sale and/or lease. Nothing stated in this document
constitutes the establishment of any additional agreement or binding obligations
between Xerox Corporation and any third party.
Product Recycling and Disposal
If you are managing the disposal of your Xerox product, please note that the product
contains lead, mercury and other materials whose disposal may be regulated due to
environmental considerations in certain countries or states. The presence of lead and
mercury is fully consistent with global regulations applicable at the time that the product
was placed on the market.
European Union
Some equipment may be used in both a domestic/household and a professional/
business application.
Domestic/Household Environment
Application of this symbol on your equipment is confirmation that you should not
dispose of the equipment in the normal household waste stream.
In accordance with European legislation end of life electrical and electronic equipment
subject to disposal must be segregated from household waste.
Private households within EU Member States may return used electrical and electronic
equipment to designated collection facilities free of charge. Please contact your local
disposal authority for information.
In some Member States when you purchase new equipment your local retailer may be
required to take back your old equipment free of charge. Please ask your retailer for
information.
Professional/Business Environment
Application of this symbol on your equipment is confirmation that you must dispose of
this equipment in compliance with agreed national Procedures.
In accordance with European legislation end of life electrical and electronic equipment
subject to disposal must be managed within agreed procedures.
Prior to disposal please contact your local dealer or Xerox representative for end of life
take back information.
The Security Guide provides the information needed to perform
system administration tasks for maintaining the Xerox Document
Services Platform (DocuSP) for printing systems.
This guide is intended for network and system administrators
responsible for setting up and maintaining Xerox printers with
DocuSP software. System administrators should have an
understanding of the Sun workstation, a familiarity with Solaris,
and with basic UNIX commands. This includes the use of text
editors such as vi or te xtedit a nd the abi lity t o mane uver withi n the
Solaris environment. To enable them to setup a customer site,
system administrators are expected to have a worki ng knowledge
of Local Area Networks (LANs), communicat ion protocols, and t he
applicable client platforms.
Contents
In general, this document covers information about the DocuSP
that is not covered in the Online Help or other availabl e guides.
The following list describes the contents of this guide:
•Gateway and Network Configuration
•Backup and Restore
•Security and Network Setup
•Printing
•Finishing
•Fonts
•MICR
•Tape Client
•Accounting and Billing
•Troubleshooting
•Hints and Tips
Conventions
This guide includes the following conventions:
Security Guide1
•Angle brackets - Variable information that is displayed on your
•Square brackets - Names of options you select are shown in square
•Notes are hints that help you perform a task or understand the text.
NOTE: This is an example of a note.
Customer support
To place a customer service call, dial the direct TTY number for
assistance. The number is 1-800-735-2988.
For additional assistance, dial the following numbers:
•Service and software support: 1-800-821-2797
•Xerox documentation and software services: 1-800-327-9753
screen is enclosed within angle brackets; for example, “Unable to
copy <filename>.”
brackets; for example, [OK] and [Cancel].
Notes are found in the following format:
2Security Guide
Security
This section describes the DocuSP system-supplied security
profiles. It outlines the charact eristic s of each profil e and indicates
how each can be customized to create user- defined profiles. The
enhanced security features in DocuSP protect the system against
unauthorized access and modification.
This section also addresses the options available to the
administrator in setting up and managing user accounts.
Finally this section offers general guidelines to security-related
procedures that can be impl emented to imp rove the securi ty of the
DocuSP controller and the Solaris OS.
System supplied security profiles
The four system-supplied profiles are: none, low, medium, and
high. The following table describes the characteristics of each
security level and the configurable settings that restrict access to
various devices and operating system ser vices.The default set ting
is “Low .”
Table 2-1 Security Profiles
ProfileCharacteristicsUserCompatibilityComments
NoneDefault Solaris and
system security.
All ports are open.
Walkup users can repr int
anything.
Full workspace menu is
available.
Auto logon is enabled.
LowFTP is enabled.
Telnet, rsh is disabled.
NFS client is enabled.
AutoFS is enabled.
Walkup users can repr int
from “Saved Jobs” and
CD-ROM.
Terminal window is
password protected.
Auto-login is enabled.
Physically
closed
environments.
First choice
setting for
most
environments.
Close to
DocuSP 2.1
and 3.1.
Similar to
DocuSP 3.X
“Medium”.
Similar to
DocuSP 3.x
“High”.
Supports
DigiPath
workflow.
Anonymous FTP is
read-only and
restricted.
The Solaris
desktop is removed
from all settings
except none.
Anonymous FTP is
ready-only and
restricted.
T o enable telnet , go
to [Setup], [FTP/
Remote
Diagnostics].
“Low” is the default
setting.
Security Guide3
ProfileCharacteristicsUserCompatibilityComments
MediumFTP is enabled.
telnet, rsh is disabled.
NFS client is disabled.
AutoFS is disabled, e.g./
net/<hostname>and
home/<username> are
not automatically
mounted.
NFS server is filtered via
RPC tab.
Walkup user can reprint
from CD_ROM.
Terminal window is
password protected.
HighFTP is disabled.
telnet, rsh is disabled.
NFS client is disabled.
AutoFS is disabled, e.g./
net/<hostname>and
home/<username> are
not automatically
mounted.
NFS server is disabled on
customer network.
