
102
Chapter 15: Managing Information Services on the Firewall
The Gauntlet Info Server implements a minimalist design, in which the server handles
only the file requests. A variety of management tools (on a per-service basis) actually
provide the data. These smaller programs are easier to analyze and verify that there are
no holes. Simpler code is easier to verify.
How It Works
The following sections describe how the InfoServer works.
HTTP and Gopher Server
When serving as an HTTP or Gopher server, the Info Server (info-gw) runs on the firewall
as a daemon listening for TCP-based requests on port 8000. When the firewall receives a
request, it forks a child copy of the Info Server, leaving the parent Info Server to continue
listening for requests.
The child Info Server process looks at the request and places it in one of several categories
(such as Gopher or HTTP).
It checks the appropriate configuration information (in the netperm-table) and determines
whether the requesting host has permission to use the desired service. If not, the Info
Server logs the connection and displays an error message.
If the host has permission to use the service, the Info Server uses its internal database (by
default in /usr/gauntlet/infodb) to find the requested file or to go to the requested directory.
The client thinks it is talking to a regular HTTP or Gopher server, even though it is not.
FTP Server
When serving as an anonymous FTP server, the Info Server runs in conjunction with the
network access control (netacl) daemon. In this scenario, the IRIX system runs the
network access control daemon (netacl) as a daemon listening for requests on the
standard FTP port (21). Whenever the firewall receives a FTP request on this port, the
netacl daemon checks its configuration information (in the netperm-table file) and
determines whether the initiating host has permission to use FTP. If the host has
permission, the netacl daemon starts the standard FTP proxy (ftp-gw) or the Info Server
Summary of Contents for Gauntlet
Page 1: ...Gauntlet for IRIX Administrator s Guide Document Number 007 2826 004 ...
Page 16: ......
Page 26: ......
Page 27: ...PART ONE Understanding the Gauntlet Internet Firewall I ...
Page 28: ......
Page 43: ...PART TWO Configuring and Using Proxies II ...
Page 44: ......
Page 50: ......
Page 56: ......
Page 64: ......
Page 72: ......
Page 94: ......
Page 109: ...PART THREE Administering General Gauntlet Firewall Services III ...
Page 110: ......
Page 140: ......
Page 147: ...Introductory Management Form 121 Figure 17 4 Gauntlet Introductory Management Form 2 of 3 ...
Page 155: ...Routing Configuration Form 129 Figure 17 8 Routing Configuration Form ...
Page 163: ...Proxy Servers Configuration Form 137 Figure 17 11 Proxy Servers Configuration Form 2 of 3 ...
Page 170: ...144 Chapter 17 The Graphical Management Interface Figure 17 13 DNS Configuration Form 1 of 2 ...
Page 171: ...DNS Configuration Form 145 Figure 17 14 DNS Configuration Form 2 of 2 ...
Page 177: ...Sendmail on Gauntlet Servers 151 Figure 17 15 Sendmail Configuration Form ...
Page 187: ...Logfiles and Reports Configuration Form 161 Figure 17 20 Reports and Logfiles Form 1 of 2 ...
Page 191: ...Authorizing Users Form 165 Figure 17 22 Authorizing Users Form ...
Page 192: ...166 Chapter 17 The Graphical Management Interface Figure 17 23 Add User Form ...
Page 214: ......
Page 232: ......
Page 233: ...Appendixes IV ...
Page 234: ......
Page 294: ......
Page 305: ......