Test System Security

cancel
Showing results for 
Search instead for 
Did you mean: 

LinuxRT User Permissions Report

We're delivering a system that has a cRIO and were given the requirement to "ensure that only authorized personnel from [company] have the ability to delete, modify and move critical files". Is there some standard way in Linux to produce some output that we could use to check this box?

 

For the admin account I think we should be fine by setting some default password and explaining how to update the password upon delivery but I'm less sure about the lvuser account and exactly what permissions that has. We've been careful about giving lvuser additional permissions but I'm not really sure what permissions lvuser has by default.

 

I'm concerned about the lvuser account because we're making use of the embedded UI and I haven't found a simple way to stop the user from getting into the terminal. Even though the application is set to full screen and we've disable ctrl keys and the close/minimize window but users can still plug in a keyboard and press alt+space to close out of the application window.

0 Kudos
Message 1 of 6
(307 Views)

We have a secure profile that we've developed for cRIO, and we recommend that you configure your cRIO to this profile. It addresses the concerns you raised about accounts, file access, and a number of other security concerns.

 

We are about to release it - it depends on a kernel update that is coming out soon. But contact me and I share what we have and figure out the best way for you to deliver this project. steve.summers@emerson.com

0 Kudos
Message 2 of 6
(286 Views)

@SumRunner Are you referring to the "lvuser" account or some other account? 

"All truths are easy to understand once they are discovered; the point is to discover them." -- Galileo Galilei

0 Kudos
Message 3 of 6
(260 Views)

The embedded UI doesn't have a login manager, so when you run embedded UI you are running as the lvuser. For the best security, disable embedded UI. If you run the SNAC configuration utility, it will disable embedded UI for this reason. 

0 Kudos
Message 4 of 6
(250 Views)

@SumRunner wrote:

We have a secure profile that we've developed for cRIO, and we recommend that you configure your cRIO to this profile. It addresses the concerns you raised about accounts, file access, and a number of other security concerns.

 

We are about to release it - it depends on a kernel update that is coming out soon. But contact me and I share what we have and figure out the best way for you to deliver this project. steve.summers@emerson.com


Few questions about this:

  1. Is this separate from the nilrt-snac repo that's on GitHub?
  2. You specifically mention cRIO but I'm guessing that's because of my post and this configuration would be valid for RT PXI controllers as well, correct?
  3. Would you anticipate this working well with VeriStand?

Right now, for this project, I think we'll first see if the customer comes back with any objections but we'll need to do this often enough for other projects so this sounds interesting.

0 Kudos
Message 5 of 6
(236 Views)

This is the NILRT-SNAC repo is on GitHub. But there is a new version to be released soon that makes significant improvements. I can share this with you if you email me.

 

This applies to both cRIO and PXI running NILRT. It's the same OS for both platforms.

 

Fully locked down in this mode, it doesn't fully work with VeriStand. Once it's locked down, you can open up parts of it to make it work with VeriStand, just document what had to be opened up for your customer. With that information, they can plan for other protections at the system level. 

 

email me directly for more information, steve.summers@emerson.com

0 Kudos
Message 6 of 6
(222 Views)