Walkup users cannot
reprint anything.
Terminal window is
password protected.
Auto login is disabled
(login is always required
from GUI).
Environments
requiring high
security but
with a need to
integrate
DigiPath.
For
government
market.
Supports
DigiPath
workflow.
Does not
support
DigiPath
workflow.
Anonymous FTP is
ready-only and
restricted.
T o enable telnet , go
to [Setup], [F T P /
Remote
Diagnostics].
File FTP is
disabled.
File transfer can be
done via Secure
FTP.
For CFA support,
that is FTP upload
of outload, go to
[Setup], [FTP/
Remote
Diagnostics] menu.
CustomAny profile can be edited
to adjust to user needs
NOTE: Regardless of the security profile, anonymous FTP is
Read-only with restricted access to /export/home/ftphome only.
Enable and d is a b le se rvices
The following tables provide a list of the ser vices that can be
enabled and disabled from the DocuSP “Setup > Security Profiles”
menu options.
4Security Guide
Table 2-2 “System” tab
System ServiceDescription
Allow_host.equiv_plusBackground: The /etc/hosts. equiv and /.rhost s files provide the remote
authentication database for rlogin, rsh, rcp, and rexec. The files
specify remote hosts and users that are considered to be trusted.
Trusted users are allowed to access the local system without
supplying a password. These files can be removed or modified to
enhance security. DocuSP is provided with both of these files deleted
entirely. The setting All_host.equiv_plus is set to disabled, then
anytime that security settings are applied, the + will be removed from
host.equiv . IMPOR T ANT NOTE: Removing the + from the host s.equiv
file will prevent the use of the Xerox command line client print from
remote clients. An alterna ti ve would be to remove the + and add the
name of each trusted host that requires this functionality. Leaving the
+ will allow a user from any remote host to access the system wit h the
same username
BSMEnable or disable the Basic Security Module (BSM) on Solaris
Executable StacksSome security exploits take advantage of the Solaris OE kernel
executable system stack to attack the system. Some of these expl oits
can be avoided by making the system stack non-executable. The
following lines are added to /etc/system/fP file:set
noexec_user_stack=1s et noexec_user_stack_log=1
Remote CDE LoginsDeny all remote access (direct/broadcast ) to the X server running on
DocuSP by installing an appropriate /etc/dt/config/Xaccess file.
RouterDisable router mode by creating an empty the empty file: /etc/
notrouter.
Secure SendmailForce sendmail to only handle outgoing mail. No incomin g mai l wi ll b e
handled by sendmail.
Security Warning
Banners
Enable security warning banners to be displayed when a user logins
or telnets into the DocuSP server.
Table 2-3 “INIT” tab RC2 section
RC2 ServiceDescription
S40LLC2Class II logical link control driver
S47ASPPPAsynchronous PPP link manager. This service is re-enabled via
enable-remote-diagnostics command.
S70UUCPUUCP server
S71LDAP.CLIENTLDAP daemon to cache server and client information for NIS lookups.
S72AUTOINSTALLScript executed during stub JumpStart or AUTOINSTALL JumpStart
S72SLPDService Location Protocol daemon
Security Guide5
RC2 ServiceDescription
S73cachefs.daemonStarts cachefs file systems
S73NFS.CLIENTNFS client service. Disables the statd service which is only required if
your system is an NFS server or a client.
S74AUTOFSThe automountd service is only required if your system uses NFS to
automatically mount file systems. Stopping the autofs subsystem will
kill the running automountd daemon and unmount any autofs file
systems currently mounted.
S80SPCSunSoft Print Client daemon
S88SENDMAILThe sendmail daemon is used to send mail over the internet.
Sendmail has some security issues that are addressed by more
recent Solaris patches than those currently loaded with the DocuSP
software. If sendmail is not required, it can be disabled with the
following procedure.
S90WBEMCIM Boot Manager. Disables WBEM clients from accessing DocuSP
server.
Table 2-4 “INIT” tab RC3 section
RC3 ServiceDescription
S15NFS.SERVERNFS Server. Disable ability to export DocuSP Server file systems.
This service is enabled if DigiPath and Decomposition Ser vices
(NetAgent) are enabled.
S17BWNFS.DAEMONSecure mounted file systems. There are two shared file sys tems that
are exported by DocuSP. The two directories are only required for
anyone with XDOD version 3.0 or below. With the release of DigiPath
Version 1.0, it is not necessary to export these file systems.
S76SNMPDXSun Solstice Enterprise Master Agent. Solaris SNMP services are
disabled. This does not prevent DocuSP SNMP services from
operating.
S77DMISun Solstice Enterprise DMI Service Provider
S80MIPAGENTMobile IP agent
Table 2-5 “INETD” tab
INETD ServiceDescription
amiservRPC Smart Card
Not used by DocuSP
Interface
cachefsCached File System
Not used by DocuSP
server
6Security Guide
INETD ServiceDescription
chargenCharacter Generator
Protocol server
Sends revolving pattern of ASCII characters.
