Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

When Linux starts a service, Linux also runs a startup script. The startup script runs when the machine powers on or when a service manually starts. The startup script startup script typically runs tasks that relate to the starting, stopping, and restarting of a service.

For database services, the startup script startup script typically runs tasks that occur in folders that hold database files. With encrypted database files, you must allow the startup script the startup script to access the database folders. If not, the database will not start properly, and in some cases, interfere with the power-on process for the machine. 

As part of the startup process, the operating system needs permission to view and change file/folder ownership and permissions. As a result, if you want to guard var/lib/mysql, you must create two rules in your policy.

...

The system needs to access the commonly guarded (encrypted) folders inside of /var/lib/mysql.


Access to GuardPoints

The resource is relative to the GuardPoint. In other words, if the GuardPoint is /var/lib/mysql, and you want to allow access to a particular file in that directory, you would only need to specify that specific file in your resource parameter.

For instance if the GuardPoint is /var/lib/mysql/, then your resource would only be mysql.sock.


Allow startup scripts to access encrypted MySQL databases

Note

In the instructions below, you will create and add two rules to your policy. 

  1. Log into your DSM

...

  1. as Security Administrator.

...

  1. In the menu bar,

...

  1. click Polices, and then click

...

  1. Manage Policies.

...

  1. Mark the policy that guards your databases, such

...

  1. as /var/ib/sql/data, and then

...

  1. click Add.

...

...

  1. Under Security Rules,

...

  1. click Add.

...

  1. Next

...

  1. to Resource,

...

  1. click Select.

...

  1. In the window that appears,

...

  1. click Add.

...

...

  1. In Name, enter a descriptive name for your Resource Set.

...

...

  1. Click Add

...

  1. to specify a resource that will need to be accessed in the GuardPoint upon startup.

...

  1. In Directory, enter a slash:

...

  1. \

...

  1. In File, enter the mysql.sock file that needs to be accessed upon startup, and then

...

  1. click Ok. These resource must be added one at a time.

  2. (Optional) To add resources, repeat steps 8 - 10.

  3. Mark the newly created Resource Set, and then

...

  1. click Select Resource Set.

...

  1. In the window that appears,

...

  1. Resource

...

  1. is populated with the newly created Resource Set.

...


...


  1. Image Added

  2. Next

...

  1. to Effect,

...

  1. click Select.

...

...

  1. Mark Permit and Apply Key.

...

...

  1. Click Select Effect.

...

  1. Click Ok.

...

  1. Mark the rule, and then

...

  1. click Up

...

  1. to move the new rule above the catch-all rule.

    Note
    For your reference you have just created and added the first rule.

...

  1. Image Added
  2. Inside your policy editor, click Add to create the second security rule.

  3. Next to Action, click Select.

...

  1. Using the image below for, mark all the rules listed below.

...


...


  1. Image Added



  2. Click Select Action.

...

  1. Next to Effect, click Select.

...

  1. Mark Permit, and then click Ok.

...


...


  1. Image Added

  2. Click Ok.

...

  1. Mark the rule, and then

...

  1. click Up

...

  1. to move the new rule up one entry.

...



  1. Image Modified

  2. Click Apply to save, and then

...

  1. click Ok.

  2. (Optional) You should test to make sure your system is running properly.

...