Phil's Notes

Questions

   System: RHEL4 U5 2.6.9-55.EL
   Manual:
      (Note: The section Deploying Pointsec on page 22 has no content.)

   The disk appears to be encrypted with AES-CBC-PLAIN.  Will Pointsec use
   CBC-ESSIV, LRW, or any of the other modes suggested for disk encryption
   with a newer kernel?

   What tokens are supported for dynamic passwords?

   Are there any issues with using lilo rather than grub?  It does not
   appear anything but initrd is modified in /boot.

   What happens if the initial encryption of the disk is interrupted
   (e.g. power failure)?

   Assuming the root partition is not encrypted, is there any option
   to mount an encrypted filesystem at user login rather than boot?

   It appears all remote control type activity (updates, profiles) depends
   on files placed in the file system and no realtime network connectivity
   (except maybe NFS configured by the system administrator) is used
   on Linux.  Correct?

   Password/Key Storage

     The manual has no information, but I am assuming that a key is derived
     for each user and the master encryption key is encrypted and decrypted
     with these keys.  The manual provides no useful information on this.

     The manual says that the system providing remote help must have access
     to /var/p4l/backup/<hostname>.db to generate the recovery scripts.
     Is this also true for remote help?  If not, exactly how is the master
     key decrypted on the client?

     Are any password strengthening techniques used for protection of user
     keys, e.g. PBKDF2/PKCS#5?

     Can the master encryption key be exported?

   Is there any support for file-backed file systems (i.e. dm-crypt and
   loopback device)?  If so, are there any issues with the use of journalized
   file systems?

   Is there a command-line tool to display/export/import the profile and
   configuration information?  Where is the documentation on the format
   of these files?

   Comment: GUI should support standard cursor keys.

Linux Installation

Distribution

$ unzip -t pointsec_linux.zip
Archive:  pointsec_linux.zip
[pointsec_linux.zip] Pointsec_for_Linux_2[1].0/ password:
    testing: Pointsec_for_Linux_2[1].0/   OK
    testing: Pointsec_for_Linux_2[1].0/p4l_admin_install-2.0.0-11-redhat4.sh   OK
    testing: Pointsec_for_Linux_2[1].0/p4l_admin_install-2.0.0-11-suse10.0.sh   OK
    testing: Pointsec_for_Linux_2[1].0/p4l_admin_install-2.0.0-11-suse9.3.sh   OK
    testing: Pointsec_for_Linux_2[1].0/Pointsec_for_Linux_2.0_QRG_A.pdf   OK
    testing: Pointsec_for_Linux_2[1].0/Pointsec_for_Linux_2.0_Release_Notes.pdf   OK
No errors detected in compressed data of pointsec_linux.zip.

p4l_admin_install-2.0.0-11-redhat4.sh

p4l-package/bin/p4l_installrpm.sh

RPM install

RPM contents

analon:~/Pointsec/Pointsec_for_Linux_2[1].0/p4l-package/bin (2)
$ rpm -ql -p ../data/p4l-2.0.0-11.i386.rpm
/bin/p4l_buildrpm.sh
/bin/p4ladmin
/bin/p4lsupport
/bin/p4lsupport.pl
/etc/init.d/p4l
/etc/p4l
/etc/p4l/vendor
/lib/libp4ladminutils.a
/lib/libp4lcommon-2.0.0-11.so
/lib/libp4lcommon-2.0.0-12.so
/lib/libp4lcommon.a
/lib/libp4lcommon.la
/lib/libp4lcommon.so
/lib/libp4ldaemon.a
/lib/libp4ldb-2.0.0-11.so
/lib/libp4ldb-2.0.0-12.so
/lib/libp4ldb.a
/lib/libp4ldb.la
/lib/libp4ldb.so
/lib/libp4llogon.a
/lib/libp4lprofile-2.0.0-11.so
/lib/libp4lprofile-2.0.0-12.so
/lib/libp4lprofile.a
/lib/libp4lprofile.la
/lib/libp4lprofile.so
/lib/libp4ltoken-2.0.0-11.so
/lib/libp4ltoken-2.0.0-12.so
/lib/libp4ltoken.a
/lib/libp4ltoken.la
/lib/libp4ltoken.so
/sbin/mkinitrd.P4L
/sbin/p4l_mkfs.sh
/sbin/p4l_patch.pl
/sbin/p4l_update_bm.pl
/sbin/p4ldaemon
/sbin/p4linstall
/sbin/p4llogon
/sbin/p4lrecovery
/sbin/p4lsplash
/usr/share/locale/en_US/LC_MESSAGES/p4l.mo
/usr/share/p4l
/usr/share/p4l/bootsplash
/usr/share/p4l/bootsplash/p4lbg-1024x768.jpg
/usr/share/p4l/bootsplash/p4lbg-1280x1024.jpg
/usr/share/p4l/bootsplash/p4lbg-640x480.jpg
/usr/share/p4l/bootsplash/p4lbg-800x600.jpg
/var/p4l/recovery/p4lrecovery.sh
/var/p4l/rpm
/var/p4l/rpm/packages
/var/p4l/rpm/packages/BUILD
/var/p4l/rpm/packages/RPMS
/var/p4l/rpm/packages/SOURCES
/var/p4l/rpm/packages/SPECS
/var/p4l/rpm/packages/SPECS/p4l-client.spec
/var/p4l/rpm/packages/SRPMS

RPM scripts

Email

Date: Tue, 29 May 2007 12:18:05 -0400
From: Barb Quinn <BQuinn@MACOMPUTERS.COM>
To: benchoff@vt.edu, frankg@vt.edu
Subject: Pointsec Software Eval
Cc: Lou Caccamo <LCaccamo@MACOMPUTERS.COM>,
        Robert Schneeweis <Robert.Schneeweis@MACOMPUTERS.COM>,
        Chris Ward <Cward@MACOMPUTERS.COM>,
        Barb Quinn <BQuinn@MACOMPUTERS.COM>

Dear  Frank and Phil,

Thank you for your interest in the Pointsec product, Gartner's choice
for the magic quadrant for the last six years.

Please click the link below to download the evaluation product. The
package that you download contains an evaluation version of Pointsec
preconfigured for your convenience. Inside the archive is a file called
P4PC EW 6.1 Evaluation Guide v1.1.pdf. Please read the P4PC EW 6.1
Evaluation Guide v1.1.pdf file  first as it will explain the
installation procedure for Pointsec, as well as have the username and
logins, you will need them to access the product.

This archive contains a preconfigured copy of Pointsec, If you wish to
follow the document, and install it manually, you will need to remove
the ProfileEncryptv4.isp file from the 1_Pointsec for pc folder.

Please be advised that you need to have Microsoft .NET v1.1 (or higher)
installed.

(obtain it here, )
http://www.microsoft.com/xxxx
<blocked::http://www.microsoft.com/downloads/xxxx>

If you have any problems with the installation or using the product feel
free to contact me, and I will assist you in any way I can.

URL : http://www.macomputers.com/xxxx
<blocked::http://www.macomputers.com/xxxx>  (File name:
pointsec_eval.zip) The Archive password is xxxx

Robert Schneeweis  |  Pointsec SE  |  Mid-Atlantic Computers, Inc.
Office: 610.935.5570  |  Fax: 610.935.5787  |  Email:
robs@macomputers.com  |  Website: www.macomputers.com
<http://www.macomputers.com/>
[root@oanalon pointsec]# /sbin/cryptsetup -v status hda7
/dev/mapper/hda7 is active:
  cipher:  aes-plain
  keysize: 256 bits
  device:  /dev/hda7
  offset:  0 sectors
  size:    12572721 sectors