Sometimes used in packet debugging and can
be used for denial of service attack s. Not used
by DocuSP
comsat Biff servercomsat is the server process which listens for
reports of incoming mail and notifies users who
have requested to be told when mail arrives . Not
used by DocuSP
daytimeDaytime Protocol
server
Displays the date and time. Used primarily for
testing. Not used by DocuSP
discardDiscard Protocol serverDiscards everything sent to it .Used primarily for
testing. Not used by DocuSP
dtspc CDE sub-process
Control Servic e
CDE sub-process Control Service (dtspcd) is a
network daemon that accepts requests from
clients to execute commands and launch
applications remotely. Not used by DocuSP
echo Echo Protocol serverEchoes back any character sent to it. Someti mes
used in packet debugging and can be used for
denial of service attacks. No t used by DocuSP
execRemote execution
server
Used by rexec(1) command. Potentially
dangerous— passwords and subsequent
session is clear text (not encrypte d). Not used by
DocuSP.
finger Remote user
information server
Display information about local and remot e
users. Gives away user information. Not used by
DocuSP
fs X font serverUsed by CDE to dynamically render fonts.
DocuSP uses bit-map fonts.
ftpFile transfer proto col
server
This can be used to enable/disable the ftp
server. This does not affect using the ftp client
from the DocuSP server to another host running
an FTP server. Note that DigiPath requires this
service to be enabled.
kcms_serverKCMS library service
daemon
Allows the KCMS library to access profiles on
remote machines. Not used by DocuSP.
login Remote login serverUsed by the rlogin(1) command. Potentially
dangerous— uses ~/.rhosts file for
authentication; passwords and subsequent
session is clear text (not encrypted).
nameDARPA trivial name
server
in.tnamed is a server that supports the DARPA
Name Server Protoco. Seldom used anymore.
Not used by DocuSP
Security Guide7
INETD ServiceDescription
rpc.cmsdCalendar manager
service daemon
rpc.cmsd is a small database manager for
appointment and resource-scheduling data. Its
primary client is Calendar Manager. Not used by
DocuSP
rpc.rusersdnet work username
server
Gives intruder information about accounts. Not
used by DocuSP.
rpc.rwalld Network rwal l serverServer that handles rwall(1M) command
requests. Can be used for spoo fing at ta cks. Not
used by DocuSP.
rpc.sprayd Spray ser verRecords the packets sent by the spray(1M)
command. Can be used in denial of service
attacks. Not used by DocuSP
rcp.ttdbserverdRPC-based ToolTalk
database server
The RPC-based tooltalk database server is
required for CDE action commands. In particular ,
the CDE front panel has various menu i tems that
rely on CDE actions. Late in the CP3.1 release,
the Server UI team disabled t he front p anel. With
the panel disabled, the need for the tooltalk
database server no longer exists
rquotadRemote quota serverUsed by the quot a (1M) command to display
user quotas for remote file systems. Not used by
DocuSP
sadmindDistributed system
administration daemon
Used by Solstice AdminSuite applications to
perform distributed system administration. Not
used by DocuSP.
shellRemote execution
server
Used by rsh(1) and rcp(1) commands.. The pri nt
command line client relies on the remote shell
internet service being enabled since it uses the
rcp(1) command to transfer files onto the
DocuSP server. However, this service
represents a security risk. Not used by DocuSP
talkServer for talk programThe talk utility is a two-way, screen oriented
communication program. Not used by DocuSP.
telnet TELNET protocol
server
This can be used to enable/disable the telnet
server This does n ot affect using the tel net c lient
from the DocuSP server to another host running
an TELNET server
timeTime Protocol serverOutdated time service. Seldom used anymore.
Not used by DocuSP
uucp UUCP serverUNIX to UNIX system copy over networks.
UUCP is not securely set up and can be
exploited in many ways. Not used by DocuSP
8Security Guide
User level changes
The following user-level changes are made:
•all users for at, cron, and batch are disallowed
•nuucp account is disabled
•listen account is disabled
•password entry locked for bin, sys, adm, uucp, nobody,
noaccess, nobody4, and anonymous
Solaris file permissions
Secure File Permission options can be enabled or disabled
through the DocuSP interface. Fix-modes include:
•fixmodes-xerox: fix file permissions for all packages to
make them more secure. Available under the System tab
under the “Secure File Permissions” drop-down menu.
•fixmodes-solaris: fix file permissions only for Solaris
packages to make them more secure. Available under the
System tab under the “Secure File Permissions” dropdown menu.
The fix-modes utility (from the Solaris Secur ity Toolkit) adjusts
group and world write permissions. It is run with the '-s' option to
secure file permissions for Solaris files that were created at install
time only. Customer-generated files are not aff ected.
NOTE: When this command is run, a file called /var/sadm/install/
content.mods is left . Do not delete this file. It contains valuable
information needed by fix modes to revert the changes to the
system file permissions if the security setting is changed back to
medium.
Disabling secure name service databases
The following databases are disabled when security is invoked:
•passwd(4)
•group(4)
•exec_attr(4)
•prof_attr(4)
•ser_attr(4)
Security Guide9
Multicast routing disabled
Multicast is used to send data to many systems at the same time
while using one address.
OS and host information hidden
The ftp, telnet and sendmail banners are set to nul l so that users
in cannot see the hostname and OS level.
NOTE: All of these services are prohibited with a 'high' security
setting, but if they are re-enabled manually the hostname
information will remain hidden.
Sendmail daemon secured
Sendmail is forced to perform only outgoing mail. No incoming
mail will be accepted.
