Securing Opmantek Applications
This is a checklist of default settings that should be changed to secure your Opmantek Applications.
1. General Configuration
1.1 Configuring SSL for web access to GUI
If you are using the Opmantek VM, refer to this wiki:
Some additional information not on the page. Skip steps 1-2 if you don’t want to use a self-signed cert. Just place your trust authority signed certs in the /etc/ssl/certs directory
- Run the openssl command from the directory where you want to save the certs. Default is /etc/ssl/certs
- openssl command should be updated to include an identifier for the certs
openssl req -x509 -newkey rsa:4096 -keyout <identifier>.key.pem -out <identifier>.cert.pem -days 365 -nodes # for example, if the server is named "batman", run the following openssl req -x509 -newkey rsa:4096 -keyout batman.key.pem -out batman.cert.pem -days 365 -nodes
- update ssl.conf to point to the new certs. ssl.conf can be found in these locations by default:
On debian|ubuntu:
/etc/apache2/conf-available/ssl.conf
On centos|redhat:
/etc/httpd/conf/ssl.conf
- update the following settings in ssl.conf
SSLCertificateFile /etc/ssl/certs/batman.cert.pem SSLCertificateKeyFile /etc/ssl/certs/batman.key.pem
- update virtual host configs as per wiki page
- Restart apache
#depending on the linux flavour used, the apache restart command with be one of the following: systemctl restart apache2 service httpd restart
1.2. Change default passwords
For web users, nmis and admin, needs to be done in NMIS and Open-AudIT
1.2.1 NMIS
Details on how to change to NMIS default passwords can be found here:
1.2.2 Open-AudIT
Details on how to change the default Open-AudIT passwords can be found here:
https://docs.community.firstwave.com/wiki/display/OA/Information+about+default+users+and+passwords
1.3. Remove unrequired users from system
There are a few user accounts created by default in NMIS. You should review these accounts and remove if necessary.
To view these accounts go to: NMIS → System → System Configuration → Users
Accounts that you should consider reviewing are: dc_ops, wan_ops.
2. Opmantek VM specific
2.1. Change omkadmin Linux user password:
# If you are logged in a superuser passwd omkadmin # If you are logged in as omkadmin: passwd
3. Linux Specific
SSH keys are more secure that using password so should be considered for access to the Opmantek VM. Some details on setting up SSH keys can be found here.
SUDO is the preferred method of providing superuser privileges to users. By default, when you invoke the sudo command, you will be prompted for your own password. This function can be turned off if required (see this link). For example, you may want to temporarily to run some scripts as a superuser.