Network paramete rs secured
Sun's nddconfig security tool is run. For additional information,
view Sun's document, Solaris Operating Environment Network
Settings for Security, at
The system stack is made non-executable. This is done so
security exploitation programs cannot take advantage of the
Solaris OE kernel executable system st ack and thereby att ack the
system.
NFS port monitor restricted
The NFS server normally accepts requests fr om any port number.
The NFS Server is altered to process only those request s from
privileged ports. Note that wit h the high security setting, NFS is
disabled; however if the service is re-enabled manually, the port
restriction will still apply.
10Security Guide
Remote CDE login disabled
The Remote CDE login is disabled.
DocuSP router capabilities disabled
The DocuSP router capabilities is disabled (empty/etc/notrouter
file created).
Security warning banners
Security warning banners are displayed when a user logs in or
telnets into the DocuSP server. This message explains that only
authorized users should be using the system and that any others
face the possibility of being monitored by law enforceme nt
officials.
NOTE: DRW (DocuSP Remote Workflow) is not impacted by
security settings.
Disabling LP anonymous printing
You can choose to disable anonymous printing on all existing LP
printer queues that are associated with the DocuSP virtual
printers. When anonymous LP is di sabled, onl y systems tha t have
their IP address in the DocuSP controller /etc/hosts table are
authorized to submit LP requests. Answer “y” for yes to disable
this printing option.
Remote shell internet service
If you are using the legacy Xerox print command line client (the
software is not distrib uted with this release), you will need to use
the remote sh e ll in te r n et service to tran s fer files to the Doc u S P
controller. However, if you are not usi ng the Xerox print command
line client, it is strongly recommended that the remote shell
internet service is disabled. When these three questions are
answered, all remaining aspects of the "High" security setting are
implemented.
Security Guide11
enable-ftp and disable-ftp
These options allow for enabling and disabling FTP alone. You
must have FTP enabled when using a Continuous Feed system,
or FreeFlow Production Print and NetAgent.
FTP is also required for the Call fo r Assistan ce (CF A) feat ure. This
uses FTP to push IOT logs and a DocuSP outload back to the
DocuSP controller.
NOTE: Temporarily enable FTP through the DocuSP Setup >
FTP/Remote Diagnostics menu option.
Creating user-defined profiles
To create a customized profile, the administrator copies any
security profile and edits the profile according to the needs of the
customer environment. This new user profile can be selected,
edited, set as current, and set as default.
Setting the current and default profiles
Account management
The administrator can select any profile and set it as the Current
Profile. This Current Profile persists throughout reboot and
software upgrades until it is changed by the administrator.
Similarly, the administrator can select a Default Profile that
remains in effect until it is changed by the administrator.
Any interaction between a user and the DocuSP is assoc iated with
a user account and is done vi a a logon session, which is the bas is
for granting access.
DocuSP user accounts are defined either locally at the device or
remotely at a trusted network location like ADS. The local user
account is composed of a logon user name and an assigned user
group. A user account can be a member of one and only user
group. It is the user group that is associated wit h a security pr ofil e
that defines the privileges of the group.
Default user accounts are provided to allow easy transition from
DocuSP versions 3.8 and earlier.
12Security Guide
Local users and groups
Figure 1: Assignment to Groups
Figure 1: Assignment to Groups
Local user accounts are constructed based on the Solaris model,
with its limitations and restrictions, using the [User & Group
Management] selection on the DocuSP interface.
•Each local user account has an associated user name
between 2-8 characters in length and is case sensitiv e.
•The user name is a string of characters from the set of
alphabetic characters (a-z, A-Z), numeric characters (0-9),
period (.), underscore (_), and hyphen (-); the fi rst character
must be alphabetic and the string must contain at least one
lower case alphabetic character.
•Each account has the following attributes: user name,
password, user group, account disabled/enabled, and
comments.
•The maximum number of user accounts is 25,000.
•Each local user account has an associated user p assword that
is a sequence of characters that is case sensiti ve and between
0 - 8 characters in length.
Default user groups and user accounts
DocuSP provides three default user groups: Users, Operators,
and System Administrators. It also supplies four default user accounts: User, Operator, SA and CSE. User and Operator
accounts correspond to User and Operator User Group s whi le SA
and CSE both correspond to the System Administrators group.
.
User Accounts
User Accounts
Users
Users
Operators
Operators
System Administrator
System Administrator
CSEs
CSEs
User Groups
User Groups
Users
Users
Operators
Operators
System Administrators
System Administrators
The User , Operator and SA user accounts cannot be edited,
deleted, disabled, or removed from the assigned group. The CSE
account can be removed from the System Administrator group
and assigned to another group
Security Guide13
Creating user accounts
The DocuSP user interface enables the Administrator to manage
accounts easily by selecting [Setup], [Users & Groups], and the
[Users] tab.
When the administrator selects the Users tab, a pop-up window
appears that enables the administ rator to cr eate, edit, or delete an
account and indicate whether the account should be enabled or
disabled.
Group authorization
Job Management and Customer Diagnostics are two functions of
DocuSP that the administrator may choose to restrict. From the
Setup > Users & Groups menu option, select the “Group
Authorizations” tab i n the inter face. The admini strator can choose
to enable or disable the service for a particular user group.
Table 2-6 Enable/disable from the “Group Authorizations” tab
When the system is installed, the Change System Password
dialog box appears and prompts users to est ablish all System
Default Accounts with new passwords. For security reasons, all system passwordsmustbe changed.
•root: has super user access to the workstation. The initial
password for this account i s s et during installation of the
operating system and should be obtained from the Xerox
service personnel.
NOTE: For security reasons, the root account p assword should be
changed as soon as the Xerox ser vice personnel have completed
the installation.
•The Xerox user name is the account from which the Xerox
software runs. Enter the Xerox user password for this account.
Contact your Customer Service Representative if this is
unknown.
NOTE: The administrator should verify access to the Xerox
application for all levels before the service installation personnel
leave the site
•ftp: an account to permit some clients to retrieve their software
from the DocuSP controller using the TCP/IP communication
protocol. This account will be set to Read-only access to t he
/export/home/ftp directory
NOTE: T o maintain system security, it is recommended that any
restricted access login be terminated as soon as the session has
been completed.
NOTE: The user and group identifications, uid and gid, for the
Xerox accounts that are listed above cannot be arbitrarily changed
in the password and group files to new values because the
software is based on the proper access to the Xerox supplied fi les.
16Security Guide
NOTE: Please be aware that Xerox Customer Support Personnel
must have access to the new root password for service and
support. It is the customer's responsi bility to ensure that the root
and system administrator passwords are available for them.
Strong Passwords
DocuSP provides additional security for users required to adhere
to strict security guidelines. It provides a means in which a strong
password policy can be enforced.
Strong Passwords can be Enabled and Disabled (default setting)
via the Password Policies window.
Strong passwords must consist of ALL of the following
•A minimum of 8 characters in length
•Contain at least one capital letter
•Contain at least one number
•Contain at least one special character {!, @, #, $, %, ^, &, *},
including open and close parentheses { ( ) }, hyphen{ - },
underscore{ _ }, and period{ . }.
NOTE: In DocuSP 4.x - The minimum password length is set in
the security profiles. To enable the remaining requirements, the
root (su) user must run the setstro ngsecurity script located in the /
opt/XRXnps/bin directory and reboot the system. Once the strong
password feature is enabled, upon creat ion, new users will be
forced to have a strong password assigned to their account. The
passwords for exist ing user s wil l remai n the s ame and continu e t o
work as before, but can be updated if necessary.
NOTE: The strong password requirements cannot be modified. A
strong password cannot be set for roo t or any other Solaris user
accounts that are not created by DocuSP.
NOTE: Remote Network Server: If running NIS+ name service,
strong passwords would be enforce d via the NIS + serv er.
This policy can be set by using the -a <# of allowed attempts>
argument with rpc.nispasswdd. For example, to limit users to no
more than four attempts (the default is 3) , you would type:
rpc.nispasswd -a 4.
How to Enable/Disable Strong Password
•From the Setup menu select [Users and Groups]
•From the Policies drop down menu select [Password]
•Enable/Disable Strong Password from the Password Policies
window . The default setting is “Disable”.
Security Guide17
Login Attempts Allowed
DocuSP has provided a means to lockout users after reaching th e
maximum number of consecutive attempts. Once this is done, the
user will need to apply (reset) a security pol icy and reboot the
system.
The number of failed attempts and enable/disable is configurable
via the Password Policy screen. When enabled, login attempts
can be set from 1-6 attempts before the user is locked out. This
function will only apply to failed login attempts via the DocuSP UI
and does not apply to the root (su) user.
How to Enable/Disable Login Attempts
•From the Setup menu select [Users and Groups]
•From the Policies drop down menu select [Password]
•Enable/Disable Login Attempts from the Password Policies
window . The default setting is “Disable”.
Password Expiration
The System Administrator can set a password expirat ion via the
Solaris Management Control.
NOTE: SMC (Solaris Management Control) has replaced
AdminTool. AdminTool has been retir ed in Solaris 10.
1. Open a terminal window and login as root
2. Type: smc &
3. Go to: System Configuration -> Users -> User Accounts->
<select user> -> Password Options tab
4. Enter values in the drop down menus associated with each
password expiration parameter.
The DocuSP UI does not handle password expiration. Thus,
DocuSP will not prompt the user to enter a new password if his/
her password has expired. Instead, a message is posted
indicating unknown user name or password. It is up to the
customer to determine that the password has expired. To do so,
the customer should open a terminal window and attempt to login
as the user in question. If the password has expired, the system
will prompt for the user to enter a new password .
Security Logs
User Activity on the System
When the High security profile is enabled, the Solar is Basic
Security Module (BSM) is activated.
18Security Guide
Date/Time User Login/Logout
This information is kept in the authlog and syslog in the /var/log
directory. Login/Logout to DocuSP is tracked as well as Network
Login/Logout.
Changing individual passwords
There are two ways to change passwords: Users can change
their own passwords using the selection on the Logon menu and
the administrator can change the password by double clicking on
the user name in the User tab of [Users and Groups
Management].
Accessing DocuSP through ADS
If DocuSP has been configured to join a Windows 2000 ADS
domain, users may log onto the printer using t heir Microsof t Active
Directory Services (ADS) user names.
To provide this option, the administrator must first configure
DocuSP appropriately for the DNS gateway (see the “Gateway
and Network Configuration” section of this guide). Additionally,
the administrator must access the [ADS Group s] tab through
[Users and Groups Management] and specify or edit the mapping
of the ADS groups to the DocuSP user groups having permis sion
to log on to the printer.
Configure DocuSP to Join the ADS Domain
To enable the ADS user accounts, DocuSP must have DNS
enabled and joined to the appropriate ADS domain.
1. Logon to DocuSP as a member of the System Admini strators.
From the Network Configuration option, select the DNS tab,
make sure that the Enable DNS check bo x is checked. Ensure
that the DNS Server list is filled in with the IP addresses of up
to three DNS servers to search when resolving host names to
IP addresses. (This is part of the network configuration
procedure).
2. Select the ADS tab, and enter in the fully qualified domain
name of the ADS domain.
3. Click “Join…” button to join DocuSP to the ADS domain
specified.
NOTE: If DNS is not enabled, the “Join...” button will not be
available.
Security Guide19
Map the ADS groups to the DocuSP user groups
From the Setup menu, Users & Groups option, select the ADS
Groups tab. A member of the System Administrators group can
specify, view and edit the mapping of ADS Groups to the three
DocuSP user groups (Administrators, Operat or, Users) permitted
to log on to the printer.
Log on to the system with ADS user names
From the Logon menu, select ADS for authentication, then log on
to the system with your ADS user name and password.
NOTE: For this feature to work, Administrators must ensure that
DNS is enabled, DocuSP is configured to join the ADS domain,
and ADS groups are mapped to the DocuSP user groups.
Troubleshoot ADS
Refer to the online help feature when troubleshooting ADS.
Limiting access
IP Filtering
DocuSP provides options that allow the administrator to block or
limit access to the system.
IP Filtering allows the administrator to block IP addresses and
provides access to services such as: LPR, IPP, HTTP, HTTPS,
SMB Printing, Raw TCP Printing, and FTP Connections.
The administrator can limit access through the DocuSP interface
[Setup > IP Filtering menu opti on]. The f ilte r allo ws the bl ocking of
specific IP addresses or a range of addresses from accessing the
system. Available options include: Enable All Connections,
Disable All Connections, Enable Specified Connections.
Additional subnet mask can also be specified.
Refer to online help for detail ed descriptions of IP Filtering
property tabs such as: General tab, System t ab, INIT tab, INETD
tab, RPC tab.
20Security Guide
Remote Workflow
Secure Socket Layer
Remote Workfl ow allows for a rem o te c o nnection to the D o cu S P
controller.
The administrator can limit access through the DocuSP interface
[Setup > System Preferences menu option]. Remote Workflow
options include: Enable All Connections, Disable All Connecti ons,
Enable Specified Connections (by specific IP Address).
NOTE: The default is Enable All Connections.
DocuSP implements Secure Socket Layer technology using
encryption, a secure port, and a signed digital certificate.
Secure Socket Layer (SSL) and Transport Layer Security (TLS)
are two network security protocols that encrypt and transmit data
via HTTP and IPP over the TCP/IP network. SSL is a protocol
layer placed between a reliable connection- oriented networ k layer
protocol and the application protocol layer.
The network client and the web server (printing system) decide
which protocol to use for data transfer and communicat ion.
The encryption level can be either secure or normal. Normal
security in the SSL/TLS tab means that the user can access IPP
or HTTP via http or https.
Using the DocuSP SSL/TLS Security Feature
The Secure Socket Layer (SSL) and Transport Layer Security
(TLS) are two protocols used to provide a reliable end-to-end
secure and authenticated connection between two points over a
network. The DocuSP SSL/TLS feature allows a DocuSP System
Administrator to do the following:
1. Create and use a self-signed SSL/TLS certificate
2. Use an existing certificate obtained from a certificate authority
(i.e. VeriSign, Thawte, etc.)
Creating and Using a Self-Signed Certificate
–Logon to DocuSP as System Administrator or as a user who
belongs to the System Administrator group.
–Go to Setup -> SSL/TLS
Security Guide21
–If not already enabled, click the 'OK' button in the "Informat ion"
pop-up box
–Click on the 'Add Certificate Button'. This will launch the "Add
Certificate Wizard".
Step 1 - Select "Self-Signed Certificate"
Step 2 - Select and enter either the server
•Domain Name
•IP Address
•Other
Step 3 - Enter the requested information:
•Organization (required)
•Organizational Unit (optional)
•E-mail (optional)
•Locality (optional)
•State/Province (optional)
•Country (required)
Step 4 - Enter the l ength of ti me that the cer tificat e will be va lid
for.
Step 5 - Verify information entered in previous steps.
Step 6 - A message will appear indicating that the self-signed
certificate has been installed.
NOTE: During steps 2-5, the user may go back and correct any
mistakes made in previous steps .
–Click on the 'Enable SSL/TLS' checkbox at the top of the SSL/
TLS window.
–Select a SSL/TLS mode of operation:
•Normal (Encrypted and Unencrypted Access)
•Secure (Encrypted Access Only)
–Select encryption strength:
•Normal (DES-MD5-56-bit)
•Normal (DES-MD5-40-bit)
•Normal (DES-MD5-128-bit)
•Normal (3DES-MD5-128bit)
•High (RC4-MD5-128-bit)
•High (3DES-MD5-128-bit)
Using an Existing Signed Certificate from a Certificate Authority
–If SSL/TLS is not already enabled
22Security Guide
–Click 'Add Certificate'
Step 1 - Select "Signed Certificate from a Certificate Authority"
Step 2 - Select and enter either the server
•Domain Name
•IP Address
•Other
Step 3 - Enter the requested information:
•Organization (required)
•Organizational Unit (optional)
•E-mail (optional)
•Locality (optional)
•State/Province (optional)
•Country (required)
Step 4 - Browse to the location of the signed certificate (.pem
file).
Step 5 - Verify information entered in previous steps.
Step 6 - A message will appear indicating that the certificate
has been installed.
NOTE: During steps 2-5, the user may go back and correct any
mistakes made in previous steps .
Digital Certi ficates
SSL/TLS cannot be enabled unless a digital certifi cate has been
installed on the syst em, using the Add Cer tificate but ton. Inst alli ng
a digital certificat e can only be done by someone with
administrator privileges.
The administrator selects SSL/TLS from the [Setup] Menu and
clicks on the [Add Certificate] button. This invokes the Add
Certificate wizard. There are two option s regarding digital
certificates. One option is “Self-si gned certificate”. This is selected
when no third party Certificate Authority is being used.
Another option is “Signed Certificate from a Certificate Authority”.
In this case, the administrator needs to supply the fully qualified
domain name, IP address, organization and country of the
Certificate Authority.
If the choice is to use a Certificate Authority, all Certificate
information needs to be held in a file and sent to the Certifi cate
Authority. The Authority returns a valid certificate that must be
installed on the system.
Security Guide23
Network Protocol
NOTE: A self-signed certificate is not as secure as a certific ate
signed by a Certificate Authority. A self-signed certificate is the
most convenient way to begin using SSL/TLS and does not
require the use of a server functioning as a Certificate Authorit y or
a third party Certif icate Authority.
Once the Digital Certificate has been installed, the Enable SSL/
TLS selection becomes available among the [Setup] options. At
that time the administrator can selec t the mode of oper ation,
Normal or Secure, from a drop-down menu.
This section addresses Network Protocol, name service changes
and the changes that occur when security is invoked.
The table below addresses the list of Network Prot ocols that are
used by the DocuSP server software or Xerox client operations.
Table 2-7 Network Protocols
Network
Protocol
XSunRequired for functionality of DocuSP diagnostics software.
HTTPUsed when connecting to the server via the HTTP gateway.
Connections can also be filtered using the IP Filter feature
under Setup -> IP Filter.
Tomcat web
server
IPPRequired for job submissions from the FreeFlow Print Man ager
Sun RPCUsed by many dif ferent clients, inc luding DigiPath/FreeFlow
Required for the functionality of the DocuSP Internet Servi ces
gateway and the Xerox Remote Services application.
and/or a Digipath (FreeFlow 2.0+) client. The IPP gateway can
be enabled/disabled under Setup -> Gateways -> IPP tab.
Connections can also be filtered using the IP Filter feature
under Setup -> IP Filter.
and DocuSP Remote WorkFlow (DRW), and network servi ces
such as NIS+. T ypically used to establish a connecti on to the
server , which then redirec ts the connecti on to another open port
using OS level port management. This service is shutdown
when DocuSP security is set to high. Connections can also be
filtered using the IP Filter featur e under Setup -> Security
Profiles -> <Any Profile> -> RPC tab
Required
SNMPUsed for SNMP message exchange and traps. The SNMP
gateway can be enabled/disabled under Setup -> Gateways ->
SNMP.
24Security Guide
Network
Protocol
Required
WINS Required when in an env ir onment where connecti on to a WINS
server is necessary. WINS service can be enabled/disabled
under Setup -> Network Configuration -> WINS tab.
Socket (Raw
TCP/IP)
Printing
Required if jobs will be submitted via the socket gateway. The
socket gateway can be enabled/disabled under Setup ->
Gateways -> Socket. Connections can also be f iltered using the
IP Filter feature under Setup -> IP Filter.
LPD (LP/LPR)Required for job submissio ns via t he LP/LPR gateway (LP/ LPR
client, DocuSP Print Service (Reprint Manager), etc.). The port
assigned to the LPD can be changed and/or the gateway can
be enabled/disabled under Setup -> Gateways -> LPD.
SSHAccess the server via a secure shell (SSH, SFTP, etc.).
FTPAccess the server via FTP and/or submit jobs from a DigiPath/
FreeFlow client via the Digipath/FreeFlow Print Manager. This
service (ftpd) is shutdown when DocuSP security is set to high.
In FreeFlow v2.0, the client has the ability to use secure FTP
(sFTP) when DocuSP security is set to high and FTP is not
available. Connections can also be filtered using the IP Fil ter
feature under Setup -> Security Profiles -> <Any Profile> ->
RPC tab.
SSLRequired when using the TLS/SSL security feature and/or a
FreeFlow 2.0+ client with DocuSP security is set to high.
Connections can also be filtered using the IP Filter feature
under Setup -> IP Filter.
NFSNecessary when using NFS mounted directories. This servic e
is disabled when DocuSP security is set to high. Connections
can also be filtered using the IP Filter feature under Setup ->
Security Profiles -> <Any Profile> -> RPC tab.
NOTE: The IP Filtering (Setup->IP Filter) feature can also help in
limiting access to the server. This is DocuSP's GUI interface to the
SunScreen Lite firewall that is p art of the Solaris 8 Operating
System. This feature allows the user to limit the number of clients
who are allowed to access the server via services such as LPR,
IPP, HTTP, HTTPS, SMB Printing, and FTP. By default, the firewal l
is disabled (all port s open), but can be enabl ed to eit her only al low
specified connections (by IP addre ss, IP addres s range, or subnet
mask) or to close all ports. For DR W cli ents, this mechanism
exists under System Preferences -> Remote Workflow -> "Enable
Specified Connections".
NOTE: FreeFlow v2.0 and newer allows users to select whether
or not the DocuSP server they connecting to will have high
security enabled. If so, the client will use other communication
paths such as sIPP (via SSL) for job submissions and sFTP for
decomposition services (NetAgent).
Security Guide25
Roles and responsibilities
Xerox will make every effort to assist the a dmini strat or in ensuri ng
that the customer environment is secure.
Xerox responsibilities
Xerox is committed to providing a level of security which will allow
the DocuSP controller to be a good network citizen in response to
current security intrusi ons. Additional securi ty beyond this remai ns
the responsibility of the customer.
Xerox is constantly evaluati ng the security of the DocuSP
controller and the Sun Solaris operating syst em. Xerox is
committed to providing the late st Solaris securi ty patches provi ded
by Sun Microsystems in each major DocuSP release. The
DocuSP development team will also add Solaris security patches
in between major release cycles. All OS secur ity patches for
applications that are added during a DocuSP install will be
included, even if the application code is not normally used by
DocuSP users. Security patches for applications that are not
loaded by a DocuSP install will not be eval uated or i ncluded. Only
the version of a patch impa cting security will be included. If a
security patch has a newer version that is not security related,
then this patch will not be updated to the newer version. Any
security patch that is determined to have a negative impact to
DocuSP operation will not be added.
Customer Responsibilities
The administrator has the primary responsibility for maintaining
the security of the network within the customer's site. It is
important that network security is continuously monitored and
maintained, and that appropr iate security policies are established
and followed.
The procedures outlined in this document assume a basic
knowledge of UNIX, the vi editor, and general computing
concepts. It is expected that the network administrator or system
administrator responsible f o r network security understands the
base commands (cd, chmod, cp, grep, kill, l n , ls, man, more, ps,
etc.), and the UNIX directory path and filename structures shown
in this document.
There is information within the text and in the appendix sections
for reference to those who may not use UNIX often.
The DocuSP product operates on the default Solaris OS
configuration and some additional Solaris patches required by
DocuSP. Several scripts are used to provide additional secur ity for
26Security Guide
Security tips
the DocuSP. Not all scripts are public knowledge, only those that
are public are defined in this document and these can be
performed by the customer.
Xerox DocuSP engineering will evaluate the latest Sun Security
Alert Packs issued by Sun Microsystems and integrate these
patches into the DocuSP releases. Local customer support will be
responsible for loading the latest DocuSP software.
Xerox strongly recommends that the customer change passwords
from the default settings since the ultima te security of the printing
system resides with the customer.
NOTE: Please be aware that the Xerox Customer Support
Personnel must have access to the new root password for service
and support. It is the customer's responsibility to ensure that the
root password is available for them.
The following recommendations will enhance security.
Document and backup
Always document and backup all files that you modify in case
some unforeseen problem occurs. Example: #cp/etc/inet/
inetd.conf /etc/inet/ inetd.conf.orig <RETURN>. If, for whatever
reason, the DocuSP controller will not boot up after your
modifications, you can restore the software to its original
configuration by booting to single user mode. Thi s is done by
typing boot -s from the <ok> prompt. You will be prompted for the
root password. Upon login as root, you can copy the original files
back. For SPARC controllers running Solari s 8, thi s is done by
typing boot -s from the <ok> prompt. For x86 controll ers running
Solaris 9, this is done by typing reboot -- -s in a terminal window.
If you are unfamiliar with the vi editor, you can use the GUI based
Text Editor program. To launch the editor as root user, in a
terminal window login as root and enter the following: #/usr/
openwin/bin/textedit & <RETURN> Textedit leaves a backup of
the modified file in the same directory. For SPARC controllers
running Solaris 8, in a terminal window, as root, type: /usr/
openwin/bin/textedit & <RETURN>. For x86 controllers running
Solaris 9, in a terminal window, as root, type: /usr/dt/bin/dtpad &
<RETURN>. This backup file wil l have a% af ter the name. Thi s file
can be deleted if you have already backed up the original file.
When you make a manual change to the /etc/inetd.conf file, to
avoid rebooting the controller, you can retstart the inetd process.
To do this, as root user type: ps -e | grep inetd <enter> and note
the process ID returned. Then, type: kill -HUP #### (where ####
denotes the process ID).
Security Guide27
Online Help for security
A great deal of helpful security information can be found in Online
Help. Sun's security tools and blueprints may be found at:
http://www.sun.com/solutions/blueprints/
Other security information, including alerts, may be found at: