SunRay Server 5.3 Admin MANUAL
SunRay Server 5.3 Admin MANUAL
SunRay Server 5.3 Admin MANUAL
Version 5.3
Abstract This guide describes how to install, configure, and manage the Sun Ray Software 5.3 release. Document generated on: 2012-11-05 (revision: 1250)
Table of Contents
Preface ............................................................................................................................................ xiii 1. Audience .............................................................................................................................. xiii 2. Documentation Accessibility .................................................................................................. xiii 3. Related Documents .............................................................................................................. xiii 4. Conventions ......................................................................................................................... xiv 1. Overview ........................................................................................................................................ 1 1.1. What is Sun Ray Computing? .............................................................................................. 1 1.1.1. Stateless .................................................................................................................. 1 1.1.2. Secure ...................................................................................................................... 1 1.1.3. Available ................................................................................................................... 2 1.2. Parts of the Sun Ray Environment ....................................................................................... 2 1.2.1. Clients ...................................................................................................................... 3 1.2.2. Physical Network ...................................................................................................... 4 1.2.3. Sun Ray Server ........................................................................................................ 4 1.3. Management Areas .............................................................................................................. 4 2. Planning a Sun Ray Network Environment ...................................................................................... 7 2.1. Using a Shared Network Configuration ................................................................................. 7 2.1.1. Configuring a Shared Network ................................................................................... 8 2.1.2. VPN Capability ......................................................................................................... 8 2.1.3. IP MultiPathing ......................................................................................................... 9 2.1.4. IPv4 and IPv6 ........................................................................................................... 9 2.1.5. Network Performance Considerations ........................................................................ 9 2.2. Configuring Sun Ray Server Discovery ................................................................................. 9 2.2.1. Firmware Server ..................................................................................................... 10 2.2.2. Session Server ....................................................................................................... 10 2.2.3. Using Domain Name Service (DNS) ........................................................................ 11 3. Installing and Configuring .............................................................................................................. 13 3.1. Product Requirements ........................................................................................................ 13 3.1.1. Operating System Requirements .............................................................................. 13 3.1.2. Sun Ray Operating Software ................................................................................... 14 3.1.3. Windows Remote Desktop Support .......................................................................... 14 3.1.4. Feature Differences Between Oracle Solaris and Oracle Linux Platforms .................... 15 3.1.5. Disk Space Requirements ....................................................................................... 15 3.1.6. Additional Oracle Solaris Requirements .................................................................... 16 3.1.7. Additional Oracle Linux Requirements ...................................................................... 16 3.1.8. Java Runtime Environment (JRE) Requirements ....................................................... 16 3.1.9. Sun Ray Admin GUI Web Server Requirements ....................................................... 17 3.1.10. Web Browser Requirements .................................................................................. 17 3.1.11. Sun Ray Data Store Port Requirements ................................................................. 17 3.1.12. How to Install Apache Tomcat ............................................................................... 18 3.1.13. Ports and Protocols ............................................................................................... 18 3.2. Installing ............................................................................................................................ 21 3.2.1. Using the utsetup Command ................................................................................ 21 3.2.2. Not Using the utsetup Command .......................................................................... 21 3.2.3. Automating Sun Ray Software Installations .............................................................. 22 3.2.4. Installing Firmware Before Sun Ray Software Installation .......................................... 22 3.2.5. How to Install and Configure Sun Ray Software ........................................................ 23 3.2.6. How to Install the Windows Connector Components on a Windows System ................ 31 3.2.7. How to Clone a Sun Ray Server .............................................................................. 36 3.2.8. How to Install and Configure a Sun Ray Server With Default Settings ......................... 38 3.2.9. How to Remove Sun Ray Software .......................................................................... 39
iii
3.2.10. Installation (utinstall) Error Messages ..................................................................... 39 3.3. Configuring Oracle Solaris Trusted Extensions .................................................................... 42 3.3.1. How to Configure a Private Network on Oracle Solaris Trusted Extensions ................. 42 3.3.2. How to Configure Shared Multilevel Ports (MLP) for Sun Ray Services ....................... 43 3.3.3. How to Increase the Number of X Server Ports ........................................................ 44 3.3.4. How to Configure the Windows Connector on Oracle Solaris Trusted Extensions ........ 45 3.4. Upgrading .......................................................................................................................... 46 3.4.1. Installing Firmware Before Sun Ray Software Upgrade ............................................. 46 3.4.2. How to Upgrade Sun Ray Software ......................................................................... 47 3.4.3. Planning Upgrades Using Failover Groups ............................................................... 49 3.4.4. How to Preserve Sun Ray Software Configuration Data ............................................ 50 4. Admin GUI and Commands .......................................................................................................... 53 4.1. Sun Ray Software Commands ........................................................................................... 53 4.1.1. How to Set Up Access to the Sun Ray Software Man Pages ..................................... 56 4.2. Administration Tool (Admin GUI) ........................................................................................ 56 4.2.1. Administrative Name and Password ......................................................................... 57 4.2.2. Admin GUI Tab Descriptions ................................................................................... 57 4.3. How to Log In to the Administration Tool (Admin GUI) ......................................................... 59 4.4. How to Change the Admin GUI Locale ............................................................................... 60 4.5. How to Change the Admin GUI to English Locale ................................................................ 60 4.6. How to Change the Admin GUI Timeout ............................................................................. 60 4.7. How to Enable or Disable Multiple Administration Accounts (Oracle Linux) ............................ 61 4.7.1. How to Configure Admin GUI Privileges for UNIX Users (Oracle Linux) ...................... 61 4.7.2. How to Limit Admin GUI Privileges to the Admin User (Oracle Linux) ......................... 61 4.8. How to Enable or Disable Multiple Administration Accounts (Oracle Solaris) .......................... 62 4.8.1. How to Configure Admin GUI Privileges for UNIX Users (Oracle Solaris) .................... 62 4.8.2. How to Limit Admin GUI Privileges to the Admin User (Oracle Solaris) ....................... 62 4.9. How to Audit Admin GUI Sessions ..................................................................................... 62 5. Sun Ray Server and Networking ................................................................................................... 65 5.1. Log Files ........................................................................................................................... 65 5.2. How to Start or Stop Sun Ray Services .............................................................................. 67 5.2.1. How to Stop Sun Ray Services ............................................................................... 67 5.2.2. How to Start Sun Ray Services (Warm Restart) ........................................................ 67 5.2.3. How to Start Sun Ray Services (Cold Restart) .......................................................... 67 5.3. How to Check and Fix Corrupted Configuration Files (Oracle Solaris) ................................... 67 5.4. How to Unconfigure a Sun Ray Server ............................................................................... 69 5.5. How to Disconnect a Sun Ray Server From the Interconnect ............................................... 69 5.6. User Fields in the Sun Ray Data Store ............................................................................... 69 5.7. Network Troubleshooting .................................................................................................... 70 5.7.1. Network Load ......................................................................................................... 70 5.7.2. The utcapture Utility ............................................................................................ 70 5.7.3. utcapture Examples ............................................................................................ 71 5.7.4. The utquery Command ......................................................................................... 71 6. Failover Groups ............................................................................................................................ 73 6.1. Failover Groups Overview .................................................................................................. 73 6.2. Failover Process ................................................................................................................ 74 6.3. Load Balancing .................................................................................................................. 74 6.4. Mixing Different Sun Ray Servers ....................................................................................... 74 6.5. Authentication Requirements .............................................................................................. 75 6.6. Dedicated Primary Servers for Data Store ........................................................................... 75 6.7. Setting Up a Failover Group ............................................................................................... 75 6.7.1. How to Configure a Primary Server ......................................................................... 76 6.7.2. How to Add a Secondary Server ............................................................................. 76 6.7.3. How to Synchronize Primary and Secondary Sun Ray Servers .................................. 77
iv
6.7.4. How to Change the Group Manager Signature ......................................................... 77 6.8. Additional Failover Group Tasks ......................................................................................... 78 6.8.1. How to Take a Server Offline and Online ................................................................. 78 6.8.2. How to Disable Load Balancing ............................................................................... 78 6.8.3. How to Show the Current Sun Ray Data Store Replication Configuration .................... 78 6.8.4. How to Remove the Replication Configuration .......................................................... 78 6.8.5. How to View the Failover Group Status .................................................................... 78 6.9. Recovery Issues and Procedures ....................................................................................... 79 6.9.1. How to Rebuild the Primary Server's Administration Data Store ................................. 79 6.9.2. How to Replace the Primary Server with a Secondary Server .................................... 80 6.9.3. Secondary Server Recovery .................................................................................... 80 6.10. Group Manager Details .................................................................................................... 80 6.10.1. Group Manager Configuration ................................................................................ 81 7. Sessions and Tokens ................................................................................................................... 83 7.1. Sessions ............................................................................................................................ 83 7.1.1. Authentication Manager ........................................................................................... 84 7.1.2. Session Manager .................................................................................................... 84 7.2. Tokens .............................................................................................................................. 85 7.2.1. Registering Tokens ................................................................................................. 86 7.2.2. How to Register a Token ........................................................................................ 86 7.2.3. How to Register a Pseudo-Token ............................................................................ 86 7.2.4. How to Enable, Disable, or Delete a Token .............................................................. 87 7.3. Token Readers .................................................................................................................. 87 7.3.1. How to Configure a Token Reader ........................................................................... 87 7.3.2. How to Locate a Token Reader ............................................................................... 88 7.3.3. How to Get a Token ID From a Token Reader ......................................................... 88 7.4. Session Troubleshooting .................................................................................................... 89 7.4.1. Problem: The dtlogin daemon cannot start the Xsun server properly. ...................... 89 8. Smart Card Services .................................................................................................................... 91 8.1. Smart Card Bus Protocol ................................................................................................... 91 8.2. Smart Card Probe Order .................................................................................................... 92 8.3. How to Enable Smart Card Services ................................................................................... 92 8.4. How to Add a Smart Card Configuration File ....................................................................... 93 8.5. How to Change the Smart Card Probe Order ...................................................................... 93 8.6. How to Change the Smart Card Bus Protocol ..................................................................... 94 8.7. Troubleshooting Smart Card Services ................................................................................. 94 8.7.1. Smart Card Transaction Problems ........................................................................... 94 8.8. Setting Up External USB Smart Card Readers .................................................................... 95 8.8.1. Installation .............................................................................................................. 95 8.8.2. Uninstallation .......................................................................................................... 95 8.8.3. Known Problems and Limitations ............................................................................. 96 9. Hotdesking ................................................................................................................................... 99 9.1. Hotdesking Overview ......................................................................................................... 99 9.2. Hotdesking Without Smart Cards ........................................................................................ 99 9.2.1. NSCM and Failover Groups ................................................................................... 100 9.2.2. How to Enable NSCM Sessions ............................................................................. 100 9.2.3. How to Log in to an NSCM Session ....................................................................... 101 9.3. Regional Hotdesking ........................................................................................................ 102 9.3.1. Regional Hotdesking Process ................................................................................ 103 9.3.2. Regional Hotdesking Site Requirements ................................................................. 103 9.3.3. Providing Site Integration Logic .............................................................................. 103 9.3.4. How to Configure a Site-specific Mapping Library ................................................... 103 9.3.5. How to Use Token Readers with Regional Hotdesking ............................................ 104 9.3.6. How to Configure the Sample Data Store ............................................................... 104
9.4. Remote Hotdesk Authentication (RHA) .............................................................................. 105 9.4.1. How to Disable Remote Hotdesk Authentication ...................................................... 106 9.4.2. How to Re-enable Remote Hotdesk Authentication ................................................. 106 10. Kiosk Mode .............................................................................................................................. 107 10.1. Kiosk Overview .............................................................................................................. 107 10.2. Kiosk Mode Security and Failover Considerations ............................................................ 108 10.3. Kiosk User Accounts ...................................................................................................... 108 10.3.1. Characteristics ..................................................................................................... 108 10.3.2. Restrictions and Safe Guards .............................................................................. 109 10.3.3. Administering the Kiosk User Pool ....................................................................... 109 10.4. Session Type Components ............................................................................................. 110 10.4.1. Session Descriptor .............................................................................................. 110 10.4.2. Session Script ..................................................................................................... 110 10.5. How to Configure Kiosk Mode and User Accounts ........................................................... 110 10.6. How to Add Kiosk User Accounts ................................................................................... 110 10.7. How to Configure a Kiosk Mode Session Type ................................................................ 111 10.8. How to Enable and Disable Kiosk Mode .......................................................................... 114 10.8.1. Unconfiguring Kiosk Mode Disables Kiosk Policy .................................................. 115 10.9. How to Override the Default Kiosk Mode Policy ............................................................... 115 10.10. Configuring the Windows Connector Kiosk Session Type ............................................... 117 10.10.1. How to Configure a Kiosk Mode Session Type for the Windows Connector ............ 118 10.11. Configuring the VMware View Connector Kiosk Session Type ........................................ 120 10.11.1. How to Configure a Kiosk Mode Session Type for the VMware View Connector ..... 120 11. Security .................................................................................................................................... 123 11.1. Security Overview .......................................................................................................... 123 11.2. Encryption and Authentication ......................................................................................... 123 11.3. Security Modes .............................................................................................................. 124 11.4. Client Key Management ................................................................................................. 125 11.5. Key Fingerprint .............................................................................................................. 126 11.6. Displaying Security Status .............................................................................................. 126 11.6.1. How to Display Security Status for a Sun Ray Client ............................................. 126 11.6.2. How to Display Security Status for All Sessions .................................................... 126 11.7. Managing Client Keys .................................................................................................... 127 11.7.1. How to Confirm a Specific Client Key ................................................................... 127 11.7.2. How to Confirm All Unconfirmed Client Keys ........................................................ 128 11.7.3. How to Display a Client's Fingerprint Key from a Sun Ray Client ............................ 128 11.7.4. How to Display All Client Keys ............................................................................. 128 11.7.5. How to Display All Keys for a Specific Client ........................................................ 129 11.7.6. How to Delete a Specific Client Key ..................................................................... 129 11.7.7. How to Delete All Client Keys for a Specific Client ................................................ 130 11.8. Managing Client Authentication ....................................................................................... 130 11.8.1. How to Disable Client Authentication .................................................................... 130 11.8.2. How to Force Client Authentication From All Clients .............................................. 130 11.8.3. How to Deny Access to Clients With Unconfirmed Keys ........................................ 131 11.9. Server and Client Authentication Troubleshooting ............................................................ 131 11.9.1. Error Messages ................................................................................................... 131 12. Multiple Monitor Configurations .................................................................................................. 135 12.1. Multi-Monitor .................................................................................................................. 135 12.1.1. Hotdesking and Multi-Monitor Configurations ........................................................ 136 12.1.2. How to Automatically Set a Client's Multi-Monitor Configuration .............................. 136 12.1.3. Using xrandr to Set a Specific Multi-Monitor Configuration ................................... 136 12.2. Multihead Groups ........................................................................................................... 139 12.2.1. Creating a Multihead Group ................................................................................. 140 12.2.2. Multihead Group Screen Indicator ........................................................................ 140
vi
12.2.3. Creating a Single Screen Across Several Monitors (Xinerama) ............................... 140 12.2.4. How to Create a New Multihead Group ................................................................ 141 12.2.5. How to Enable the Multihead Group Policy ........................................................... 141 12.2.6. How to Manually Set Multihead Group Screen Dimensions .................................... 142 12.2.7. How to Manually Set Multihead Group Geometry .................................................. 142 12.2.8. How to Disable Multihead Group for a Session ..................................................... 143 12.2.9. How to Enable and Disable Xinerama .................................................................. 143 12.2.10. How to Disconnect a Secondary Client ............................................................... 144 13. Sun Ray Clients ........................................................................................................................ 145 13.1. How to Centralize Sun Ray Client Configurations (.parms) ............................................... 146 13.2. Sun Ray Client Hot Keys ................................................................................................ 148 13.2.1. How to Configure the Utility Hot Keys ................................................................... 149 13.3. How to Change Sun Ray Client Audio and Display Settings (Sun Ray Settings GUI) ........... 151 13.4. How to List Available Sun Ray Servers ........................................................................... 152 13.5. How to List the Available Clients ..................................................................................... 153 13.6. How to Display Sun Ray Client Information ..................................................................... 153 13.7. How to Redirect a Sun Ray Client Session ...................................................................... 154 13.7.1. How to Manually Redirect to a Different Sun Ray Server (utselect) ......................... 154 13.7.2. How to Manually Redirect to a Different Sun Ray Server (utswitch) ......................... 155 13.8. How to Disconnect a Sun Ray Client Session .................................................................. 155 13.9. How to Terminate a Sun Ray Client Session ................................................................... 155 13.10. How to Power Cycle a Sun Ray Client .......................................................................... 156 13.11. How to Enable or Disable XRender ............................................................................... 156 13.12. How to Disable Screen Blanking on a Sun Ray Client .................................................... 156 13.12.1. How to Disable Screen Blanking for All Sun Ray Sessions ................................... 157 13.13. How to Modify Screen Resolutions ................................................................................ 158 13.14. How to Enable the NumLock Key for All Sun Ray Sessions ............................................ 158 13.15. How To Identify a Hung Session ................................................................................... 159 13.16. How To Kill a Hung Session ......................................................................................... 159 13.17. How to Limit Administrative Privileges for Non-root Users (Oracle Linux) ......................... 160 13.18. Keyboard Country Codes .............................................................................................. 160 13.19. Sun Ray Client Boot Process ........................................................................................ 161 13.20. Audio Output Troubleshooting ....................................................................................... 164 13.20.1. Audio Frequencies Used With Applications ......................................................... 164 13.20.2. Tracking Audio Sessions .................................................................................... 164 13.20.3. Audio Device Emulation ..................................................................................... 165 13.20.4. Problem: Audio is not working ............................................................................ 165 13.20.5. Problem: Audio is not working when playing Adobe Flash Videos on an Oracle Linux Desktop ................................................................................................................. 165 13.20.6. Problem: Audio is not working with Firefox .......................................................... 166 13.20.7. Problem: An application ignores the $AUDIODEV environment variable ................ 166 13.20.8. xmms Player Configuration (Oracle Linux) ........................................................... 166 14. Sun Ray Client Firmware .......................................................................................................... 167 14.1. Firmware Overview ........................................................................................................ 167 14.2. Firmware Server Discovery ............................................................................................. 168 14.3. How to Update Firmware on Sun Ray Clients .................................................................. 168 14.4. How to Enable and Disable the Configuration GUI on All Sun Ray Clients ......................... 169 14.5. How to Modify a Sun Ray Client's Local Configuration (Configuration GUI) ........................ 171 14.5.1. Trival File System ............................................................................................... 171 14.5.2. Configuration GUI Menu Descriptions ................................................................... 172 14.5.3. How to Load a Remote Configuration File ............................................................ 177 14.6. VPN Support .................................................................................................................. 179 14.6.1. How to Configure VPN Using Cisco Hybrid Authentication ..................................... 180 14.7. 802.1x Authentication ..................................................................................................... 181
vii
14.7.1. How to Configure and Enable 802.1x Authentication on a Sun Ray Client ............... 181 14.8. How to Display Firmware Versions for All Currently Connected Sun Ray Clients ................. 183 14.9. How to Display the Firmware Version from a Sun Ray Client ............................................ 183 14.10. How to Synchronize the Sun Ray Client Firmware ......................................................... 183 14.11. How to Disable All Sun Ray Client Firmware Updates .................................................... 183 15. Sun Ray Client Peripherals ....................................................................................................... 185 15.1. Peripherals Overview ..................................................................................................... 185 15.2. USB Headsets ............................................................................................................... 186 15.2.1. Tested USB Headsets ......................................................................................... 186 15.2.2. Tested Applications ............................................................................................. 186 15.2.3. Additional Notes .................................................................................................. 187 15.3. USB Operations Failing After Idle Timeout Limit .............................................................. 187 15.4. Device Nodes and USB Peripherals ................................................................................ 187 15.5. Device Node Paths ........................................................................................................ 188 15.6. Device Links .................................................................................................................. 188 15.7. Device Node Ownership ................................................................................................. 188 15.8. Hotdesking and Device Node Ownership ......................................................................... 189 15.9. Enabling and Disabling Device Services .......................................................................... 189 15.10. Mass Storage Devices .................................................................................................. 189 15.10.1. Device Nodes and Links (Oracle Solaris) ............................................................ 189 15.10.2. Device Nodes and Links (Oracle Linux) .............................................................. 190 15.10.3. Mount Points ..................................................................................................... 190 15.10.4. Device Ownership and Hotdesking ..................................................................... 190 15.10.5. Mass Storage Devices and Idle Sessions ........................................................... 190 15.10.6. Commands for Common Disk Operation (Oracle Solaris) ..................................... 191 15.10.7. Commands for Common Disk Operation (Oracle Linux) ....................................... 191 15.11. How to Determine the Current State of Device Services ................................................. 192 15.12. How to Enable or Disable USB Services ....................................................................... 192 15.13. How to Unmount a Mass Storage Device From a Client ................................................. 192 15.14. Troubleshooting USB Storage ....................................................................................... 192 15.14.1. Problem: Device nodes are not created. ............................................................. 192 15.14.2. Problem: The device is not automatically mounted. ............................................. 192 15.14.3. Problem: The device is not automatically unmounted. .......................................... 193 15.15. Setting Up Printers ....................................................................................................... 193 15.15.1. How to Set Up an Attached PostScript Printer (Oracle Solaris) ............................. 193 15.15.2. How to Set Up an Attached PostScript Printer (Oracle Linux) ............................... 194 15.15.3. How to Set Up an Attached Non-PostScript Printer .............................................. 195 15.16. How to Set Up Serial Attached Devices ........................................................................ 196 15.17. How to Enable Applications to Access USB Devices ...................................................... 196 16. Sun Ray Client Troubleshooting Icons ....................................................................................... 197 16.1. On-Screen Display (OSD) Icons ..................................................................................... 197 16.2. Server Policy Icons ........................................................................................................ 198 16.3. Troubleshooting Icon Quick Reference ............................................................................ 199 16.4. DHCP State Codes ........................................................................................................ 202 16.5. Power LEDs .................................................................................................................. 202 16.6. (1) Sun Ray Client Startup Icon ...................................................................................... 203 16.7. (2) Firmware Download in Progress Icon ......................................................................... 203 16.8. (3) Updating Firmware Icon ............................................................................................ 204 16.9. (4) Firmware Download Diagnostics Icon ......................................................................... 204 16.10. (15) Session Refused Icon ........................................................................................... 206 16.11. (16) Bus Busy Icon ...................................................................................................... 206 16.12. (20) 802.1x Authentication Icon ..................................................................................... 207 16.13. (21) Network Connection Verified Icon .......................................................................... 207 16.14. (22) Waiting to Connect to Authentication Manager Icon ................................................. 208
viii
16.15. (23) No Ethernet Signal Icon ........................................................................................ 209 16.16. (25) Redirection Icon .................................................................................................... 210 16.17. (26) Wait for Session Icon ............................................................................................ 210 16.18. (27) DHCP Broadcast Failure Icon ................................................................................ 211 16.19. (28) Establishing VPN Connection Icon ......................................................................... 211 16.20. (29) VPN Connection Established Icon .......................................................................... 212 16.21. (30) VPN Connection Error ........................................................................................... 212 16.22. (31-34) Ethernet Address Icon ...................................................................................... 212 16.23. (41-44) Ethernet Address Icon ...................................................................................... 213 16.24. (46) No Access to Server Icon ...................................................................................... 214 16.25. (47) No Access for Oracle Virtual Desktop Clients Icon .................................................. 214 16.26. (48) No Access: Registration Required Icon ................................................................... 214 16.27. (49) No Access: Key Rejected Icon ............................................................................... 215 16.28. (50) No Access: Security Policy Violation Icon ............................................................... 215 16.29. (51-54) Ethernet Address Icon ...................................................................................... 215 16.30. (60) Insert Card Icon .................................................................................................... 215 16.31. (61) Waiting for Primary Sun Ray Client Icon ................................................................. 216 16.32. (62) Token Reader Icon ............................................................................................... 216 16.33. (63) Card Error Icon ..................................................................................................... 216 16.34. (64) Waiting For Access Icon ........................................................................................ 217 17. Oracle Virtual Desktop Clients ................................................................................................... 219 17.1. Oracle Virtual Desktop Clients Overview ......................................................................... 219 17.2. How to Enable Access for Oracle Virtual Desktop Clients ................................................. 219 17.3. How to Enable the Clipboard Service for Oracle Virtual Desktop Clients ............................ 221 17.4. Client ID Differences Between Oracle Virtual Desktop Clients and Sun Ray Clients ............ 221 17.5. How to Display Client ID Information ............................................................................... 222 17.6. How to Change the Keyboard Country Code ................................................................... 223 17.7. Oracle Virtual Desktop Client Troubleshooting ................................................................. 223 17.7.1. Connection Problems When Using a VPN or WAN ................................................ 223 17.7.2. Screen Rendering Problems ................................................................................ 224 17.7.3. How to Set the Logging Level .............................................................................. 224 17.7.4. How to Change the Log File Location ................................................................... 224 17.7.5. How to Diagnose Connection Problems ................................................................ 225 18. Windows Connector .................................................................................................................. 227 18.1. Windows Connector Overview ........................................................................................ 228 18.2. Requirements ................................................................................................................. 230 18.3. Using the Windows Connector ........................................................................................ 230 18.3.1. How to Start a Windows Session ......................................................................... 231 18.3.2. How to Start a Windows Session Within Java Desktop System (JDS) ..................... 233 18.3.3. How to Lock a Windows Session ......................................................................... 233 18.3.4. How to Set Up Access to the uttsc Command .................................................... 234 18.3.5. How to Set Up a Desktop Shortcut to Start a Windows Session ............................. 234 18.3.6. How to Separate Settings for Session Locale and Keyboard Layout ....................... 234 18.4. Audio Input .................................................................................................................... 234 18.4.1. Enabling Audio Input on Windows 7 Enterprise ..................................................... 235 18.5. Video Acceleration ......................................................................................................... 235 18.5.1. Video Acceleration Requirements ......................................................................... 235 18.5.2. Videos Accelerated .............................................................................................. 236 18.5.3. Audio Accelerated ............................................................................................... 237 18.5.4. Additional Notes .................................................................................................. 238 18.5.5. Video Acceleration Troubleshooting ...................................................................... 239 18.6. USB Device Redirection ................................................................................................. 244 18.6.1. Device Access .................................................................................................... 244 18.6.2. Supported Configurations ..................................................................................... 244
ix
18.6.3. Tested USB Devices ........................................................................................... 244 18.6.4. Additional Notes .................................................................................................. 245 18.6.5. How to Add USB Drivers to a Virtual Machine ...................................................... 245 18.6.6. USB Redirection Troubleshooting ......................................................................... 246 18.7. Hotdesking ..................................................................................................................... 248 18.7.1. Hotdesking Behavior ............................................................................................ 248 18.7.2. Location Awareness ............................................................................................ 248 18.8. Session Directory ........................................................................................................... 250 18.9. Network Security ............................................................................................................ 251 18.9.1. Built-in RDP Network Security .............................................................................. 251 18.9.2. Enhanced Network Security ................................................................................. 251 18.10. Auto-reconnect ............................................................................................................. 252 18.11. Compression ................................................................................................................ 253 18.11.1. How to Disable Compression ............................................................................. 253 18.12. Licensing ..................................................................................................................... 253 18.12.1. Per-user Mode Versus Per-device Mode ............................................................. 253 18.13. Smart Cards ................................................................................................................ 254 18.13.1. How to Enable Smart Card Redirection on a Per-Connection Basis ...................... 254 18.13.2. How to Set Up Smart Card Login for Windows .................................................... 255 18.14. Multi-Monitor Support ................................................................................................... 255 18.15. Desktop Resizing ......................................................................................................... 255 18.15.1. How to Enable Automatic Windows Desktop Resizing During Hotdesking .............. 256 18.16. Printing ........................................................................................................................ 257 18.16.1. How to Set Up Print Queues (Oracle Solaris) ...................................................... 257 18.16.2. How to Set Up Print Queues (Oracle Linux) ........................................................ 257 18.16.3. How to Make Sun Ray Printers Available to a Windows Session .......................... 258 18.16.4. How to Maintain the Printer Cache File ............................................................... 259 18.16.5. How to Set Up Follow-Me Printing ...................................................................... 259 18.16.6. Printers Troubleshooting .................................................................................... 260 18.17. uttsc Error Messages ................................................................................................. 261 18.17.1. General Troubleshooting .................................................................................... 262 19. VMware View Connector ........................................................................................................... 263 19.1. VMware View Connector Overview ................................................................................. 263 19.2. Requirements ................................................................................................................. 263 19.3. Configuring the VMware View Connector Session Type ................................................... 263 19.4. Disabling Connection Tunneling ...................................................................................... 264 19.5. Configuring VMware View Manager to Accept Non-SSL Connections ................................ 264 19.6. Enabling SSL ................................................................................................................. 264 19.7. VMware View Connector Troubleshooting ....................................................................... 265 19.7.1. Error Messages ................................................................................................... 265 20. Alternate Network Configurations ............................................................................................... 267 20.1. Alternate Network Configurations Overview ..................................................................... 267 20.2. Updating the Default /etc/hosts File Before Configuring Sun Ray Network (Oracle Linux) ..................................................................................................................................... 268 20.3. Using a Shared Network Configuration Without External DHCP Services ........................... 268 20.3.1. Shared Network Configuration Worksheet ............................................................. 268 20.3.2. How to Configure a Sun Ray Server on a Shared Network to Provide DHCP Services ......................................................................................................................... 269 20.3.3. How to List the Current Network Configuration ...................................................... 270 20.3.4. How to Delete a LAN Subnet ............................................................................... 270 20.3.5. Example Shared Network Setups ......................................................................... 271 20.4. Using a Private Network Configuration ............................................................................ 279 20.4.1. Private Network Configuration Worksheet ............................................................. 280 20.4.2. How to Configure a Sun Ray Server in a Private Network ...................................... 282
20.4.3. How to List the Current Network Configuration ...................................................... 283 20.4.4. How to Print a Private Network Configuration ........................................................ 283 20.4.5. How to Delete an Interface .................................................................................. 284 20.4.6. Example Private Network Setup ........................................................................... 284 20.5. Sun Ray Client Initialization Requirements Using DHCP ................................................... 287 20.5.1. DHCP Basics ...................................................................................................... 287 20.5.2. DHCP Parameter Discovery ................................................................................. 289 20.5.3. DHCP Relay Agent ............................................................................................. 289 20.5.4. Simplifying DHCP Configuration of Remote Sun Ray Clients .................................. 289 20.5.5. Standard DHCP Parameters ................................................................................ 290 20.5.6. Vendor-specific DHCP Options ............................................................................ 291 20.5.7. Encapsulated Options .......................................................................................... 293 20.6. Failover Groups ............................................................................................................. 294 20.6.1. Network Topologies ............................................................................................. 294 20.6.2. Setting Up IP Addressing ..................................................................................... 296 20.6.3. Sun Ray Server Failover Group Worksheet .......................................................... 300 21. Performance Tuning .................................................................................................................. 303 21.1. Configuring Network Performance for Sun Ray 3 Series Clients ........................................ 303 21.2. How to Improve Sun Ray Client Performance by Decreasing Buffering on the Network Switch (Oracle Solaris) ........................................................................................................... 303 21.3. Improving Sun Ray Client Start-Up Time by Disabling Spanning Tree Protocol on the Network Switch ....................................................................................................................... 304 21.4. Applications ................................................................................................................... 304 21.5. Tuning the Java Desktop System ................................................................................... 304 21.6. Excessive Disk Swapping ............................................................................................... 305 21.7. Screensaver Resource Consumption ............................................................................... 305 21.7.1. How to Disable Screensavers (Oracle Solaris) ...................................................... 305 A. Third Party Licenses ................................................................................................................... 307 B. Glossary .................................................................................................................................... 329
xi
xii
Preface
Table of Contents
1. 2. 3. 4. Audience ...................................................................................................................................... Documentation Accessibility .......................................................................................................... Related Documents ...................................................................................................................... Conventions ................................................................................................................................. xiii xiii xiii xiv
The Sun Ray Software 5.3 Administration Guide provides instructions for managing the Sun Ray Software.
1. Audience
This document is intended for users with system administration experience. It is assumed that readers are familiar with Web technologies and have a general understanding of Windows and UNIX platforms.
2. Documentation Accessibility
Our goal is to make Oracle products, services, and supporting documentation accessible to all users, including users that are disabled. To that end, our documentation includes features that make information available to users of assistive technology. This documentation is available in HTML format, and contains markup to facilitate access by the disabled community. Accessibility standards will continue to evolve over time, and Oracle is actively engaged with other market-leading technology vendors to address technical obstacles so that our documentation can be accessible to all of our customers. For more information, visit the Oracle Accessibility Program Web site at http://www.oracle.com/accessibility/.
3. Related Documents
The documentation for this product is available at: http://www.oracle.com/technetwork/server-storage/sunrayproducts/docs For additional information, see the following manuals:
xiii
Conventions
4. Conventions
The following text conventions are used in this document: Convention boldface italic monospace Meaning Boldface type indicates graphical user interface elements associated with an action, or terms defined in text or the glossary. Italic type indicates book titles, emphasis, or placeholder variables for which you supply particular values. Monospace type indicates commands within a paragraph, URLs, code in examples, text that appears on the screen, or text that you enter.
xiv
Chapter 1. Overview
Table of Contents
1.1. What is Sun Ray Computing? ...................................................................................................... 1.1.1. Stateless .......................................................................................................................... 1.1.2. Secure .............................................................................................................................. 1.1.3. Available ........................................................................................................................... 1.2. Parts of the Sun Ray Environment ............................................................................................... 1.2.1. Clients .............................................................................................................................. 1.2.2. Physical Network .............................................................................................................. 1.2.3. Sun Ray Server ................................................................................................................ 1.3. Management Areas ..................................................................................................................... This chapter provides an overview of the Sun Ray technology and describes the major areas and features of the Sun Ray environment. 1 1 1 2 2 3 4 4 4
1.1.1. Stateless
Clients in a Sun Ray environment have no local disks, applications, or operating systems and are therefore considered stateless. This setup is what makes them true thin clients. Stateless devices are inexpensive to maintain because they do not require administrators or technicians to install, upgrade, or configure software or to replace mechanical components on the desktop. A Sun Ray Client contains only a firmware module that performs a small set of tasks: it sends keyboard and mouse events and displays pixel data. If a desktop device contains an operating system that can execute code at the request of a user, it has state and it is not a true thin client. This type of device requires updating and maintenance at the desktop rather than server level and it is susceptible to viruses.
1.1.2. Secure
Sun Ray Clients are also extremely secure. For instance, managing USB mass storage devices, that is, controlling the ability to enable or disable their use, is done at the server or group level. This ability enables sites with particular security or intellectual property concerns to eliminate many of the risks imposed by PCs and other fat clients, which rely on local operating systems, local applications, and local data caches. Critical data can be compromised or lost when the physical device hosting the "fat" client is stolen or damaged.
Available
1.1.3. Available
A Sun Ray session is a group of services controlled by a Session Manager and associated with a user through an authentication token. The sessions reside on a server rather than on the desktop. Because Sun Ray Clients are stateless, a session can be directed or redirected to any Sun Ray Client on the appropriate network or subnetwork when a user logs in or inserts a smart card. Although the session continues to reside on a server, the session appears to follow the user to the new client. This functionality, called hotdesking, provides the ability of users to access their sessions from any client on their network. Hotdesking can be implemented with smart cards or without smart cards through the non-smart card session mobility (NSCM) feature. Most large Sun Ray implementations also include one failover group of Sun Ray servers to ensure uninterrupted service whenever a server is off-line. When a failover group is configured, the Sun Ray Software optimizes performance by spreading the computing load among the servers in the group.
Clients
1.2.1. Clients
Currently, there are two main types of clients: a Sun Ray Client and an Oracle Virtual Desktop Client.
Physical Network
Various models of Sun Ray Clients are available, differing primarily with respect to size, type, and supported monitor resolution. However, all Sun Ray Clients include a smart card reader, a keyboard, and a mouse. For the smart card reader, the industry standard PC/SC-lite API is included for developers who want to encode custom applications or other information in their users' smart cards. By default, a Sun Ray Client runs the same Oracle Solaris or Oracle Linux operating system as the associated Sun Ray server. However, the Windows and VMware View connectors enable users to access a Windows desktop session or a VMware View session on the client. By configuring kiosk mode, users can bypass the Sun Ray Client operating system altogether and be taken directly to the assigned connector session.
Management Areas
Management Area
Description of administrative functions, with a tab-based navigational model and context-sensitive help. The Sun Ray server runs the Sun Ray Software and provides sessions to clients. A failover group consists of two or more servers that provide users with a high level of availability in case one server becomes unavailable. Hotdesking, or session mobility, is the ability for a session to "follow" a user between clients. This enables the user to have instantaneous access to the user's windowing environment and current applications from multiple clients. Hotdesking can be implemented with smart cards or without smart cards through the non-smart card session mobility (NSCM) feature. Regional hotdesking promotes hotdesking among server groups, letting users access their sessions across a wider domain.
Kiosk Mode
A way to provide an unlimited variety of desktops or applications to users, even though the actual desktop or application may be running elsewhere. Kiosk mode bypasses the normal authentication methods of the platform and runs anything that the administrator defines. It is the primary way to provide user's access to the Windows connector or VMware View Manager connector sessions without the user ever seeing the default Sun Ray client desktop. Sun Ray Software provides the ability to manage the security and authentication policies of Sun Ray Client sessions.
Security
Multiple Monitor Configurations Sun Ray Software enables you to merge and control multiple Sun Ray Client screens or heads, using a single keyboard and mouse attached to a primary client. This functionality is important for users who need to monitor many applications or systems simultaneously or to accommodate a single application, such as a large spreadsheet, across multiple screens. To use multiple screens, the administrator sets up multihead groups, consisting of two or more clients. There is also multi-monitor support to provide a single desktop for Sun Ray Clients with dual video connectors. Sun Ray Clients A Sun Ray Client is a hardware unit that can potentially exceed the full functionality of a desktop computer, but with less administrative and environmental costs. A small firmware module in each Sun Ray Client is managed from the Sun Ray server. The firmware module checks the hardware with a power-on self test (POST) and initializes the client. Maintaining the latest firmware on Sun Ray Clients is an important part of administering the Sun Ray environment. If the GUI mode is enabled on the firmware, the user can also modify a Sun Ray Client's local configuration through a tool called the Configuration GUI. An Oracle Virtual Desktop Client is a software application that runs on a common client operating system and provides the ability to connect to a desktop session running on a Sun Ray server, just like a physical Sun Ray Client.
Management Areas
Description Sun Ray Clients can access a Windows session from a Windows system. Windows support on a Sun Ray Client includes video acceleration and access to USB devices. Sun Ray Clients can access Windows virtual machines through the VMware View Manager. Sun Ray Clients can access Windows virtual machines through the Citrix XenDesktop Web Interface Server. The Citrix XenDesktop connector is not provided with Sun Ray Software. You must download and install the Citrix XenDesktop connector separately. See the Sun Ray Connector for Citrix XenDesktop Administration Guide for details.
Note Given the topology, Sun Ray traffic on shared networks is potentially exposed to an eavesdropper. Modern switched network infrastructures are far less susceptible to snooping activity than earlier shared technologies, but to obtain additional security the administrator may choose to activate the client's encryption and authentication features. These capabilities are discussed in Chapter 11, Security.
If you accept, the utsetup command runs the utadm -L on command to configure a shared network. See Section 3.2.1, Using the utsetup Command for more information.
IP MultiPathing
For more information, see Chapter 14, Sun Ray Client Firmware.
2.1.3. IP MultiPathing
Sun Ray Software supports arbitrary IP MultiPathing, or IPMP. IPMP provides failure detection and transparent network access failover for a system with multiple interfaces on the same IP link. IPMP can also provide load spreading of packets for systems with multiple interfaces. This feature can be very useful on a Sun Ray server by increasing its network availability and performance. IPMP is supported only on Oracle Solaris-based Sun Ray servers in a shared network configuration (LAN with fully-routed subnets). For more information about the IPMP feature in Oracle Solaris and how to configure it, see the System Administration Guide: IP Services manual. When configuring IPMP, use the if_mpadm command to test NIC failure.
2.1.5.2. Latency
Network latency between any Sun Ray client and its server is an important determinant of the quality of the user experience. The lower the latency, the better; latencies under 50 milliseconds for round trip delay are preferred. However, like familiar network protocols, the Sun Ray Client does tolerate higher latencies, but with degraded performance. Latencies up to 300 milliseconds provide usable, if somewhat sluggish, performance.
Firmware Server
to enable clients to find the servers. For other discovery methods that may provide more granularity or flexibility, see Chapter 20, Alternate Network Configurations. The on-screen display (OSD), when enabled, shows status during a client's server discoveries. For example, during DNS lookups, a status line in the OSD window shows the name being looked up and, if one is found, the IP address.
10
1. Locally configured value (configured through Configuration GUI) 2. Standard DHCP option 49 (IP Address or DNS name) 3. The servers= key in the client's .parms file 4. DNS lookup of sunray-servers (if mapped to multiple addresses, choose one randomly) Each of these values are attempted in order until one succeeds. Although it is the last value attempted, the DNS lookup is the recommended session server discovery, as described in Section 2.2.3, Using Domain Name Service (DNS). See Section 13.19, Sun Ray Client Boot Process for more details on how a Sun Ray Client finds its session server.
11
12
13
Table 3.1. Supported Sun Ray Software Operating Systems Operating System Oracle Solaris on SPARC and x86 platforms Supported Releases Oracle Solaris 10 9/10 or later Solaris 10 updates Oracle Solaris 10 9/10 or later Solaris 10 updates with Trusted Extensions Note: Oracle Solaris 11 is not supported. Oracle Linux on x86 platform (32-bit and Oracle Linux 5.6 64-bit) Oracle Linux 5.7 Note Oracle products certified on Oracle Linux are also certified and supported on Red Hat Enterprise Linux due to implicit compatibility between both distributions. Oracle does not run any additional testing on Red Hat Enterprise Linux products. For additional operating system requirements, see Section 3.1.7, Additional Oracle Linux Requirements and Section 3.1.6, Additional Oracle Solaris Requirements.
Video Acceleration
14
USB Redirection Audio Input Enhanced Network Security (TLS/SSL and NLA)
x x x
N/A
N/A
3.1.4. Feature Differences Between Oracle Solaris and Oracle Linux Platforms
The following Sun Ray Software features are not supported on a Sun Ray server running the Oracle Linux platform. Smart card services, including PIN login, email signing, and other smart card related operations, are not supported. Using mass storage devices without the USB redirection Windows component provides much lower performance on Oracle Linux than Oracle Solaris due to the design of the Oracle Linux mass storage subsystem. Use USB redirection for optimum performance with mass storage devices. Predefined kiosk session types are not available, which provide a desktop, a window manager, and the ability to configure a set of applications. Sun Java Desktop (JDS), Release 3, is an example of a predefined session type provided for Oracle Solaris. See Section 10.1, Kiosk Overview for more information. The CCID IFD handler, which provides access to external USB smart card readers connected to Sun Ray Clients, is not supported on Sun Ray servers running Oracle Linux.
/var/tmp
15
Use the following command to install the required RPMs on the Oracle Linux server:
# utpkgcheck -i
Note The Firewall and SELinux services must be disabled during the post-installation setup.
A supported version of JRE is also bundled in the unzipped Sun Ray Software media pack for Oracle Solaris and Oracle Linux systems in the Supplemental directory. Note A 64-bit JRE is not suitable for use with Sun Ray Software. The 32-bit JRE is required, even when the platform is capable of supporting a 64-bit JRE.
16
Note The Sun Ray Software installation script assumes JRE is installed in the /usr/ java directory by default. If you want to accept the default when installing the Sun Ray Software on an Oracle Linux server, install JRE 1.6 or later on the server and then create a symlink from /usr/java to the newly created jre directory. For example, the following command creates a symbolic link from the /usr/java directory to the jrel.6.0_23 directory located in /usr.
# ln -s jre1.6.0_23 /usr/java
17
If you configure a new Sun Ray server in a failover group with mixed versions of Sun Ray Software, you must make sure that the primary server is running Sun Ray Software 5.3. If the secondary server is running Sun Ray Software 5.3, no special care is required. The utreplica utility automatically synchronizes with the port number on the primary. Note Although configuring mixed failover groups consisting of servers running various versions of Sun Ray Server Software is possible, this practice is discouraged. For more information, see Chapter 6, Failover Groups.
3. Extract the Tomcat archive into a suitable directory, such as /opt. For Oracle Solaris The Tomcat archive uses GNU tar extensions and must be untarred with a GNU-compatible version of the tar command, such as gtar.
# /usr/sfw/bin/gtar -xvz -C /opt -f apache-tomcat-5.5.20.tar.gz
(Optional) Create a symbolic link to the default location for the Sun Ray Software installation script.
# ln -s apache-tomcat-5.5.20 /opt/apache-tomcat
DNS
Syslog
514/UDP (syslog)
19
Protocol
Peer
Any
Due to CR 12301209, the keyboard may become unresponsive to input. To work around this issue, allow ICMP messages to flow from the Sun Ray server to the client.
7009 (UTAUTHD) <<=UTAUTHD-GM/ UDP=>> broadcast or multicast 7011 (UTDEVMGRD) 7008 (UTRCMD) <<=UTDEVMGRD/ TCP=>> <<=UTRCMD/TCP=> <<=ICMP ECHO=> 7010 (UTAUTHCB) 7012 (UTDS) 7007 (UTSESSIOND) 7011 (UTDEVMGR) 1660 (HTTP) 1661 (HTTPS) 7007 (UTSESSIOND)
SR Group Member SR Group Member Any Any Any Any Any Localhost Localhost Localhost
Device control and status Remote execution Admin: presence Admin: control and status Data store, if required. Session members Device clients Web GUI, if configured Web GUI, if configured Session management
<<=UTSESSION/TCP=> Privileged
20
Installing
3.2. Installing
This section provides detailed information about how to install Sun Ray Software.
21
Configuring the Sun Ray Software without the Sun Ray data store, which is known as zero administration mode. This document does not provide detailed instructions about how to use the individual commands instead of using the utsetup command. Refer to the man pages for detailed information about the alternative commands.
22
to clients through the utfwadm command similar to previous releases. The current installation procedure provides steps on how to download and install the firmware. Installing the latest Sun Ray Operating Software before installing Sun Ray Software is recommended, but you can still install and configure the firmware after installing Sun Ray Software. To update the firmware on Sun Ray Clients outside of the Sun Ray Software installation process, refer to Section 14.3, How to Update Firmware on Sun Ray Clients. If the firmware is not installed on the server, the Sun Ray Software installation script will provide the following warning:
Sun Ray Operating Software (firmware) is not installed. It is recommended that you install the latest firmware before installing Sun Ray Software. Continue without firmware? (Y/N) [Y]
Also, if an older firmware version is installed on the server, the Sun Ray Software installation script will provide the following warning:
You are attempting to install SRS on a system with an old version of Sun Ray Operating Software. Continue with old firmware? (Y/N) [N]
Steps
1. Download and unzip the Sun Ray Software 5.3 media pack and make it accessible to the Sun Ray server. See http://www.oracle.com/technetwork/server-storage/sunrayproducts/downloads/index.html 2. (Optional) Download and unzip the latest Sun Ray Operating Software (firmware) and make it accessible to the Sun Ray server.
23
See http://www.oracle.com/technetwork/server-storage/sunrayproducts/downloads/index.html Updating the Sun Ray Clients with the latest firmware ensures that the latest Sun Ray Software features are provided. 3. Become superuser on the Sun Ray server. To avoid installation script errors that can occur if user environment settings are carried forward, use the following command:
% su - root
4. If you downloaded the latest Sun Ray Operating Software (firmware), change directory to the unzipped firmware directory and install the firmware to make it available to the Sun Ray Software installation script.
# ./utfwinstall
5. Change directory to the unzipped Sun Ray Software media pack and install Sun Ray Software on the Sun Ray server.
# ./utsetup
See the Examples section below for an example of the utsetup output. When the installation script ends, the log files are available at: Oracle Linux:
/var/log/utsetup.year_month_date_hour:minute:second.log
Oracle Solaris:
/var/adm/log/utsetup.year_month_date_hour:minute:second.log
The values in the file names reflect a time stamp of when the command was started. Check these files for notices of problems. See Section 3.2.10, Installation (utinstall) Error Messages for a listing of utinstall error messages. 6. If the Sun Ray server is running Oracle Solaris, use the following steps to increase the performance of the Sun Ray Clients: a. Add the following line to the Sun Ray server's /etc/system file.
set hires_tick=1
b. Reboot the Sun Ray server. For more information, see Section 21.2, How to Improve Sun Ray Client Performance by Decreasing Buffering on the Network Switch (Oracle Solaris). 7. Repeat steps 3 through 6 for each secondary server if in a failover group. If you choose the HA group (failover group) configuration during the utsetup installation of the primary server, you can copy the generated response files to each secondary server and use the utsetup command to replicate the failover group configuration. For example, you can save the response files to the secondary's server's /tmp directory and then use the utsetup -a -D /tmp command.
24
This strategy reduces the time needed to re-enter the same configuration information and can minimize configuration errors. See Section 3.2.7, How to Clone a Sun Ray Server for details. 8. Add the Sun Ray server's host name or IP address to the sunray-config-servers and sunrayservers DNS entries, which will make the server available to clients for firmware updates and Sun Ray sessions, respectively. See Chapter 2, Planning a Sun Ray Network Environment for details. 9. To configure any site-wide settings for the Sun Ray Clients, such as the automatic poweroff feature, you need to update the .parms file for each client. You need to do this on each designated firmware server. See Section 13.1, How to Centralize Sun Ray Client Configurations (.parms) for details. 10. Reboot the Sun Ray Clients to download and update to the new Sun Ray Operating Software (firmware) provided by the Sun Ray server. Note When installing Sun Ray Operating Software on Sun Ray 3 Series Clients, the smart card LED will blink for approximately 40 seconds as the smart card controller firmware is being updated. This is normal. 11. If you plan to use the Windows connector, install the Windows Connector Components on your designated Windows Server. See Section 3.2.6, How to Install the Windows Connector Components on a Windows System for details.
The uttscwrap command is installed in the /opt/SUNWuttscwrap/bin directory. For more information about the uttscwrap command, see Section 18.3, Using the Windows Connector.
25
# rpm -i SUNWpkio-4.1-04.i386.rpm
This workaround is not required for Oracle servers, since they have the Integrated Lights Out Manager (ILOM) Service Processor that provides a virtual console.
26
Sun Ray Server Software 4.4 not installed Sun Ray Data Store 3.4 not installed Kiosk Mode 4.4 not installed Enter Java v1.6 (or later) location: [/usr/java] About to Install Sun Ray Server Software 4.4 Continue? (Y/N) [Y] About to carry out the following operations: Install Install Install Install Install Install Install Install Install Install Install Install Install [ [ [ [ [ [ [ [ [ [ [ [ [ Sun Ray Server Software 4.4 ] Sun Ray Data Store 3.4 ] Sun Ray Server Software 4.4 French Admin GUI ] Sun Ray Server Software 4.4 Japanese Admin GUI ] Sun Ray Server Software 4.4 Simplified Chinese Admin GUI ] Sun Ray Server Software 4.4 ] Kiosk Mode 4.4 ] Kiosk Mode 4.4 localized files ] data for utslaunch ] Sun Ray Server Software 4.4 modules for utsunmc ] Service Tags 1.1 ] Smart Card Services 1.5 ] VMware View Connector 1.4 ]
27
+++ Installing 'Sun Ray Connector 2.5' . . . . . ***Sun Ray Connector package/RPM installation output (not shown)*** . . . . .
+++ Done. ================================================================== === Creating directory structure - utacleanup ================================================================== === Performing basic configuration - utconfig Activating product Product activation output being logged at /var/adm/log/utctl.2011_12_29_09:47:26.log Configuration of Sun Ray Server Software This script automates the configuration of the Sun Ray Server Software and related software products. Before proceeding, you should have read the Installation and Configuration Guide for planning purposes. For your convenience, default values (where applicable) are shown in brackets. Continue? (Y/N) [Y] Enter new UT admin password: Again: Enter new UT admin password:
Configure Sun Ray Web Administration? (Y/N) [N] Enter Apache Tomcat installation directory [/opt/apache-tomcat] Enter HTTP port number [1660] Enable secure connections? (Y/N) [Y] Enter HTTPS port number [1661] Enter Tomcat process username [utwww] Enable remote server administration? (Y/N) [N] Configure Sun Ray Kiosk Mode? (Y/N) [N] Enter user prefix [utku] Enter group [utkiosk] Enter userID range start [150000] Enter number of users [25]
Configure this server for a failover group? (Y/N) [N] About to configure the following software products: Sun Ray Data Store 3.4 Hostname: sray-server Sun Ray root entry: o=utdata Sun Ray root name: utdata Sun Ray utdata admin password: (not shown)
28
SRDS 'rootdn': cn=admin,o=utdata Sun Ray Web Administration hosted at Apache Tomcat/5.5.20 Apache Tomcat installation directory: /opt/apache-tomcat HTTP port number: 1660 HTTPS port number: 1661 Tomcat process username: utwww Remote server administration: Disabled Sun Ray Server Software 4.4 Failover group: no Sun Ray Kiosk Mode: yes Sun Ray Kiosk Mode 4.4 User name prefix: utku Base user ID: 300000 Number of accounts: 25 Kiosk group name: utkiosk Kiosk group ID: auto Continue? (Y/N) [Y] Updating Sun Ray Data Store schema ... Updating Sun Ray Data Store ACL's ... Creating Sun Ray Data Store ... Restarting Sun Ray Data Store ... . Thu Dec 29 09:51 : utdsd starting Loading Sun Ray Data Store ... Executing '/usr/bin/ldapadd -p 7012 -D cn=admin,o=utdata' ... adding new entry o=utdata adding new entry o=v1,o=utdata adding new entry utname=sray-server,o=v1,o=utdata adding new entry utname=desktops,utname=sray-server,o=v1,o=utdata adding new entry utname=users,utname=sray-server,o=v1,o=utdata adding new entry utname=logicalTokens,utname=sray-server,o=v1,o=utdata adding new entry utname=rawTokens,utname=sray-server,o=v1,o=utdata adding new entry utname=multihead,utname=sray-server,o=v1,o=utdata adding new entry utname=container,utname=sray-server,o=v1,o=utdata adding new entry utname=properties,utname=sray-server,o=v1,o=utdata adding new entry cn=utadmin,utname=sray-server,o=v1,o=utdata adding new entry utname=smartCards,utname=sray-server,o=v1,o=utdata adding new entry utordername=probeorder,utname=smartCards,utname=sray-server,o=v1,o=utdata adding new entry utname=policy,utname=sray-server,o=v1,o=utdata adding new entry utname=resDefs,utname=sray-server,o=v1,o=utdata adding new entry utname=prefs,utname=sray-server,o=v1,o=utdata adding new entry utPrefType=resolution,utname=prefs,utname=sray-server,o=v1,o=utdata
29
Added 18 new LDAP entries. Creating Sun Ray Server Software Configuration ... Adding user account for 'utwww' (ut admin web server user) ...done Sun Ray Web Administration enabled to start at system boot. Starting Sun Ray Web Administration... See /var/opt/SUNWut/log/utwebadmin.log for server logging information. Unique "/etc/opt/SUNWut/gmSignature" has been generated. Restarting Sun Ray Data Store ... .. Thu Dec 29 09:52 : utdsd starting Adding user admin ... User(s) added successfully! Creating new Sun Ray Kiosk Mode configuration ... Validating new user ids. Validating new user accounts. Creating kiosk group utkiosk Configuring new kiosk user accounts: ......................... 25 users configured *********************************************************** The current policy has been modified. You must restart the authentication manager to activate the changes. *********************************************************** Enter groupname for Windows Connector [utwc] The group 'utwc' already exists. A dedicated group should be used for SRWC. Use existing group anyway (Y/N) [Y] Creating required LDAP schema ... adding new entry utname=remoteclient,utname=sray-server,o=v1,o=utdata adding new entry utname=users,utname=remoteclient,utname=sray-server,o=v1,o=utdata Done. ***************************************************************************** A restart of Sun Ray services is required before the Sun Ray Connector for Windows Operating Systems is used. Please run : /opt/SUNWut/sbin/utstart Note that this will *NOT* terminate any sessions. ***************************************************************************** Configuration of Sun Ray Server Software has completed. Please check the log file, /var/adm/log/utconfig.2011_12_29_09:47:26.log, for errors. ================================================================== === Configuring access policy - utpolicy Enter policy specification as if on utpolicy command line: [-a -g -z both -M] The authentication manager must be restarted for changes to take effect. If a significant policy change has been made then a cold restart must be initiated with the following command, note that all existing sessions will be terminated:
30
/opt/SUNWut/sbin/utstart -c If a minor policy change was made then it is not necessary to terminate existing sessions and a warm restart is sufficient by executing the following command: /opt/SUNWut/sbin/utstart ================================================================== === Configuring firmware downloads - utfwadm Do you want to configure Firmware downloads for Sun Ray clients? (Y/N) [Y] ================================================================== === Enabling LAN access - utadm Do you want to enable LAN access for Sun Ray clients at this time? (Y/N) [N] ### Turning on Sun Ray LAN connection NOTE: utstart must be run before LAN connections will be allowed
================================================================== === Starting Sun Ray Software - utstart A cold restart has been initiated... messages will be logged to /var/opt/SUNWut/log/messages.
31
Note The Adobe Flash acceleration and Audio/video synchronization components require hardware that supports the Windows Performance Counter API. If the Windows Performance Counter API is not working properly, the components might fail to load or behave unexpectedly. In one known example, this problem occurs when a computer has the AMD Cool'n'Quiet technology enabled in the BIOS, which is documented in http://support.microsoft.com/kb/895980.
Steps
1. Log in to the Windows system as Administrator. 2. If you plan to install the USB redirection component on a Virtual Machine (VM), you must add USB drivers on some VMs if they do not provide drivers by default. See Section 18.6.5, How to Add USB Drivers to a Virtual Machine for details. 3. Make sure the Windows system has access to the Sun Ray Connector Windows Components installer in the unzipped Sun Ray Software media pack.
media_pack_image/Components/20-SRWC/Content/Sun_Ray_Connector_Windows_Components_2.5
4. Copy the srs-winstaller.exe file to the Windows system. 5. Double-click the srs-winstaller icon to start the Sun Ray Connector Windows Components Setup Wizard. 6. Review the License Agreement and click I Agree. 7. Choose which components you want to install and click Install.
32
8. Click Finish once the installation has finished. Restart the Windows system if instructed. 9. Go to the following sections (next steps) based on the features you installed. Multimedia Redirection - Next Steps Adobe Flash Acceleration - Next Steps Audio/Video Synchronization - Next Steps USB Redirection - Next Steps
33
34
35
For information about how to verify that USB redirection is working from a new Windows session, see Section 18.6.6.1, How to Verify that USB Redirection is Active.
36
Note The *.utdialog_responses.props files may contain passwords that a malicious user could potentially decode if read, so make sure to use sufficient security precautions when copying them. For example, the files should have secure permissions (not readable by group or "other"), and you should remove the files from their temporary locations after you complete the configuration. 1. From the unzipped Sun Ray Software media pack, run the utsetup command to install and configure a Sun Ray server. The responses you provide are saved in the /var/opt/SUNWut/utdialog.d/ *.utdialog_responses.props files. 2. Copy the response files to another server. In this example, the files are copied to Server B's /tmp directory.
37
How to Install and Configure a Sun Ray Server With Default Settings
3. From the unzipped Sun Ray Software media pack, run the utsetup -a -D /tmp command to clone the installation and configuration on the server that you created in Step 1. For members of the same failover group, you can typically apply the configuration without changes. For a new failover group, you may need to edit the response files to create a new configuration (for example to specify a new primary and secondaries for replication). The utdialog_responses.props(5) man page gives detail about the format of the files.
3.2.8. How to Install and Configure a Sun Ray Server With Default Settings
Another way to use the utsetup command is to quickly install and configure a server with the default settings. 1. Install, configure, and activate the basic Sun Ray Software product features for standalone use (no failover group configuration) with a minimum of user interaction required (JRE 1.6 must be installed at / usr/java before proceeding).
utsetup -d
2. Complete the configuration: a. Optionally configure the system in a failover group (if you did not specify identical administration passwords with the utsetup command for each system, then you must run the utpw command at this time).
# utgroupsig # utreplica -p secondary-server1 [secondary-server2...]
or
# utreplica -s primary-server
c. Optionally configure the browser web administration interface (Apache Tomcat must be installed at /opt/apache-tomcat before proceeding).
utconfig -w -d
or
# utadm -A subnet
or
# utadm -a interface
38
3. If you are removing Sun Ray Software from a server in a failover group, disable Sun Ray Client firmware updates. See Section 14.11, How to Disable All Sun Ray Client Firmware Updates for details. 4. Remove the replication configuration.
# ./utreplica -u
Answer y to all of the prompts. 8. Repeat the steps in this procedure for all remaining Sun Ray servers.
You called the -d option, The media-dir but media-dir is directory requires incomplete. relevant patches and packages for installation. The media-dir directory includes the Sun Ray directory. Might occur for the installation of any application or patch if relevant packages Verify that he component xxxxxx is present in the installation media directory path and has
39
Message
Meaning have not been properly installed. Some of the applications provided with Sun Ray Software are compatible only with certain versions of other applications.
Resolution the correct permissions, then run the utinstall script again. Compatible and necessary applications are included with Sun Ray Software. Remove older versions, then run the utinstall script again.
A different version x.x of product has been detected. The otherproduct Software is only compatible with product y.y. You must either upgrade or remove the current product installation before proceeding. Exiting ... error, no Sun Ray software packages installed.
None of the Sun Ray No action is required components are installed as the product is not on this system. installed. Manually copy the listed files from the directory, overwriting the newer files if applicable.
The following files were not Some files were not successfully replaced during this properly replaced as part upgrade. The saved copies can be found of the upgrade. in directory
Partition Name Space Required Space Available -------------- -------------- --------------partition xxx yyy
Not enough disk space was allocated for partition. Repartition the disk and run utinstall again.
Upgrade to the supported version 10 of the Oracle Solaris OS before installing Sun Ray Software.
40
Message Please clean up the directory /var/tmp/ SUNWut.upgrade before rerunning utinstall. Please remove the existing preserved file, preserved_tarfilename, before rerunning utinstall. utpreserve: unable to preserve data. Error while creating archive file The following packages were not successfully removed xxxxxx ... Removal of product was not successfully completed. See log file for more details.
Meaning
Resolution
Other unrelated files were found in Remove unrelated files from the the preserve directory. directory.
The utinstall script failed to preserve existing configuration files. The packages listed have not been properly removed.
Use the pkgrm command to remove each listed package manually, then run utinstall u again. Check the log file for the package that started the problem and manually remove it with the pkgrm command, then run utinstall -u again.
41
/etc/syslog.conf /etc/pam.conf
42
How to Configure Shared Multilevel Ports (MLP) for Sun Ray Services
Use the Solaris Management Console (SMC) Security Templates to assign the cipso template to the Sun Ray server. Assign all other Sun Ray devices on the network an admin_low label. The admin_low template is assigned to the range of IP addresses you are planning to use in the utadm command. The /etc/security/tsol/tnrhdb file should contain the following entries when you finish:
192.168.128.1:cipso 192.168.128.0:admin_low
1. Become root from ADMIN_LOW (global zone). 2. Start the Solaris Management Console (SMC).
# smc &
3. Make the following selections: a. In the SMC, select Management Tools->Select hostname:Scope=Files, Policy=TSOL. b. Select System Configuration->Computers and Networks->Security Templates>cipso. c. From the menu bar, choose Action->Properties->Hosts Assigned to Template. d. Select Host and type the IP Address of the Sun Ray interconnect (for example, 192.168.128.1). e. Click Add and then OK. f. Select System Configuration->Computers and Networks->Security Families>admin_low.
g. From the menu bar, choose Action->Properties->Hosts Assigned to Template. h. Select Wildcard. i. j. Type the IP Address of the Sun Ray Interconnect Network (192.168.128.0). Click Add and then OK.
4. Assign all Sun Ray servers in the failover group a cipso label. a. Select System Configuration->Computers and Networks->Security Families>cipso. b. From the menu bar, choose Action->Properties->Hosts Assigned to Template. c. Select Host and type the IP Address of the other Sun Ray server. d. Click Add and then OK. 5. Reboot the Sun Ray server.
# /usr/sbin/reboot
3.3.2. How to Configure Shared Multilevel Ports (MLP) for Sun Ray Services
A shared multilevel port has to be added to the global zone for Sun Ray services in order to have access from a labeled zone.
43
1. Become root from ADMIN_LOW (global zone). 2. Start the Solaris Management Console (SMC).
# smc &
3. Go to Management Tools. 4. Select hostname:Scope=Files, Policy=TSOL. 5. Select System Configuration->Computers and Networks->Trusted Network Zones>global. 6. From the menu bar, choose Action->Properties. 7. Click Add under Multilevel Ports for Shared IP Addresses. 8. Add 7007 as Port Number, select TCP as Protocol, and click OK. 9. Repeat the previous step for ports 5999, 7010, and 7015. 10. Restart network services by running the following command:
# svcadm restart svc:/network/tnctl
11. Verify that these ports are listed as shared ports by running the following command:
# /usr/sbin/tninfo -m global
3. Go to Management Tools. 4. Select hostname:Scope=Files, Policy=TSOL option. 5. Select System Configuration->Computers and Networks->Trusted Network Zones>global. 6. From the menu bar, choose Action->Properties. 7. Under Multilevel Ports for Zone's IP Addresses, select 6000-6003/tcp. 8. Click Remove. 9. Choose Add->Enable Specify A Port Range. 10. Type 6000 in Begin Port Range Number and 6050 (for 50 displays) in End Port Range Number.
44
11. Select TCP as the Protocol. 12. Click OK. 13. Reboot the Sun Ray server.
# /usr/sbin/reboot
3.3.4. How to Configure the Windows Connector on Oracle Solaris Trusted Extensions
This procedure describes how to configure the Windows connector on Oracle Solaris Trusted Extensions. For the Sun Ray Windows Connector to function properly on a Oracle Solaris Trusted Extensions server, the Windows terminal server must be made available at the desired level. 1. As superuser, open a shell window on the Sun Ray server. To avoid errors that can occur if user environment settings are carried forward, use the following command:
% su - root
2. Make a Windows system available to the public template. a. Start the Solaris Management Console.
# smc &
b. Make the following selections under Management Tools: i. Select hostname:Scope=Files, Policy=TSOL.
ii. Select System Configuration->Computers and Networks->Security Templates>public. c. Choose Action->Properties->Hosts Assigned to Template. d. Select Host. e. Type the IP Address of the Windows system, for example, 10.6.100.100. f. Click Add.
g. Click OK. 3. Configure port 7014 as a shared multilevel port for the uttscpd daemon. a. If the Solaris Management Console is not already running, start it:
# smc &
b. Select hostname:Scope=Files, Policy=TSOL. c. Select System Configuration->Computers and Networks->Trusted Network Zones>global. d. Choose Action->Properties. 45
Upgrading
e. Enable ports by clicking Add under Multilevel Ports for Shared IP Addresses. f. Add 7014 as Port Number, select TCP as the Protocol, and click OK.
4. Create entries for the uttscpd daemon in each local zone. The /etc/services file entry for the SRWC proxy daemon is created automatically in the global zone at configuration time. Corresponding entries need to be created in the local zones. These entries can be created manually or by loopback-mounting the global zone /etc/services file into the local zones for read access. To create this entry manually, insert the following entry in the local zone file.
uttscpd 7014/tcp # SRWC proxy daemon
5. Loopback mount the /etc/opt/SUNWuttsc directory in each local zone. The following example shows how to do this for a zone named public
# zoneadm -z public halt # zonecfg -z public zonecfg:public> add fs zonecfg:public:fs> set dir=/etc/opt/SUNWuttsc zonecfg:public:fs> set special=/etc/opt/SUNWuttsc zonecfg:public:fs> set type=lofs zonecfg:public:fs> end # zoneadm -z public boot
6. (Optional) For TLS peer verification to work, make sure the CA certificates to be trusted are available under the /etc/sfw/openssl/certs folder in each local zone. 7. Reboot the Sun Ray server.
# /usr/sbin/reboot
3.4. Upgrading
This section provides instructions on how to upgrade a previously installed Sun Ray server.
46
Steps
1. Inform users about the upgrade. Before you upgrade Sun Ray Software, inform your users of your plans, and have them terminate their sessions. An effect of the upgrade procedure is that all active and suspended sessions are lost. 2. If you are upgrading Sun Ray servers in a failover group, consider ways to reduce downtime. See Section 3.4.3, Planning Upgrades Using Failover Groups for details. 3. Become superuser on the Sun Ray server. To avoid installation script errors that can occur if user environment settings are carried forward, use the following command:
% su - root
4. List the current Sun Ray network configuration and retain the information. You need to reconfigure the Sun Ray network after the upgrade.
# /opt/SUNWut/sbin/utadm -l
47
d. If neccessary, copy the Sun Ray server configuration data backup file created earlier, /var/tmp/ SUNWut.upgrade/preserve_version.tar.gz, to the same location on the upgraded Sun Ray server. The Oracle Linux upgrade should have retained this file. e. Go to Step 6.
The utfwinstall script overwrites the existing firmware installed on the Sun Ray server. 10. Change directory to the unzipped Sun Ray Software media pack and upgrade Sun Ray Software on the Sun Ray server.
# ./utsetup
The utsetup script preserves the current Sun Ray Software configuration data and restores it after the upgrade. When the script ends, a log file is available at: Oracle Linux:
/var/log/utsetup.year_month_date_hour:minute:second.log
48
Oracle Solaris:
/var/adm/log/utsetup.year_month_date_hour:minute:second.log
The values in the file name reflect a time stamp of when the commands are started. Check these files for notices of installation problems. See Section 3.2.10, Installation (utinstall) Error Messages for a listing of utinstall error messages. 11. Reconfigure the Sun Ray network based on the previous configuration you confirmed in step 4. For a shared network (LAN) with external DHCP server support (used utadm -L on) For a shared network (LAN) with Sun Ray server DHCP support For a private network No action is required. This configuration is preserved during the upgrade.
# /opt/SUNWut/sbin/utadm -A subnet
# /opt/SUNWut/sbin/utadm -a intf
12. If the Windows connector groupname was not previously configured or the groupname was set to root or sys, reconfigure the Windows connector. Errors regarding these scenarios will be listed in the installation log.
# /opt/SUNWut/sbin/utconfig -c
13. Repeat Steps 1 through 12 for each server in failover group. 14. Synchronize the updated Sun Ray Operating Software (firmware) on the Sun Ray clients. You must perform this task on a stand-alone Sun Ray server or the last Sun Ray server upgraded in a failover group. The utfwsync takes the currently installed and configured firmware on the Sun Ray server and updates all the Sun Ray servers in the failover group, and then it updates all the firmware on the Sun Ray Clients. The Sun Ray Clients reboot themselves and update to the new firmware if needed.
# /opt/SUNWut/sbin/utfwsync
15. If you plan to use the Windows connector, upgrade the Windows Connector Components on your designated Windows Server. There is no upgrade program for the Windows connector components. To upgrade a Windows system with the previous components installed, remove the current Windows connector components and install the new versions.
49
Note If upgrading servers in a large configuration at once is not convenient, upgrade one or two servers at a time until the entire configuration is complete. For best results in groups of four or more servers, configure the primary server so that it serves only the Sun Ray data store. Configure the secondary servers so that they serve users directly in addition to serving the data store. While upgrading the primary server, secondary servers will not be able to do any updates to the data store. To take advantage of the new features in this release, do not mix different Sun Ray Software versions within a failover group. Failover groups that use more than one software version revert to the functionality of the earliest version. Using the Admin GUI to restart or reset Sun Ray services does not work across servers with different Sun Ray releases. For example, even if you use the Admin GUI to restart all the servers in a failover group that are running the latest Sun Ray Software release, you should still restart or reset any Sun Ray servers running earlier versions of Sun Ray Software. Disable all Sun Ray Client firmware updates until all the servers in a failover group are upgraded. For details, see Section 14.11, How to Disable All Sun Ray Client Firmware Updates. Note Even if you upgrade one or two servers per week, you must wait until all servers in the group are upgraded before you enable firmware updates. If your configuration is a dedicated private interconnect, disconnect the server from the Sun Ray interconnect. See Chapter 6, Failover Groups for a more general discussion of failover groups, including diagrams of failover topologies.
50
Authentication Manager configuration files utslaunch properties Failover group information Kiosk mode configuration Group name used by the Windows connector The utpreserve script does not preserve the following information: The Sun Ray server's network and DHCP configuration settings (utadm configuration information). You must reconfigure those settings after upgrading the Sun Ray Server Software. The /etc/pam.conf is not saved. You need to back up and restore this file manually.
Steps
1. Change directory to the unzipped Sun Ray Software media pack. 2. Preserve the Sun Ray configuration:
# ./utpreserve
The utpreserve script warns that it will stop all Sun Ray services, consequently terminating all user sessions, and asks whether it should continue. If you answer y, the utpreserve script: Stops the Sun Ray services and the Sun Ray data store daemon. Lists the files that are saved. Tars and compresses the entire list of files as the /var/tmp/SUNWut.upgrade/ preserve_version.tar.gz file, where version is the currently installed version of Sun Ray Software. Indicates that a log file containing notices of errors is available at /var/adm/log/ utpreserve.year_month_date_hour:minute:second.log for Oracle Solaris or /var/log/ utpreserve.year_month_date_hour:minute:second.log for Oracle Linux where year, month, and so on are represented by numeric values reflecting the time utpreserve was started. Recommends that the /var/tmp/SUNWut.upgrade/preserve_version.tar.gz file be moved to a safe location.
51
Note If you have modified the /etc/pam.conf in a previous version of Sun Ray Software, your changes might be lost when Sun Ray Software is upgraded. To avoid losing your modifications, be sure to save a copy before performing the update, then use the saved copy to restore your earlier modifications.
52
53
Definition Perform the initial configuration of the Sun Ray server and supporting administration framework software. Configure the Sun Ray server security. Manage Sun Ray Clients connected to the Sun Ray server on which the command is run. Disconnect the current non-smart card mobile session or authenticated smart card session from its respective Sun Ray Client. The session is not destroyed but put into a detached state. The session can be accessed again only after authentication. When Remote Hotdesk Authentication (RHA) is disabled (through utpolicy or the Admin GUI), utdetach affects only authenticated smart card sessions and non-smart card mobile sessions. Enable or disable Sun Ray device services. The services include USB devices connected through USB ports, embedded serial ports, clipboard, internal smart card reader in the Sun Ray Client, and the scbus protocol. Manage Sun Ray mass storage. Convert the port number for the Sun Ray data store service to the new default port on servers in a failover group, then forces all servers in the group to restart Sun Ray services. Eject media from a removable storage media device. Manage firmware versions on the Sun Ray Clients. Install the Sun Ray Operating Software (Sun Ray Client firmware). Force the download of new firmware to a Sun Ray Client running older firmware than its server. Refresh the firmware level on the Sun Ray Clients to the level available on the Sun Ray servers in a failover group. It then forces all the Sun Ray Clients within the group to restart. Uninstall the Sun Ray Operating Software (Sun Ray Client firmware). Create a hashed version of a password used for authenticating the enabling or disabling of the Configuration GUI. Manage a group-wide list of explicit destinations for Sun Ray group membership announcements. Set the failover group signature for a group of Sun Ray servers. The utgroupsig command also sets the Sun data store rootpw used by Sun Ray to a value based on the group signature. Although utgroupsig sets the rootpw in the utdsd.conf file, it does not set the admin password, which is a separate entity, in the data store. View the failover status information for the local server or for the named server. The information that the command displays is specific to that server at the time the command is run. Install, upgrade, and remove the Sun Ray Software. Manage Sun Ray Client device keys for authentication. Modify the state of certain locking modifier keys on a user's keyboard.
utdevadm
utdiskadm utdssync
utgstatus
54
Command utkiosk
Definition Import or export kiosk configuration information into the data store. It also supports storage of multiple named kiosk session configurations in the data store. Set the session type associated with a token, to select a kiosk session configuration for a token associated with a kiosk session, or to query the session type and kiosk session currently associated with a token. Manage Sun Ray device licenses. Manage multihead groups using a CLI. Manage multihead groups using a GUI. Mount a file system on a Sun Ray mass storage device. Set and report the policy configuration of the Sun Ray Authentication Manager, utauthd. Save existing Sun Ray Software configuration data to the /var/tmp/ SUNWut.upgrade directory. Change the Sun Ray administrator password (also known as the UT admin password) used by the Web-based and command-line administration applications. Display a Sun Ray Client's current parameter values. Add, remove, and configure token readers. Display the version of the Sun Ray Software and the Sun Ray Operating Software installed on the server. Configure the Sun Ray data store server to enable replication of administered data from a designated primary server to each secondary server in a failover group. The data stores of the secondary servers remain synchronized automatically unless there is a power outage. Control the resolution and refresh rate of the video monitor signal (persistent monitor settings) produced by the Sun Ray Client. Create, delete, and view resolution definitions, that is, monitor signal timing definitions for monitors attached to Sun Ray Clients. Resize user's screen to its optimal size, which is useful for hotdesking. Present the output of utswitch -l as a list of servers in the current host group, to be used for reconnection of the current Sun Ray Client. A user can either select a server from this list or specify a server not in the current host group by typing its full name in the utselect text box. List and manage Sun Ray sessions on the local Sun Ray server. View and change Sun Ray Client settings. Open the Sun Ray Settings GUI to view or change audio and visual settings for the Sun Ray Client. Run all the appropriate commands, including utinstall and utconfig, in the appropriate sequence to install and configure a Sun Ray server. Start Sun Ray services. Stop Sun Ray services.
utkioskoverride
55
Definition Switch a Sun Ray Client session to another Sun Ray server. The utswitch command can also list existing sessions for the current token. Unmount a file system from a Sun Ray mass storage device. Report Sun Ray user token registrations and manage those registrations. The utuser command is able to obtain smart card token values from Sun Ray Clients that are configured as dedicated token reader devices. Send a message or an audio file to users having an Xnewt or Xsun (X server unique to Sun Ray) process. The messages can be sent in email and displayed in a pop-up window. Assemble information about display number, token, logged-in user, and the like, in a compact format. Manage X server configuration parameters for users of Sun Ray Client sessions. Lock a Sun Ray desktop session.
utwall
4.1.1. How to Set Up Access to the Sun Ray Software Man Pages
Add the following paths to the MANPATH environment variable: /opt/SUNWut/man /opt/SUNWkio/man /opt/SUNWuttsc/man /opt/SUNWuttscwrap/man
56
57
Tab
Functions Display the host group's network connectivity status. Show the host group's installed Sun Ray packages. Display details about each server. Perform a warm restart of Sun Ray services on a local or failover group basis. A warm restart does not terminate sessions prior to the restart. Perform a cold restart of Sun Ray services on a local or failover group basis. A cold restart terminates all sessions on the selected servers prior to the restart.
Sessions
From the Sessions tab, you can do the following tasks: List all the sessions, sorted by user sessions and idle sessions. Use the search function to find specific sessions such as those running on a single server or sessions where a specific user is logged in. Select a session's server to display details about the server or client and to select and terminate sessions.
Desktop Units
From the Desktop Units tab, which includes the Sun Ray Clients and Oracle Virtual Desktop Clients, you can do the following tasks: List all registered clients. List all connected clients. List all clients configured as token readers. List all clients participating in multihead groups.
Tokens
From the Tokens tab, you can do the following tasks: Manage the tokens associated with users. Manage the pseudo-tokens associated with clients.
Advanced
The Advanced tab includes the following subtabs: Security Subtab From the Security subtab, you can disable and re-enable security settings, such as encryption of communication between client and server, server authentication, security mode, and device access. System Policy Subtab From the System Policy subtab, you can regulate authentication manager policy settings, such as: Access for card users and non-card users, which includes enabling Kiosk Mode, Oracle Virtual Desktop Client access, or Mobile Sessions. Enabling Client Authentication Enabling the Multihead feature,
58
Tab
Functions Session Access when Hotdesking Kiosk Mode Subtab From the Kiosk Mode subtab, you can configure Kiosk Mode for your system. Card Probe Order Subtab From the Card Probe Order subtab, you can rearrange the order that smart cards are probed. You can move the cards that are used most frequently to the top of the list. Data Store Password Subtab From the Data Store Password subtab, you can change the password for the administrator account.
Log Files
From the Log Files tab, you can do the following tasks: View system messages. View authentication events. View administration events. View mount messages. View storage messages.
All actions performed within the Admin GUI that modify system settings are logged in an audit trail.
Note If you specified a different port number when you configured the Sun Ray Software, use that port number in the URL. If you enabled secure communication, the browser might be redirected to a secure port. The default secure port is 1661. 3. In the User Name window, type the administrator user name and click OK. 4. In the password challenge screen, type the administration password and click OK. The Sun Ray Administration tool appears.
59
If you get a message denying access, check the following items: You are running a browser on a Sun Ray server or one of its clients. The browser is not using a different machine as an HTTP proxy server. If you get a blank browser page: To access the Admin GUI from a system instead of the Sun Ray server, you must have remote access enabled (it is disabled by default). To enable remote access to the Admin GUI, unconfigure the Admin GUI using the utconfig -w -u command and then run utconfig -w to reconfigure. Choose Yes to enable remote access.
For a more permanent solution, you can remove the non-English Sun Ray Software packages from the server. The following example removes the French packages and restarts the web admin services.
# /etc/init.d/utwadmin stop # pkgrm SUNWfuta SUNWfutwa SUNWfutwh SUNWfutwl # /etc/init.d/utwadmin start
60
...
This tool automatically updates the web.xml file used by the web server hosting the Admin GUI.
4.7.1. How to Configure Admin GUI Privileges for UNIX Users (Oracle Linux)
Use the following procedure to configure the Sun Ray Admin GUI to allow access by the UNIX users in the utadmin authorized user list instead of the default admin account. Once you enable Admin GUI privileges for authorized users, you can add or remove users to the utadmin authorized list to manage access to the Admin GUI. 1. For each UNIX user that needs authorization to the Admin GUI, add the user to the authorized user list.
# utadminuser -a username
You can run the utadminuser command without any options to list the current authorized users or with the -d option to delete a user. 2. Add the following auth entries to the /etc/pam.d/utadmingui file:
#%PAM-1.0 # BEGIN: added to utadmingui by SunRay Server Software -- utadmingui auth include system-auth # END: added to utadmingui by SunRay Server Software -- utadmingui
Note Make sure to include the comment lines, which are needed for the cleanup to work properly.
4.7.2. How to Limit Admin GUI Privileges to the Admin User (Oracle Linux)
To limit Admin GUI privileges to the default admin user, replace the PAM entries in the /etc/pam.d/ utadmingui file with the pam_sunray_admingui.so.1 module.
# BEGIN: added to utadmingui by SunRay Server Software -- utadmingui auth sufficient /opt/SUNWut/lib/pam_sunray_admingui.so.1 # END: added to utadmingui by SunRay Server Software -- utadmingui
Note Make sure to include the comment lines, which are needed for the cleanup to work properly. 61
4.8.1. How to Configure Admin GUI Privileges for UNIX Users (Oracle Solaris)
Use the following procedure to configure the Sun Ray Admin GUI to allow access by the UNIX users in the utadmin authorized user list instead of the default admin account. Once you enable Admin GUI privileges for authorized users, you can add or remove users to the utadmin authorized list to manage access to the Admin GUI. 1. For each UNIX user that needs authorization to the Admin GUI, add the user to the authorized user list.
# utadminuser -a username
You can run the utadminuser command without any options to list the current authorized users or with the -d option to delete a user. 2. Modify the /etc/pam.conf file to use the other authentication PAM stack auth entries to create the PAM stack for utadmingui
# BEGIN: added to utadmingui by SunRay Server Software -- utadmingui utadmingui auth requisite pam_authtok_get.so.1 utadmingui auth required pam_dhkeys.so.1 utadmingui auth required pam_unix_cred.so.1 utadmingui auth required pam_unix_auth.so.1
Note Make sure to include the comment line, which is needed for the cleanup to work properly.
4.8.2. How to Limit Admin GUI Privileges to the Admin User (Oracle Solaris)
To limit Admin GUI privileges to the default admin user, modify the /etc/pam.conf file and replace the PAM stack for utadmingui with the pam_sunray_admingui.so.1 module.
# BEGIN: added to utadmingui by SunRay Server Software -- utadmingui utadmingui auth sufficient /opt/SUNWut/lib/pam_sunray_admingui.so.1
Note Make sure to include the comment line, which is needed for the cleanup to work properly.
62
All audit events are prefixed with the keyword utadt:: so you can filter events from the messages file. For example, session termination from the Admin GUI generates the following audit event:
Jun 6 18:49:51 sunrayserver usersession[17421]: [ID 521130 user.info] utadt:: username= / {demo} hostname={sunrayserver} service={Sessions} cmd={/opt/SUNWut/lib/utrcmd sunrayserver /opt/SUNWut/sbin/utsession -x -d 4 -t / Cyberflex_Access_FullCrypto.1047750b1e0e -k 2>&P1} message={terminated User "Cyberflex_Access_FullCrypto.1047750b1e0e" with display number="4" on "sunrayserver"} status={0} return_val={0}
where: username = User's UNIX ID hostname = Host on which the command is executed service = Name of the service being executed cmd = Name of the command being executed message = Details about the action being performed
63
64
Authentication
/var/opt/SUNWut/log/auth_log
65
Log Files
Log File
Path
Description Lists mount messages for mass storage devices. The archived utmountd files are annotated using numeric extensions, for example, from utmountd.log.0 to utmountd.log.9. Lists mass storage device events. The archived storage files are annotated using numeric extensions, for example, from utstoraged.log.0 to utstoraged.log.9. Lists events from the server's clients, including details of registering, inserting, or removing smart cards. This file is updated daily. Archived files are stored up to seven days or 3.5 MB, annotated with numeric extensions, for example, from messages.0 to messages.5. When using a shared network (LAN) with external DHCP server support (configured network using utadm L on), logging for each event type is disabled unless the LogXXX value and the LogHost value are set. See Table 13.1, Sun Ray Client Configuration Parameters (.parms) for details.
/var/opt/SUNWut/log/ utstoraged.log
Messages
/var/opt/SUNWut/log/messages
Lists web administration-related messages. The archived log files are annotated with numeric extensions. Lists Windows connector messages.
Table 5.2, Sun Ray Server Installation and Configuration Log Files list the specific installation and configuration logs files. Table 5.2. Sun Ray Server Installation and Configuration Log Files Log File Activation Path /var/adm/log/utctl.* (Oracle Solaris) /var/log/SUNWut/utctl.* (Oracle Linux) Installation /var/adm/log/utinstall.* (Oracle Solaris) /var/log/utinstall.* (Oracle Linux) Setup /var/adm/log/utsetup.* (Oracle Solaris) List events logged during installation/ configuration when performed by utsetup. Description List events logged during post-installation product activation. The archived log files are annotated with time stamp extensions. List events logged during installation. The archived log files are annotated with time stamp extensions.
66
Log File
Description The archived log files are annotated with time stamp extensions.
Once stopped, the Sun Ray services will not restart even after the server is rebooted. You must use the utstart command to start Sun Ray services.
5.3. How to Check and Fix Corrupted Configuration Files (Oracle Solaris)
If the dtlogin daemon cannot start the Xsun or Xnewt server properly, the following configuration files might be corrupted: 67
/etc/dt/config/Xservers /etc/dt/config/Xconfig The following procedure explains how to correct this problem. Note This procedure shows output from a simplified example. Your output may have tens of lines between the BEGIN SUNRAY CONFIGURATION and END SUNRAY CONFIGURATION comments. 1. As a user of the Sun Ray server, open a shell window and compare the /usr/dt/config/Xservers and /etc/dt/config/Xservers files.
% diff /usr/dt/config/Xservers /etc/dt/config/Xservers
This command compares a known good file with the suspect file. The output should be similar to the following example.
106a107,130 > # BEGIN SUNRAY CONFIGURATION > :3 SunRay local@none /etc/opt/SUNWut/basedir/lib/utxsun :3 -nobanner . . > :18 SunRay local@none /etc/opt/SUNWut/basedir/lib/utxsun :18 -nobanner > # END SUNRAY CONFIGURATION
The first line of output contains 106a107,130. The 106 means that the two files are identical to the 106th line of the files. The a107,130 means that the information on lines 107 through 130 of the second file would have to be added to the first file to make it the same as the second file. If your output shows the first three digits to be a number less than 100, the /etc/dt/config/ Xservers file is corrupt. 2. Compare the /usr/dt/config/Xconfig and /etc/dt/config/Xconfig files.
% diff /usr/dt/config/Xconfig /etc/dt/config/Xconfig
If your output shows the first three digits to be a number less than 154, the /etc/dt/config/ Xconfig file is corrupt. 3. If either file is corrupted, continue this procedure to replace the configuration files. 4. Become superuser on the Sun Ray server and shut down the Sun Ray Client services. Note Replacing the Xservers file requires shutting down all Sun Ray Client services. Remember to inform users of the outage. 68
# /opt/SUNWut/sbin/utstop
Note For headless servers, comment out or remove the :0 entry from the Xservers file. 6. Re-initialize the authentication policy.
# /opt/SUNWut/sbin/utstart -c
The extra lines within the previous Xservers and Xconfig files are automatically rebuilt.
Note (Oracle Solaris Only) If you press Ctrl-C while performing utadm configuration, the Admin GUI may not function correctly the next time you invoke it. To correct this condition, use the dhtadm -R command.
69
Network Troubleshooting
Table 5.3. Sun Ray Data Store User Fields Fields Token ID Description User's unique token type and ID. For smart cards, this value is a manufacturer type and the card's serial ID. For clients, this value is the type "pseudo" and the client's Ethernet address. Examples: mondex.9998007668077709 pseudo.080020861234 Name of the Sun Ray server that the user is using. This setting is optional. Sun Ray server's communication port. This field should generally be set to 7007. This setting is optional. User's name. Any additional information you want to associate with the user, for example, an employee or department number. This setting is optional.
70
utcapture Examples
Description Percentage of packets lost between the current and previous polling interval. Time in milliseconds for a round trip from the client to the server.
The following command captures data every 15 seconds from the Authentication Manager running on the local host and then writes it to stdout.
% utcapture -r > raw.out
The following command captures data every 15 seconds from the Authentication Manager running on server5118.eng and then writes the output to stdout if any change occurs in packet loss for the client with ID 080020a893cb or 080020b34231.
% utcapture -s sunray_server5118.eng 080020a893cb 080020b34231
The following command processes the raw data from the input file raw-out.txt and then writes to stdout the data only for those clients that had packet loss.
% utcapture -i raw-out.txt
71
72
73
Failover Process
Online: The server participates in the normal session creation process controlled by the load balancing algorithm in the failover group. Offline: The server does not participate in load balancing any more (the load balancing algorithm does not select this server for new sessions), although sessions can still be created on it, either explicitly, through the use of the utswitch or utselect command, or implicitly, if all other servers are down. When using a failover group, clients are automatically redirected to servers based on load balancing before sessions are created. However, users can use the utselect or utswitch commands for manual redirection. The utselect GUI is the preferred method to use for server selection. For more information, see the utselect man page. For more information about how to set up multiple failover groups that use regional hotdesking, see Chapter 9, Hotdesking.
74
Authentication Requirements
Mixing servers running different versions of Sun Ray Software is supported. However, this is not recommended for long-term use in a production environment. Failover groups that use more than one version of Sun Ray Software will be unable to use all the features provided in the latest releases. Note When multiple versions of Sun Ray Software are used in a failover group, the primary server should run the oldest of the versions in use. Otherwise, the presence of a newer feature on the primary server might prevent proper replication of the Sun Ray data store to secondary servers that are running older versions. If a Sun Ray environment has Unix desktop users, then all the Sun Ray servers in the failover group should run the same version of the operating system. Otherwise, using different Gnome desktop versions from the same home directory can lead to a corrupted desktop state.
Steps
1. Become superuser on the primary Sun Ray server. 2. Configure this server as the primary Sun Ray server and identify all secondary servers.
# /opt/SUNWut/sbin/utreplica -p secondary-server1 [secondary-server2...]
where secondary_server1 [secondary_server2...] is a space-separated list of unique host names of the secondary servers. When the script ends, a log file is available at: For Oracle Solaris:
/var/adm/log/utreplica.YearMonthDateHour:Minute:Second.log
where secondary_server1 [secondary_server2...] is a space-separated list of unique host names of the secondary servers. 2. Become superuser on the secondary server. 3. Add the secondary server.
# /opt/SUNWut/sbin/utreplica -s primary-server
76
Steps
1. Become superuser on the Sun Ray server. 2. Start the utgroupsig command.
# /opt/SUNWut/sbin/utgroupsig
You are prompted for the signature. 3. Enter the signature twice identically for acceptance. 4. For each Sun Ray server in the group, repeat this procedure. Note Be sure to use the utgroupsig command rather than any other method to provide the signature. utgroupsig also ensures proper internal replication.
77
6.8.3. How to Show the Current Sun Ray Data Store Replication Configuration
# /opt/SUNWut/sbin/utreplica -l
The result indicates whether the server is stand-alone, primary (with the secondary host names), or secondary (with the primary host name).
Command-Line Steps
View the failover group status for the local Sun Ray server:
# /opt/SUNWut/sbin/utgstatus
78
This command provides an LDIF format file of the current data store. 2. Use FTP to send this file to the /tmp directory on the primary server. 3. Follow the Sun Ray Software installation instructions. 4. After running utinstall, configure the server as a primary server for the group. Make sure that you use the same admin password and group signature.
# utconfig : # utreplica -p secondary-server1 [secondary-server2...]
5. Shut down the Sun Ray services, including the data store.
# /opt/SUNWut/sbin/utstop
This command populates the primary server and synchronizes its data with the secondary server. The replacement server is now ready for operation as the primary server. 7. Restart Sun Ray services.
# /opt/SUNWut/sbin/utstart -c
# /opt/SUNWut/sbin/utuser -l
2. Reconfigure each of the remaining secondary servers in the failover group to use the new primary server:
# utreplica -u # utreplica -s new-primary-server
This command resynchronizes the secondary server with the new primary server. Note This process may take some time to complete, depending on the size of the data store. Since Sun Ray services will be offline during this procedure, you may want to schedule your secondary servers' downtime accordingly. Be sure to perform this procedure on each secondary server in the failover group.
80
The keepalive message contains the following information about the server: Server's host name Server's primary IP address Elapsed time since the server was booted IP information for every interface the server can reach Machine information, such as the number and speed of CPUs, configured RAM, and so on Load information, such as the CPU and memory utilization, number of sessions, and so on The last two items are used to facilitate load balancing. The information maintained by the Group Manager is used primarily for server selection when a token is presented. The server and subnet information is used to determine the servers to which a given client can connect. These servers are queried about sessions belonging to the token. Servers whose last keepalive message is older than the timeout are deleted from the list, because either the network connection or the server is probably down.
81
82
7.1. Sessions
Sun Ray sessions are groups of services or applications that are associated with an authentication token and controlled by the Session Manager. They reside on a Sun Ray server and can be directed to any Sun Ray Client. Sessions can be in one of two states, Connected or Disconnected: Connected: Every session with a connected status is displayed on client. The session is automatically disconnected when the user removes the smart card or explicitly switches the client to a different session, for example, with the utswitch or utselect commands. Disconnected: These sessions are still executed on a server but are not connected to a client and, consequently, are not displayed. However, a user can reconnect to a disconnected session, for example by inserting a smart card containing the appropriate token into the card reader on a client. This changes the session's state to connected and causes it to be displayed on that client. Sessions can further be grouped into two categories: Idle sessions: These sessions typically display only a login screen (or login greeter such as dtlogin) where no user has been logged in yet. The lifetime of these sessions is controlled by the Sun Ray system. For example, disconnected idle sessions are automatically terminated (reaped off) by the system after a specific time interval. User sessions (or non-idle sessions): These are sessions with UNIX users logged in. Users may start up additional applications from within the sessions, thus potentially consuming a lot of system resources. User sessions are therefore of more interest to administrators than idle sessions. To free system resources, monitor the number of long-running disconnected user sessions and, when appropriate, terminate sessions that are no longer in use.
83
Authentication Manager
If no Sun Ray server is found to provide a session (see Chapter 2, Planning a Sun Ray Network Environment), the client sends a broadcast request for any Authentication Manager on its subnet.
84
Tokens
The Session Manager is used at startup for services, for managing screen space, and as a rendezvous for the Authentication Manager. The Session Manager keeps track of sessions and services by mapping services to sessions and binding and unbinding related services to or from a specific client. The Session Manager takes authentication only from authorized Authentication Managers listed in the /etc/opt/SUNWut/auth.permit file. The following sequence describes how the process starts, ends, and restarts: 1. After a user's token is authenticated, the Authentication Manager determines whether a session exists for that token. If a session does not exist, the Authentication Manager asks the Session Manager to create a session and then starts the appropriate services for the session according to the authentication policy decisions taken by the administrator. Creating a session usually requires starting an Xserver process for the session. 2. When services are started, they join the session explicitly by contacting the Session Manager. 3. The Authentication Manager informs the Session Manager that the session associated with the token is to be connected to a specific Sun Ray Client. The Session Manager then informs each service in the session that it must connect directly to the client. 4. The user can then interact with the session. The Session Manager mediates control of the screen space between competing services in a session and notifies the services of changes in screen space allocation. 5. When the user removes the smart card, or presses Shift-Pause in an NSCM session, or power cycles the client, or is inactive for longer than the screen lock idle timeout interval, the Authentication Manager determines that the session associated with that token must be disconnected from that client. The Authentication Manager notifies the Session Manager, which in turn notifies all the services in the session and any USB devices to disconnect. 6. When the user re-inserts the smart card, or logs in again to get access to an NSCM session, the Authentication Manager requests the Session Manager to create a new temporary session and then uses it to authenticate the user. This is known as Remote Hotdesk Authentication (RHA). After the user has been authenticated, the Sun Ray Client is connected directly to the user's session. Note RHA does not apply to anonymous Kiosk Mode or to token readers. Sun Ray Software can be configured to turn this security policy feature off. The Session Manager is consulted only if the state of the session changes or if other services are added. When a user's token is no longer mapped to a client, for example, when a card is removed, the Session Manager disconnects the services from the client, but the services remain active on the server. For example, programs attached to the Xserver continue to run although their output is not visible. The Session Manager daemon must continue running. To verify that the Session Manager daemon is running, use the ps command and look for utsessiond. If the Authentication Manager quits, the Session Manager disconnects all the authorized sessions and requires them to be reauthenticated. These services are disconnected but still active. If the Session Manager is disrupted, it restarts automatically. Each service contacts the Session Manager to request reattachment to a particular session.
7.2. Tokens
As described earlier, the Authentication Manager implements the chosen policies for identifying and authenticating users on Sun Ray Clients. Tokens are the key piece for this process.
85
Registering Tokens
Sun Ray tokens are authentication keys used to associate a session with a user. A token is a string that consist of a token type and an identifier. If a user inserts a smart card into a client, the card's type and identifier are used as the token (for example mondex.9998007668077709). If the user is not using a smart card, the token type pseudo and the client's identifier (MAC address) are supplied as the token (for example pseudo.080020861234). The initial token is used to check access rights and to determine the user's session. During this process, the token is eventually translated into other token types (such as escape token, auth token, etc.) used internally by the Sun Ray system. As an administrator, you rarely need to deal with these internal token types, focusing instead on the initial tokens provided on smart cards or as pseudo-tokens.
86
2. Select any Desktop Unit Identifier to view properties for that client. 3. On the Desktop Unit Properties page, click View Token Details. 4. Click the Edit button to display the Edit Token Properties page. 5. Provide details such as ownership and to specify a session type: Default, Kiosk, or Regular.
87
Token reader mode is useful when you want to determine the raw token ID of a smart card. To configure the Sun Ray Client with MAC address 0800204c121c as a token reader:
# utreader -a 0800204c121c
To re-enable the Sun Ray Client with MAC address 0800204c121c to recognize card movement events and perform session mobility based on the smart card inserted into the client:
# utreader -d 0800204c121c
where token-reader is the MAC address of the client containing the smart card whose ID you want to read. Insert the smart card into the client and run the utuser command. This command queries the client for the smart card token's ID and, if successful, displays it. For example:
88
Session Troubleshooting
# /opt/SUNWut/sbin/utuser -r 08002086e18f Insert token into token reader '08002086e18f' and press return. Read token ID 'mondex.9998007668077709'
7.4.1. Problem: The dtlogin daemon cannot start the Xsun server properly.
See Section 5.3, How to Check and Fix Corrupted Configuration Files (Oracle Solaris).
89
90
91
Extended APDU support (ISO-7816-4 2005 rev) Compliance with the PC/SC 2.0 IFD Handler API Smart card services for Oracle Virtual Desktop Clients Protocol and parameters selection (PPS) for Sun Ray 3 Series Clients The scbus v2 protocol is supported on all Sun Ray 2 Series Clients, Sun Ray 3 Series Clients, and Oracle Virtual Desktop Clients version 3.1 or later. Sun Ray 1 Series Clients do not support the scbus v2 protocol. If the scbus v2 protocol is enabled on a Sun Ray server, Sun Ray 1 Series Clients will not be able to use smart card services either natively on Oracle Solaris or through the Windows connector. Note The scbus v2 protocol does not work with external USB smart card readers connected to Sun Ray Clients. By default, scbus v1 is enabled. See Section 8.6, How to Change the Smart Card Bus Protocol for changing the scbus version.
92
4. Restart the Sun Ray services for the new order to take effect.
# /opt/SUNWut/sbin/utstart -c
93
where version-number can be v1 or v2. You can use the -p scbus with no other options to view the current scbus version set on the Sun Ray server. 3. Restart the Sun Ray services for the new protocol to take effect.
# /opt/SUNWut/sbin/utstart -c
94
When a smart card transaction is occurring on a Sun Ray Client (smart card LED is flashing), avoid hotdesking or resetting the Sun Ray Client. If a problem occurs, you may have to log out of the session. If you reset a Sun Ray Client that has smart card-related applications currently running, the applications may freeze for up to two minutes or the smart cards may be inaccessible for up to two minutes. The applications should recover without user intervention. When hotdesking with a Windows connector session running, the PIN dialog may fail to display. You will get a password prompt. If this happens, log out of the Windows session, restart the Windows connector session, and log into Windows again. When rapidly hotdesking a Sun Ray Client, it may fail to recognize the smart card and OSD icon 63 will display instead of the session. Remove and reinsert the card to resolve the issue.
8.8.1. Installation
Follow these instructions to install the CCID IFD handler. Note To install the CCID IFD handler in an Oracle Solaris Trusted Extensions environment, perform the installation as root from ADMIN_LOW (global zone). 1. Download and unpack the CCID IFD handler. Note The CCID IFD Handler is not provided with the Sun Ray Software 5.3 release. However, you can download the PC/SC-lite 1.3 component from the 5.1.1 Media Pack, which includes the CCID IFD Handler v1.3.10 distribution. Only the CCID IFD handler needs to be installed. PC/SC-lite is already installed with Sun Ray Software 5.3. 2. Become superuser on the Sun Ray server. 3. Install the CCID IFD handler:
# svcadm disable pcscd # /usr/sbin/pkgadd -d . SUNWusb-scrdr # svcadm enable pcscd
8.8.2. Uninstallation
Follow these instructions to remove the CCID IFD handler.
95
Note To uninstall the CCID IFD handler from an Oracle Solaris Trusted Extensions environment, perform the uninstallation as root from ADMIN_LOW (global zone). 1. Become superuser on the Sun Ray server. 2. Uninstall the CCID IFD handler:
# svcadm disable pcscd # /usr/sbin/pkgrm SUNWusb-scrdr # svcadm enable pcscd
An additional solution is to ensure that the USB reader list is visible to the application before the application scans the reader list. One way to address this is by preventing PC/SC-lite instances from timing out after a pre-specified idle period. You can disable the instance timeout by editing the /etc/smartcard/pcscd-
96
SunRay.conf file and changing the INSTANCE_TIMEOUT parameter to -1. The shipping default value is 600 seconds (10 minutes). When you disable inactivity timeouts by changing INSTANCE_TIMEOUT, PC/SC-lite instances stay around until the user's session is terminated, which can mean that many PC/SC-lite processes may be in the process table, using system resources. We currently have no data on how much of an impact that might cause as the number of user sessions on a system grows (i.e., we have insufficient data on how that scales). In many cases, it may not be a problem at all, except that the process table will be more cluttered with inactive processes than otherwise.
97
98
Chapter 9. Hotdesking
Table of Contents
9.1. Hotdesking Overview ................................................................................................................. 99 9.2. Hotdesking Without Smart Cards ................................................................................................ 99 9.2.1. NSCM and Failover Groups ........................................................................................... 100 9.2.2. How to Enable NSCM Sessions ..................................................................................... 100 9.2.3. How to Log in to an NSCM Session ............................................................................... 101 9.3. Regional Hotdesking ................................................................................................................ 102 9.3.1. Regional Hotdesking Process ........................................................................................ 103 9.3.2. Regional Hotdesking Site Requirements ......................................................................... 103 9.3.3. Providing Site Integration Logic ...................................................................................... 103 9.3.4. How to Configure a Site-specific Mapping Library ........................................................... 103 9.3.5. How to Use Token Readers with Regional Hotdesking .................................................... 104 9.3.6. How to Configure the Sample Data Store ....................................................................... 104 9.4. Remote Hotdesk Authentication (RHA) ...................................................................................... 105 9.4.1. How to Disable Remote Hotdesk Authentication ............................................................. 106 9.4.2. How to Re-enable Remote Hotdesk Authentication ......................................................... 106 This chapter describes how to configure regional hotdesking and hotdesking without smart cards.
99
2. Log in to the Admin GUI. 3. Go to the System Policy tab. 4. In the Non-Card Users panel, select the Enabled option next to Mobile Sessions. 5. Go to the Servers tab. 6. Click Cold Restart to restart Sun Ray services and terminate all users' sessions.
# /opt/SUNWut/sbin/utwall -d -t 'System policy will change in 10 minutes. All active and detached sessions will be lost. Please save all data and terminate your session now.' ALL
2. As superuser, type the utpolicy command with the -M argument for your authentication policy. For example:
# /opt/SUNWut/sbin/utpolicy -a -M -s both -r both
This example configures the Authentication Manager to allow self-registration of users both with or without smart cards, and NSCM sessions are enabled. 3. Initialize Sun Ray services by restarting the Authentication Manager on the server, including each secondary Sun Ray server if in a failover group.
# /opt/SUNWut/sbin/utstart -c
2. Type your password into the password field. Figure 9.2. NSCM Login Dialog Box Password Field
101
Regional Hotdesking
An Options menu is available for Oracle Solaris. Right clicking the Options menu displays a panel with the following options: QuickLogin - Applicable only to a new session only. Selecting Off enables the user to log in with the same options available through dtlogin. Selecting On enables the user to bypass the option selection phase. QuickLogin is on by default. Exit - Selecting Exit temporarily disables the NSCM session. An escape token session is started, and the dialog box is replaced by the dtlogin screen. A user without a valid account in this server group can exit to the dtlogin dialog and attempt a remote X (XDMCP) login to some other server where that user has a valid account. Note When using Oracle Linux, the Oracle Linux login screen may briefly display before the desktop is presented. No action is necessary. If no NSCM session exists for this user, the Authentication Manager creates an NSCM session token with the format: mobile.IEEE802-MACID.
102
103
Note If you are using Oracle Linux, library mapping for the 32-bit platform should be / opt/SUNWutref/amgh/lib, as shown below, and library mapping for the 64-bit platform should be /opt/SUNWutref/amgh/lib64. After configuring the library, you must perform a cold restart of the Sun Ray services using either the utstart CLI or the Admin GUI. How to Configure the Token-based Mapping Implementation Provided as a Sample
# /opt/SUNWut/sbin/utamghadm -l /opt/SUNWutref/amgh/lib/libutamghref_token.so
If a registered policy is in place, use the insert_token key instead of the token key, which is not globally unique. Note The RHA security feature does not affect token readers. It is assumed that token readers are deployed in physically secure environments.
username is optional. If the same token is associated with more than one non-null username, an error is returned. For a user name-based mapping, use entries of the form:
username=XXXXX host=XXXXX
Comments (lines beginning with #) are ignored. Key/value pairs other than those mentioned above are ignored. The order of key/value pairs is not significant. For a combined mapping, use entries of the form:
Any combination of TOKEN BASED and USERNAME BASED lines.
Comments (lines beginning with #) are ignored. A token match is attempted first. If no token match is made (or if no username is included in the matches) the user is prompted for a username. A lookup is made for this username. If there is no match, a local session is created; otherwise, the Sun Ray Client is forwarded to the first host reported as available. A sample line for this file would look like the following:
token=MicroPayflex.5001436700130100 username=user1 host=ray-207
105
106
107
Kiosk mode can also provide unauthenticated access for settings such as public kiosks, where users cannot be expected to provide authentication credentials.
10.3.1. Characteristics
Kiosk user accounts have the following characteristics: A default naming scheme of utkux, where x is a range from 0 to N-1 and N is the specified number of kiosk user accounts to create. A different naming prefix can be chosen if the default of utku has risk of a collision. UID by default starts at 150000 (starting UID can be specified). UID range must be contiguous. Home directories are located in /var/opt/SUNWkio/home/$USER. Local accounts only (/etc/passwd). Centralized NIS or LDAP kiosk user accounts are not supported.
108
Note If an account named utku* exists in a centralized name service like NIS or LDAP, configuring kiosk user accounts will fail. You must either remove that host from the name service or temporarily reconfigure the server to use only files for user and groups through the nsswitch.conf file.
109
110
To work around this issue, you must delete all the kiosk user accounts and recreate them by using the kioskuseradm delete and kioskuseradm create commands, respectively. This process requires you to stop the Sun Ray services on the Sun Ray server. If you have a failover group, performing these steps on each Sun Ray server separately will avoid user downtime. 1. Become superuser on the Sun Ray server. 2. Increase the number of kiosk user accounts.
# /opt/SUNWkio/bin/kioskuseradm extend -c number_of_new_users
111
3. Click the Edit button. 4. Select your preferred Kiosk Session (Session Type) from the drop-down list. 5. Provide appropriate values for the remaining settings, which are described in Table 10.2, ulimit Settings. For more information, see the ulimit man page. Note Choosing unsuitable values for ulimit settings could cause kiosk sessions to start incorrectly or to crash due to lack of resources. Table 10.2. ulimit Settings Value Timeout Description Indicates the number of seconds after which a disconnected session will be terminated. If you provide no value for this setting, termination of disconnected sessions will be disabled. Indicates the maximum number of CPU seconds per process for kiosk sessions. By default, the system default is applied to all kiosk sessions.
112
Value Maximum VM Size Maximum Number of Files Maximum File Size Locale Arguments
Description Indicates the maximum Virtual Memory size per process for kiosk sessions. By default, the system default is applied to all kiosk sessions. Indicates the maximum number of open files per process for kiosk sessions. By default, the system default is applied to all kiosk sessions. Indicates the maximum file size per process for kiosk sessions. By default, the system default is applied to all kiosk sessions. Indicates the locale to be used by the kiosk session. By default, the system default is applied to all kiosk sessions. Indicates a list of arguments that should be passed to kiosk sessions as they start. This setting is specific to the kiosk session. For more information about supported arguments, consult the session-specific documentation for your selected session.
6. Click OK. Changes to the kiosk mode settings are applied automatically to kiosk sessions started after you configure the session type. You do not have to restart Sun Ray services for changes to take effect.
b. Edit the mysession.conf file. See the session.conf man page for a description of available settings. The following example uses the Sun Ray Windows Connector kiosk session:
KIOSK_SESSION=uttsc KIOSK_SESSION_LIMIT_VMSIZE=20000 KIOSK_SESSION_ARGS=-h -- -r sound:low -E theming winserver.example.org
2. If applicable, create an application list file. If you are using a kiosk session that can serve as a container for multiple applications, you should create an application list file. a. To start with existing settings, export the application list to a file:
utkiosk -e session -a > myapps.list
b. Edit the myapps.list file. See the kiosk man page for a description of application list files. 3. Import your settings into the Sun Ray data store. To import your session settings without an application list as the default session configuration:
utkiosk -i session -f mysession.conf
To import your session settings and application list as the default session configuration:
113
Command-Line Steps
1. Become superuser on the Sun Ray server. 2. Enable a kiosk mode through the utpolicy -k command. The following options determine whether access to the Sun Ray server is granted to certain tokens:
-z both/pseudo/card
or
-r both/pseudo/card [-s both/pseudo/card]
The -k both/pseudo/card option determines whether some or all of the granted sessions are kiosk sessions.
How to Enable Kiosk Mode for All Users (Smart Card and Non-Smart Card)
# /opt/SUNWut/sbin/utpolicy -a -M -s both -r both -k both
All sessions are in kiosk mode and available only to smart card users unless you specify overrides.
114
How to Enable Regular Sessions for Smart Card Users and Kiosk Sessions for Non-Smart Card Users
# /opt/SUNWut/sbin/utpolicy -z both -k pseudo
Smart card sessions are non-kiosk (ordinary login) sessions. Non-smart card sessions are kiosk sessions.
How to Enable Regular Sessions for Registered Smart Cards and Kiosk Sessions for Non-Smart Card Users
# /opt/SUNWut/sbin/utpolicy -r card -z pseudo -k pseudo
Non-kiosk smart card sessions are allowed only for registered tokens. Non-smart card sessions are kiosk sessions.
How to Enable Kiosk Sessions for Registered Smart Cards and Regular Sessions on Registered Clients
# /opt/SUNWut/sbin/utpolicy -r both -s both -k card
Smart card sessions are kiosk sessions, non-smart card sessions are non-kiosk (ordinary login) sessions. Users can self-register smart card tokens and clients.
All sessions are in kiosk mode and available only to smart card users unless you specify overrides.
115
4. Select the desired Session Type from the list of available session types. The available session types are Default, Kiosk, and Regular. Select Default to prevent the kiosk mode policy from being overridden for this token.
116
Command-Line Steps
Select Kiosk to use a kiosk session for this token regardless of the kiosk mode policy. Select Regular to ensure that a kiosk session is not used for this token regardless of the kiosk mode policy. 5. Click OK.
Command-Line Steps
Use the utkioskoverride command to override the policy.
/opt/SUNWut/sbin/utkioskoverride
The following examples demonstrate how to override the kiosk mode policy from the command line. For more detailed information about overriding kiosk mode policy, see the utkioskoverride man page.
How to Enable Kiosk Sessions Regardless of the Kiosk Mode Policy for a Registered Smart Card
To enable kiosk sessions regardless of the kiosk mode policy for the registered smart card MicroPayFlex.12345678:
# /opt/SUNWut/sbin/utkioskoverride -s kiosk -r MicroPayFlex.12345678
How to Disable Kiosk Session Regardless of the Kiosk Mode Policy for a Registered Smart Card
To disable kiosk sessions regardless of the kiosk mode policy for the registered smart card MicroPayFlex.12345678:
# /opt/SUNWut/sbin/utkioskoverride -s regular -r MicroPayFlex.12345678
How to Disable Kiosk Sessions Regardless of the Kiosk Mode Policy for a Logical Token
To disable kiosk sessions regardless of the kiosk mode policy for the logical token user.12345678:
# /opt/SUNWut/sbin/utkioskoverride -s regular -t user.12345678
117
How to Configure a Kiosk Mode Session Type for the Windows Connector
The /opt/SUNWuttsc/bin/uttsc script is used to launch the Windows connector. This script provides a simple wrapper for the uttsc executable. A two-minute timeout is imposed on Windows sessions that remain at the Windows login screen. When this timeout elapses, the associated Windows session is terminated and the Windows connector terminates subsequently. If no Windows login takes place, the client appears to reset every two minutes. To avoid the two-minute timeout, the session script supports its own timeout mechanism, which is initiated when the script detects that the Windows connector has terminated. If the session script timeout interval has not elapsed, the session script relaunches the Windows connector. If the session script timeout has elapsed, the session script terminates, and the Kiosk session also terminate as a result. The timeout may be specified as a session script argument. It has a default value of 30 minutes.
10.10.1. How to Configure a Kiosk Mode Session Type for the Windows Connector
1. Log in to the Admin GUI. 2. Click the Advanced tab and Kiosk Mode sub-tab. Then click Edit. 3. Choose Sun Ray Connector for Windows OS from the Session (Session Type) menu, as shown in Figure 10.3, Edit Kiosk Mode Screen for Windows Connector. Figure 10.3. Edit Kiosk Mode Screen for Windows Connector
118
How to Configure a Kiosk Mode Session Type for the Windows Connector
Note Once the Windows connector session is selected, most of the fields on the main Kiosk page are not available. The Applications list is not available because the Windows connector session does not support the addition of applications. 4. Add session arguments to the Arguments field at the bottom in the format:
[session-type-arguments] [-- uttsc-arguments] myhost.mydomain
The arguments accepted are shown in Table 10.3, Kiosk Session Arguments for Windows Connector. Table 10.3. Kiosk Session Arguments for Windows Connector Argument -t timeout Description Sets the value of a timeout interval (in seconds) after which the session script will terminate in the event of a Windows connector termination. If Windows connector terminates before the timeout has elapsed it will be restarted by the session script. The default value for timeout is 1800 (30 minutes). Values less than or equal to 0 indicate that the session script should never restart the Windows connector. Disables the default behavior of starting uttsc with the m -b options. This option disables full screen mode and enables the pull-down header. Specify any valid uttsc arguments. For detailed information on these options, refer to the uttsc man page. The -m and -b uttsc arguments are used by default. These arguments enable full-screen mode and disable the pull-down header respectively. The minimal required argument is the host name, so the field should contain, at minimum, myhost.mydomain. The following example line specifies: A 10-minute timeout (specified in seconds) until the session is cycled if the user does not log in Printer forwarding Smart card redirection Optimized Windows connector hotdesking behavior
-t 600 -- -r printer:officelaser -r scard:on -O myhost.mydomain.com
-h
-- uttsc-arguments myhost.mydomain
5. Configure the server to use Kiosk Mode for card and non-card users. a. Click the System Policy sub-tab on the Advanced menu. b. Enable Kiosk Mode for both card and non-card users. 6. Click Save. 119
All new or restarted sessions matching the policy configuration to use kiosk mode will access the new session type.
10.11.1. How to Configure a Kiosk Mode Session Type for the VMware View Connector
1. Log in to the Admin GUI. 2. Click the Advanced tab and Kiosk Mode sub-tab. Then click Edit. 3. Choose VMware View Manager Session from the Session (Session Type) menu. 4. Modify the session parameters. 5. Add session arguments to the Arguments field at the bottom in the format:
[session-type-arguments] [-- uttsc-arguments]
The arguments accepted are: Table 10.4. Kiosk Session Arguments for VMware View Connector Argument -s server -https -http -p port-number -t seconds Description VMware View Connection Server hostname. Use SSL connection to VMware View Connection Server (default). Do not use SSL connection to VMware View Connection Server. VMware View Connection Server port number. If no smart card is used, the length of inactivity before the user is automatically logged out of the desktop selection dialog. Default value is 3 minutes. Users are automatically forwarded to their desktop if there is only one desktop. This flag disables this behavior. This domain name will be preselected in the login screen, if available. Specify any valid uttsc arguments. For detailed information on these options, refer to the uttsc man page.
Note The Sun Ray Software is capable of supporting Windows Network Level Authentication (NLA), but VMware View does not support NLA on non-Windows based View clients. You must use the standard RDP authentication with VMware View. To configure RDP authentication, enable RDP authentication on the guest OS and add the -N off option to the uttsc arguments field. 6. Configure the server to use Kiosk Mode for card and non-card users.
120
How to Configure a Kiosk Mode Session Type for the VMware View Connector
a. Click the System Policy sub-tab on the Advanced menu. b. Enable Kiosk Mode for both card and non-card users. 7. Click Save. All new or restarted sessions matching the policy configuration to use kiosk mode will access the new session type.
121
122
123
Security Modes
users might misuse. To avoid this type of attack, Sun Ray Software administrators can enable traffic encryption through the ARCFOUR encryption algorithm. The ARCFOUR encryption algorithm, selected for its speed and relatively low CPU overhead, supports a higher level (128-bit) of security between Sun Ray services and clients. However, encryption alone does not provide complete security. Spoofing a Sun Ray server or a Sun Ray Client and posing as either is still possible, if not necessarily easy. Here are some examples: A man-in-the-middle attack, in which an impostor claims to be the Sun Ray server for the clients and pretends to be the client for the server. The imposter then intercepts all messages and has access to all secure data. Manipulating a client to pretend to be another client in order to gain access to sessions connected to the spoofed client. Server and client authentication provided by Sun Ray Software can resolve these types of attacks. Server authentication uses a single pre-configured, public-private key pair in the Sun Ray Software and firmware, and client authentication uses an automatically generated public-private key pair in every client. Sun Ray Software uses the Digital Signature Algorithm (DSA) to verify that clients are communicating with a valid Sun Ray server and that the server is communicating with a legitimate client. This authentication scheme is not completely foolproof, but it mitigates trivial man-in-the-middle attacks and makes spoofing Sun Ray servers or Sun Ray Clients harder for attackers. Enabling encryption and authentication is optional. The system or network administrator can configure it based on site requirements. By default only client authentication is enabled.
124
Table 11.1. Security Modes Situation Encryption - The Sun Ray Client does not support encryption or server authentication because of old firmware. Hard Security Mode Sun Ray server denies the session. Soft Security Mode Sun Ray server grants the client a nonsecure session. The user must then decide whether to continue using a nonsecure session. Sun Ray server grants the client a nonsecure session. Sun Ray server denies the session.
Client Authentication - The Sun Ray Client Sun Ray server does not support client authentication denies the because of old firmware. session. Client Authentication - The client supports Sun Ray server authentication, but the authentication fails. denies the session.
Key Fingerprint
You can select a stricter policy that requires authenticated client identities and denies access to any client whose key is not verified and confirmed by using the utpolicy command or the Admin GUI. If you choose to use this policy, you must explicitly mark the key for every new client as 'confirmed' before the client can be used. To use this policy to full effect, you should also set the client authentication mode to 'hard' in the security configuration. You can use the utkeyadm command to manage client identities and their associated keys. All keys that are used for a client are listed by the key management tools. With the utkeyadm command, you can perform the following actions: List keys associated to known clients and their status Confirm a client key after verifying its authenticity. If multiple unconfirmed keys are stored for a client, all other keys are deleted when one is confirmed as authentic. Delete invalid or stale key entries Export key data for all or selected client identities for backup and for transfer to other Sun Ray server instances Import key data that has been exported on this or another Sun Ray server instance You can also view, confirm, or delete associated keys for a client through the client's Desktop Properties page in the Admin GUI.
126
The State column displays the encrypted/authenticated state of the session, as shown in Table 11.2, utsession State Descriptions Table 11.2. utsession State Descriptions State Column Value E A C U X Description Encrypted session Server is authenticated Authenticated client with confirmed identity, including software clients with automatically confirmed keys Authenticated clients with unconfirmed identity. Such connections might not have regular session access if the current policy requires a confirmed identity. Clients that have successfully authenticated with an unconfirmed key, but that key is in conflict with other equally unconfirmed keys that have been used with the same client ID. Clients that have a conflicting key will not be granted session access and you need to confirm one of the known keys as authentic in order to admit the affected clients again.
For more information, see the utsession man page. Note A multihead group might have clients at different firmware levels. The utsession output shows the lowest security level across the set of all clients participating in the multihead group. For example, if at least one of the clients does not support encryption or authentication, the session will be marked as not encrypted or not authenticated.
Command-Line Steps
# 1 # 1 utkeyadm -a -c IEEE802.000000ee0d6b key confirmed . utkeyadm -a -c IEEE802.00000f85f52f -k 1c:d4:b9:31:9d:f0:00:ba:db:ad:65:6c:8e:80:4d:b3 key confirmed .
127
For example:
# utkeyadm -l -H CID TYPE KEY-FINGERPRINT STATUS IEEE802.00000adc1a7a DSA* 4f:98:25:60:3b:fe:00:ba:db:ad:56:32:c3:e2:8b:3e IEEE802.00000f85f52f DSA* 1c:d4:b9:31:9d:f0:00:ba:db:ad:65:6c:8e:80:4d:b3 IEEE802.00000f85f52f DSA* 4f:98:25:60:3b:fe:00:ba:db:ad:56:32:c3:e2:8b:3e IEEE802.00000fe4d445 DSA* 13:d0:d4:47:aa:7f:00:ba:db:ad:26:3a:17:25:11:24 IEEE802.000000ee0d6b DSA* d0:d7:d0:57:12:18:00:ba:db:ad:b7:0f:5a:c0:8b:13
Using the previous example, the unconfirmed client keys for IEEE802.00000fe4d445 and IEEE802.000000ee0d6b are confirmed.
11.7.3. How to Display a Client's Fingerprint Key from a Sun Ray Client
To display the key fingerprint for a client, press the Stop-K key combination on a Sun keyboard or CtrlPause-K on a non-Sun or PC keyboard. If the key panel does not display, the client might have old firmware installed that doesn't support client authentication. If the message No key available is displayed, the client still has preinstalled MfgPkg firmware or a bug exists.
For example:
128
# utkeyadm -l -H CID TYPE KEY-FINGERPRINT STATUS IEEE802.00000adc1a7a DSA* 4f:98:25:60:3b:fe:00:ba:db:ad:56:32:c3:e2:8b:3e IEEE802.00000f85f52f DSA* 1c:d4:b9:31:9d:f0:00:ba:db:ad:65:6c:8e:80:4d:b3 IEEE802.00000f85f52f DSA* 4f:98:25:60:3b:fe:00:ba:db:ad:56:32:c3:e2:8b:3e IEEE802.00000fe4d445 DSA* 13:d0:d4:47:aa:7f:00:ba:db:ad:26:3a:17:25:11:24 IEEE802.000000ee0d6b DSA* d0:d7:d0:57:12:18:00:ba:db:ad:b7:0f:5a:c0:8b:13
Command-Line Steps
Use the utkeyadm command.
# utkeyadm [-l|-L] -c cid -H
where cid is the desktop ID of the client and -L displays additional auditing information.
Example
The following example displays all keys for the IEEE802.0003ba0d93af client with additional auditing information.
# utkeyadm -L -c IEEE802.0003ba0d93af -H CID TYPE KEY-FINGERPRINT STATUS CREATED CONFIRMED CONFIRMED BY IEEE802.0003ba0d93af DSA* 4f:98:25:60:3b:fe:d6:f8:fb:38:56:32:c3:e2:8b:3e unconfirmed 2009-06-01 05:08:50 UTC -
where cid is the desktop ID of the desktop to which the key belongs and key-id is the key fingerprint. For example:
# utkeyadm -d -c IEEE802.00000f85f52f -k 1c:d4:b9:31:9d:f0:00:ba:db:ad:65:6c:8e:80:4d:b3 1 key deleted .
129
where cid is the desktop id of the desktop to which the keys belong. For example:
# utkeyadm -d -c IEEE802.00000f85f52f 2 keys deleted.
Command-Line Steps
Use the following command to disable client authentication:
# utcrypto -a auth_up_type=none
Use -m instead of -a if a non-default security policy already exists. To enable client authentication, set the auth_up_type value to default.
Command-Line Steps
Use the following command to force client authentication.
130
Command-Line Steps
1. View the current policies:
# utpolicy Current Policy: -a -g -z both -k pseudo -u pseudo
131
Error Messages
/var/log (Oracle Linux only) Configuration logs: /var/adm/log (Oracle Solaris only) /var/log/SUNWut (Oracle Linux only) General log files: /var/opt/SUNWut/log /var/opt/SUNWut/srds/log /var/opt/SUNWut/srds/replog Messages logged into /var/opt/SUNWut/log/messages are delivered through the syslog service described in the syslogd man page. The general format of these messages is:
timestamp thread_name message_class message
For example:
May 7 15:01:57 e47c utauthd: [ID 293833 user.info] Worker3 NOTICE: SESSION_OK pseudo.080020f8a5ee
Message components are defined as follows: timestamp format: year.month.day hours:minutes:seconds thread_name: Worker# - Handles client authentication, access control, and session monitoring. Messages with the same thread name are related. The exception occurs when a Worker# thread disconnects a client and then purges the connection information from memory. After a Worker# DESTROY message, the next use of that Worker# thread name has no relation to previous uses of the thread name. In other words, thread names are reused. SessionManager# - Communicates with utsessiondon on behalf of a Worker# thread. AdminJobQ - Used in the implementation to wrap a library that would not otherwise be thread-safe. CallBack# - Communicates with applications such as utload. WatchID - Used to poll data or terminals from connections Terminator - Cleans up terminal sessions Group Manager - Main group manager thread message_class: CLIENT_ERROR - Indicates unexpected behavior from a client. These messages can be generated during normal operation if a client is rebooted. CONFIG_ERROR - Indicates a system configuration error. The Authentication Manager exits after this error is detected. NOTICE - Indicates a normal event.
132
Error Messages
UNEXPECTED - Logs events or conditions that were not anticipated for normal operation but are not fatal. DEBUG - Occurs only if explicitly enabled and is used by the development team. Debug messages can reveal session IDs, which must be kept secret to ensure proper security. Table 11.3. Server and Client Authentication Error Message Examples Error class CLIENT_ERROR Message ...Exception ... : cannot send keepAliveInf ...keepAlive timeout duplicate key: invalid key: CONFIG_ERROR attempt to instantiate CallBack 2nd time. AuthModule.load Cannot find module NOTICE Description Error encountered while attempting to send a keepalive message to a client. A client has failed to respond within the allotted time. The session is being disconnected. Client does not properly implement the authentication protocol. Client does not properly implement the authentication protocol. Program error. Problem encountered while loading configuration module. Program or installation error.
"discarding response: " + param No controlling application is present to receive client response. "NOT_CLAIMED PARAMETERS: " + param ...authentication module(s) loaded. ...DISCONNECT ... A token was not claimed by any authentication module. Notification that authentication modules have loaded. Normal notification of disconnection.
UNEXPECTED
"CallBack: malformed command" Bad syntax from a user application such as utload or utidle. .../ ... read/0:" + ie .../ ... read/1: ... Exception ... .../... protocolError: ... Possible program error. Error encountered while reading messages from the client. Various protocol violations are reported with this message. This error condition is also a way for utauthd to force the client to reset.
133
134
12.1. Multi-Monitor
This section describes the multi-monitor support for the Sun Ray 2FS and Sun Ray 3 Plus Clients with dual video connectors. Figure 12.1, Multi-monitor Example shows a Sun Ray 3 Plus Client using the multimonitor feature and the Windows connector. Figure 12.1. Multi-monitor Example
135
The multi-monitor support is provided by the X Resize, Rotate, and Reflect (RandR) 1.2 extension, which provides a way to use the multiple monitors as one screen. Features include: Configuration changes can be applied dynamically to a session. Application windows are aware of monitor boundaries to avoid placement issues. No size restrictions. Hotdesking is supported to other clients with different monitor resolutions, whether they are smaller or larger. RandR 1.2 support is provided with the default Xserver, Xnewt, which is automatically installed and configured with the Sun Ray Software. The optimal multi-monitor configuration is applied automatically when a Sun Ray Client sessions starts, unless the utxconfig -r command is used to set the DIMENSIONS parameter. In that case, the utxconfig value will be used to size the screen. The utscreenresize -s all command is available to automatically set a client's multi-monitor configuration using the optimal resolutions. To specifically set a client's multi-monitor configuration, you must use the xrandr command. Note The gnome-display-properties GUI monitor configuration tool should not be used on Oracle Solaris or Oracle Linux. Using this tool may adversely affect the client's RandR 1.2 configuration.
process. The /opt/SUNWut/bin/xrandr command provides the required functionality for the Sun Ray Software environment. Issuing the xrandr command without any options shows a client's current multi-monitor configuration. For example, here is the xrandr output for a session created on a client with one monitor displaying at 1280x1024 resolution:
(use /opt/SUNWut/bin/xrandr on Oracle Linux) % xrandr Screen 0: minimum 640 x 480, current 1280 x 1024, maximum 10240 x 10240 DVI1 connected 1280x1024+0+0 (normal left inverted right) 361mm x 288mm 1280x1024 0.0*+ 3840x2400 0.0 3200x2400 0.0 2560x2048 0.0 2560x1600 0.0 2560x1440 0.0 2048x1536 0.0 2048x1152 0.0 1920x1200 0.0 1920x1080 0.0 1680x1050 0.0 1600x1200 0.0 1600x1024 0.0 1600x900 0.0 1440x900 0.0 1400x1050 0.0 1368x768 0.0 1280x960 0.0 1280x800 0.0 1280x720 0.0 1152x900 0.0 1024x768 0.0 800x600 0.0 640x480 0.0
In this output, the Screen line provides the current overall screen resolution (1280x1024) and the available maximum resolution (10240x10240). There is a single Output named DVI1 that shows a 1280x1024 monitor connected to the client's DVI port (or the first DVI port on a dual-DVI client). All dimensions available for this Output are listed, although many of them may not be possible on this particular monitor. The current mode is indicated by a '*' and the optimal mode indicated with a '+'. After hotdesking to a dual-monitor client, the client's Screen configuration does not change, but the RandR information is updated to reflect optimal modes. For example, hotdesking to a client with 1600x1200 and 1920x1200 monitors would show the following xrandr output:
(use /opt/SUNWut/bin/xrandr on Oracle Linux) % xrandr Screen 0: minimum 640 x 480, current 1280 x 1024, maximum 10240 x 10240 DVI1 connected 1280x1024+0+0 (normal left inverted right) 451mm x 338mm 1600x1200 0.0 + 3840x2400 0.0 3200x2400 0.0 2560x2048 0.0 2560x1600 0.0 2560x1440 0.0 2048x1536 0.0 2048x1152 0.0 1920x1200 0.0 1920x1080 0.0 1680x1050 0.0 1600x1024 0.0 1600x900 0.0 1440x900 0.0
137
1400x1050 0.0 1368x768 0.0 1280x1024 0.0* 1280x960 0.0 1280x800 0.0 1280x720 0.0 1152x900 0.0 1024x768 0.0 800x600 0.0 640x480 0.0 DVI2 connected (normal left inverted right) 1920x1200 0.0 + 3840x2400 0.0 3200x2400 0.0 2560x2048 0.0 2560x1600 0.0 2560x1440 0.0 2048x1536 0.0 2048x1152 0.0 1920x1080 0.0 1680x1050 0.0 1600x1200 0.0 1600x1024 0.0 1600x900 0.0 1440x900 0.0 1400x1050 0.0 1368x768 0.0 1280x1024 0.0 1280x960 0.0 1280x800 0.0 1280x720 0.0 1152x900 0.0 1024x768 0.0 800x600 0.0 640x480 0.0
For this new client, two Outputs are listed, DVI1 and DVI2. Although DVI2 is "connected," it is not configured with a current mode. Both Outputs have their optimal modes indicated with a '+', but DVI1 still has 1280x1024 as its current mode. The best way to reconfigure this Screen with the optimal modes for both DVI1 and DVI2 would be to use the utscreenresize command described in the previous section. However, if you wanted to select specific resolutions for each monitor, you would need to use the --output option of the xrandr command. For example, if you wanted both monitors to use 1600x1200, you would issue the following xrandr command:
(use /opt/SUNWut/bin/xrandr on Oracle Linux) % xrandr --output DVI1 --mode 1600x1200 --output DVI2 --mode 1600x1200 --right-of DVI1
Here is the new multi-monitor configuration, with both DVI1 and DVI2 at 1600x1200 resolution and DVI2 starting at 1600,0 on the screen:
(use /opt/SUNWut/bin/xrandr on Oracle Linux) % xrandr Screen 0: minimum 640 x 480, current 3200 x 1200, maximum 10240 x 10240 DVI1 connected 1600x1200+0+0 (normal left inverted right) 451mm x 338mm 1600x1200 0.0*+ 3840x2400 0.0 3200x2400 0.0 2560x2048 0.0 2560x1600 0.0 2560x1440 0.0 2048x1536 0.0 2048x1152 0.0 1920x1200 0.0
138
Multihead Groups
1920x1080 0.0 1680x1050 0.0 1600x1024 0.0 1600x900 0.0 1440x900 0.0 1400x1050 0.0 1368x768 0.0 1280x1024 0.0 1280x960 0.0 1280x800 0.0 1280x720 0.0 1152x900 0.0 1024x768 0.0 800x600 0.0 640x480 0.0 DVI2 connected 1920x1200+1600+0 (normal left inverted right) 541mm x 338mm 1920x1200 0.0 + 3840x2400 0.0 3200x2400 0.0 2560x2048 0.0 2560x1600 0.0 2560x1440 0.0 2048x1536 0.0 2048x1152 0.0 1920x1080 0.0 1680x1050 0.0 1600x1200 0.0* 1600x1024 0.0 1600x900 0.0 1440x900 0.0 1400x1050 0.0 1368x768 0.0 1280x1024 0.0 1280x960 0.0 1280x800 0.0 1280x720 0.0 1152x900 0.0 1024x768 0.0 800x600 0.0 640x480 0.0
Note that 1920x1200 is still marked as "optimal" for DVI2, but it is currently using 1600x1200.
139
If you hotdesk from a multihead group to a Sun Ray Client that is not part of a multihead group, you can still view all the screens created in the original multihead group on the single screen by panning to each screen in turn. This action is called screen flipping.
140
2. On the initial screen, click Create New Group. Figure 12.3. utmhconfig Home Screen
The Create New Multiheaded Group dialog box is displayed. The number of rows and the number of columns you provide are displayed as the group geometry when the group is created. 3. Follow the instructions in the wizard to complete the procedure. The main step in the wizard is to select the clients within the multihead group and insert a smart card in each Sun Ray Client in turn to establish the order of the group. 4. Click the Finish button. 5. Exit the session or disconnect by removing your card. 6. Enable the Multihead policy. See Section 12.2.5, How to Enable the Multihead Group Policy for more details.
141
# /opt/SUNWut/sbin/utstart
Note Issue the utstart command on every server in the failover group.
For example:
% utxconfig -r 1280x1024
142
3. Log off the session and log back in for the changes to take effect.
3. Log off the session and log back in for the changes to take effect.
If users are currently logged in, they need to log off the session and log back in for the changes to take effect. 143
144
145
Steps
1. Become superuser on the Sun Ray server. 2. Create the /tftpboot directory on the Sun Ray server if it does not exist already.
# mkdir /tftpboot
3. Create the template for the .parms file. This template is a text file with key/value pairs, and it can be located anywhere on your file system. It is common practice to store it in the /tftpboot directory. In this example, the file is named srsconfig, and it resides in the /tftpboot directory.
# vi /tftpboot/srconfig
See Table 13.1, Sun Ray Client Configuration Parameters (.parms) for the list of key/value pairs that you can add to the .parms file. 4. Use the utfwadm command to update the .parms files. The utfwadm command automatically uses the latest firmware installed on the Sun Ray server. Again, the following example uses /tftpboot/srsconfig for the template file location.
# /opt/SUNWut/sbin/utfwadm -AaV -i /tftpboot/srconfig
Table 13.1, Sun Ray Client Configuration Parameters (.parms) lists the key/value pairs. Additional key/value pairs included in the .parms files are in key=value format, with case sensitivity and no spaces allowed. Options that take values of 0 or 1 have a default value of 0 if not specified. The following table lists the options that are allowed. For details on the options that can be used to configure the .parms files, see the utfwadm man page. Table 13.1. Sun Ray Client Configuration Parameters (.parms) Key bandwidth=bits_per_second cmdcashsize=size Description Sets the maximum bandwidth limit used by the Sun Ray Client, in bits per second. Sets the command cache used to store the list of recent commands, in Kbytes. Default value is 512 Kbytes, maximum value is 8192 Kbytes, and a zero value disables the command cache. When set to 1, forces compression on. Default is 1 (compression on).
compress=[0 | 1]
146
Key fastload=[0 | 1]
Description When set to 1, forces the maximum TFTP transfer size if the TFTP server supports it. The default is 512-byte packets. Over a high latency connection, using this setting typically doubles the speed of firmware downloads. When set to 1, forces full duplex setting.
fulldup=[0 | 1]
enablegui=[force | none | hashed-passwd | prompt Enables or disables the Configuration GUI. | off] These keywords should be changed only with the utfwadm -G or utfwadm -g command, disablegui=[force | none | hashed-passwd | prompt respectively. See Chapter 14, Sun Ray Client | off] Firmware for details. kbcountry=code Forces the keyboard country code number (keyboard map) for a non-U.S. USB keyboard that reports a country code value of 0. This value can also be set on the Advanced menu of the Configuration GUI. See Section 13.18, Keyboard Country Codes for the list of code numbers. LogXXX= Sets the logging level for various classes of logging events, where XXX is one of Appl, Vid, USB, Net, or Kern. Valid values are 1 through 7, with 7 providing the most detailed logging output. A separate entry must be specified for each type. The logging information is saved in the /var/opt/ SUNWut/log/messages file on the LogHost. When using a shared network (LAN) with external DHCP server support (configured network using utadm -L on), logging for each event type is disabled unless the LogXXX value and the LogHost value are set. LogHost= The Sun Ray server where logging output is saved when one or more LogXXX entries are specified. Valid value is a resolvable DSN host name or an IP address of a Sun Ray server. When using a failover group, the primary Sun Ray server should be specified. When set to 1, does not permit lossy compression to be used. Sets the network MTU. The value used is the minimum of those supplied from various sources. Sets how much time a Sun Ray 3 Series Client will be idle before it turns off. The default power off time is 30 minutes. Setting poweroff=0 disables the power off feature. When the power off feature is enabled, the firmware enforces a minimum power off value of 10 minutes and a maximum power off
147
Key
Description value of 30 days. The value for the power off feature is in minutes. For example, poweroff=15 sets the idle power off timer to 15 minutes.
select=
Permissible values are inorder or random. Selects a server from the server list either starting at the beginning or at random, respectively. Specifies a comma-separated mixture of host names or IP addresses indicating the available session servers. Specifies an alternative combination of modifier keys to perform the same function as the Stop key on the Sun keyboard or the Ctrl-Pause key sequence. By default, this alternative combination is Ctrl-Shift-Alt-Meta. See Section 13.2, Sun Ray Client Hot Keys for details. The value of keyn can be any combination of the Ctrl-Shift-Alt-Meta keys, but at least two of the keys must be used. For example, you can set this value to Ctrl-Alt or Meta-Ctrl-Shift. If this parameter is set to none, the alternative key combination is disabled. Note that the Meta key has different names on different keyboards: on a PC keyboard, it is the "Windows" key, and on a Mac keyboard, it is the "Command" key.
servers=
stopkeys=[keyn[-keyn]* | none]
stopqon=[0 | 1]
When set to 1, enables the Stop-Q key sequence to be used to disconnect a Sun Ray Client from a server, in particular, if it's using a VPN connection. When set to 1, disables the ability to use the utload program to force a Sun Ray Client to load firmware. When set to 1, disables the input source on the front of a Sun Ray 270 Client, and it locks the monitor into displaying only the client output.
utloadoff=[0 | 1] videoindisable=[0 | 1]
148
By default,the alternative prefix key combinations are Ctrl-Pause and Ctrl-Shift-Alt-Meta. The Ctrl-Pause key sequence is used throughout this documentation. The Ctrl-Shift-Alt-Meta key combination can be changed through the Advanced menu of the Configuration GUI (Enter Alternative STOP modifiers) or the stopkeys keyword in the .parms file. It can be set to any combination of the four keys, but at least two must be used. Note The Meta key has different names on different keyboards: on a PC keyboard, it is the "Windows" key, and on a Mac keyboard, it is the "Command" key. Table 13.2. Sun Ray Client Hot Keys Oracle-specific Hot Key Mute Softer Louder Non-Oracle Hot Key Ctrl-Pause-CursorDown Ctrl-Pause-CursorLeft Ctrl-Pause-CursorRight Action Mute and unmute audio. Decreases the audio volume. Increases the audio volume. Displays the Sun Ray Client's MAC and IP addresses and server IP address. Power cycles the Sun Ray Client. On an Oracle keyboard, the Power key has a crescent moon glyph and is positioned at the top right corner of the keyboard. Clears any local configuration data on the Sun Ray Client. Enables or disables the On-Screen Display (OSD) troubleshooting icons when a Sun Ray Client boots. Opens the Configuration GUI to modify how to initialize the client. The Configuration GUI must be enabled on the client. Displays the Sun Ray Client's model, MAC address, and firmware version. Terminates a session. This hot key cannot be reconfigured to another value, but it can be disabled. For details, see the utxconfig man page. Terminates the process that has taken control of the X server.
Stop-V Ctrl-Alt-Bksp-Bksp
Ctrl-Alt-Del-Del
Ctrl-Alt-Del-Del
There are also hot keys used to launch the utsettings or utdetach Sun Ray utilities. You can configure these hot key sequences through your $HOME/.utslaunch.properties file, or they can be set by the administrator per a site-wide basis. See Section 13.2.1, How to Configure the Utility Hot Keys for details.
149
User default setting System-wide mandatory setting To support these levels of customization, the Sun Ray Client at session startup examines the following property files in the order shown in Table 13.3, Sun Ray Settings Property Files. Table 13.3. Sun Ray Settings Property Files File /etc/opt/SUNWut/ utslaunch_defaults.properties Scope System Description This file contains the default properties. Any properties specified override any defaults built into the application itself. This file contains the user's preferred values, which override any application or system-wide defaults. This file contains system-wide mandatory settings that cannot be overridden by the user. These properties override any application, system-wide, or user defaults.
$HOME/.utslaunch.properties
User
/etc/opt/SUNWut/ utslaunch_mandatory.properties
System
If your policy is for all users to use the same standard hot key, modify the system-wide mandatory defaults file to specify this standard key. This setting prevents users from specifying their own hot key preferences. The format of the hot key entry in these property files is utility_name.hotkey=value, where utility_name_is the name of the utility (currently either utsettings or utdetach) and value is a valid X keysym name preceded by one or more of the supported modifiers (Ctrl, Shift, Alt, Meta) in any order. Default values are shown in Table 13.4, Defaults for Configurable Hot Key Values. Table 13.4. Defaults for Configurable Hot Key Values Configuration Property Name utsettings.hotkey utdetach.hotkey Default Hot Key Action Shift-Props Shift-Pause Invokes the Sun Ray Settings GUI. Detaches the session from this Sun Ray Client. (Often used to to detach a non-smart card mobility session.)
13.2.1.1. How to Change Utility Hot Key Settings for All Users
If you don't want your users to use the default hot keys to launch the utilities, you can set up the systemwide defaults file to specify different hot keys. Users can still specify their preferences in the user defaults file. 1. As superuser, open the /etc/opt/SUNWut/utslaunch_defaults.properties file in a text editor. Note If you want to make the change mandatory for all users even if they have user defaults set, change the value in the /etc/opt/SUNWut/ utslaunch_mandatory.properties file.
150
How to Change Sun Ray Client Audio and Display Settings (Sun Ray Settings GUI)
2. Locate the original hot key entry for the utility you want to change and place a # in front of it to comment it out. For example:
# utdetach.hotkey=Shift Pause
3. Type the new hot key property after the first statement. For example:
utdetach.hotkey=Alt F9
4. Save the utslaunch_defaults.properties file. 5. Log out and log back in to enable the new hot key.
13.2.1.2. How to Change the Utility Hot Key Settings for a Single User
A user's hot key settings override any system-wide default settings, unless they are mandatory. 1. In the user's home directory, create the .utslaunch.properties file. Note Make sure that the user owns and can read this file. 2. Add a line to the .utslaunch.properties file with the value for the hot key. For example:
utsettings.hotkey=Shift F8
3. Save the .utslaunch.properties file. 4. Log out and log back in to enable the new hot key.
13.3. How to Change Sun Ray Client Audio and Display Settings (Sun Ray Settings GUI)
The Sun Ray Settings GUI enables you to view and change the audio and display settings for a Sun Ray Client that you are currently logged into. The utset command provides a non-GUI mechanism for reporting and modifying Sun Ray Client settings. For details, refer to the utset man page. 1. Press the Settings hot key or run the utsettings command. The default Settings hot key combination is Shift-Props, but this assignment can be reconfigured as described in Section 13.2.1, How to Configure the Utility Hot Keys. The Sun Ray Settings GUI is displayed, as shown in Figure 13.1, Sun Ray Settings GUI.
151
2. Use the Category menu to view the Audio Output, Audio Input, Display, or Video settings panels. 3. To change a setting, move the appropriate scroll bar, checkbox, or pull-down menu. Changes to the monitor signal timing through the Resolution/Refresh Rate setting require confirmation before and after the change is applied to the client. All other changes take effect immediately. 4. Dismiss the Sun Ray Settings GUI. If the window was launched by the Settings hot key, press the hot key again or apply the window manager's close action to that window. If the window was launched by invoking utsettings directly, apply the window manager's close action to that window.
Sun Ray servers within the current server group that are available to the client are displayed.
152
Command-Line Steps
1. Become superuser on the Sun Ray server. 2. Display all the available clients.
# utdesktop -l
Command-Line Steps
1. Become superuser on the Sun Ray server. 2. Display information about a client.
# utdesktop -p clientID
where clientID is is a Sun Ray Client's MAC address. You can use the utdesktop -l command to list all the Sun Ray Clients and their client IDs.
153
To display information about a group of Sun Ray Clients, select an option from the drop-down menu (All Connected Desktop Units, Token Readers, or Multihead Groups) and/or enter a search string in the text field to narrow your search.
The selections in the window are sorted in order of the most current to least current active sessions for the token ID. As shown in Figure 13.2, Server Selection (utselect) GUI, the Server column lists the servers accessible from the Sun Ray Client. The Session column reports the DISPLAY variable X session number on the server if one exists. In the Status column, Up indicates that the server is available. The first server in the list is selected by default. Select a server from the list or type the name of a server in the Enter server field. If a server without an existing session is selected, a new session is created on that server. Figure 13.2. Server Selection (utselect) GUI
154
where host is the host name or IP address of the Sun Ray server to which the selected client is redirected.
Press Shift-Pause. To change the disconnect hot key combination, see Section 13.2, Sun Ray Client Hot Keys. Note The hot key combination does not work with a full-screen Windows session. Connect to your session through another client, either by inserting your smart card and authenticating to RHA or by logging in through NSCM.
155
Note You can use the -A option to supersede all user configured and system default settings.
156
To Disable Power Saving Mode... Then... Here are some examples: Use the xset s noblank;xset s 0 0;xset s off command. For Oracle Solaris, make sure that xscreensaver (JDS) or dtsession (CDE) is disabled or configured to not blank or lock the screen. If active, xscreensaver overrides any settings you have made using the xset command. See the xscreensaver(1) man page for details. For Oracle Linux, make sure that gnome-screensaver is disabled or configured to not blank or lock the screen. See the gnome-screensavercommand(1) man page for details. From the Sun Ray Client level, Set the Advanced->Video->Blanking parameter to 0 in the Configuration GUI, if enabled. For more details, see Section 14.5, How to Modify a Sun Ray Client's Local Configuration (Configuration GUI).
13.12.1. How to Disable Screen Blanking for All Sun Ray Sessions
The following procedure describes how to disable screen blanking for all Sun Ray sessions. Note This configuration works for all kiosk sessions, but it does not work for sessions using the Gnome Display Manager through a regular session mode. 1. Become superuser on the Sun Ray server. 2. Change directory to the session initialization directory. Oracle Solaris:
# cd /usr/dt/config/Xsession.d
Oracle Linux:
# cd /etc/X11/xinit/xinitrc.d
3. Create the following customized script (the script is called 0050.utblank.sh in this procedure).
#!/bin/sh # This script disables the X Server from blanking # For both Oracle Solaris and Oracle Linux # Check for OS and add the path to xset for Oracle Solaris TheOS=`uname` if [ "$TheOS" = "SunOS" ];then PATH=$PATH:/usr/openwin/bin;export PATH fi # Disable the Xserver from screen blanking xset s noblank;xset s 0 0;xset s off
Note The script name should have the 0050. prefix to make sure it is run at the appropriate time.
157
Note For Oracle Linux, the script name must have the .sh extension, otherwise the script will not get sourced. 4. Save the script and make the script executable for everyone.
# chmod 775 0050.utblank.sh
13.14. How to Enable the NumLock Key for All Sun Ray Sessions
The utkeylock command can modify the state of certain locking modifier keys on a user's keyboard. Currently, only the NumLock key is supported. This command may be useful to invoke during session creation to enable NumLock for users who expect NumLock to be on by default, which is typical for Windows PCs. By default, the NumLock key is disabled on a Sun Ray Client. Note This configuration works for all kiosk sessions, but it does not work for sessions using the Gnome Display Manager through a regular session mode. The following procedure describes how to enable the NumLock key for all Sun Ray sessions.
158
1. Become superuser on the Sun Ray server. 2. Change directory to the session initialization directory. Oracle Solaris:
# cd /usr/dt/config/Xsession.d
Oracle Linux:
# cd /etc/X11/xinit/xinitrc.d
3. Create one of the following customized scripts based on the result you want (the script is called 0050.utnumlock.sh in this procedure). Enable the NumLock key when a session initializes.
#!/bin/sh # Enable NumLock key for each session /opt/SUNWut/bin/utkeylock -n on
Enable the NumLock key when a session initializes and on all subsequent connections through hotdesking.
#!/bin/sh # Enable NumLock key on and make sure it stays on each time a user hotdesks /opt/SUNWut/bin/utaction -i -c "/opt/SUNWut/bin/utkeylock -n on" &
Note The script name should have the 0050. prefix to make sure it is run at the appropriate time. Note For Oracle Linux, the script name must have the .sh extension, otherwise the script will not get sourced. 4. Save the script and make the script executable for everyone.
# chmod 775 0050.utnumlock.sh
159
# /opt/SUNWut/sbin/utsession -k -t token
13.17. How to Limit Administrative Privileges for Non-root Users (Oracle Linux)
Many Oracle Linux systems come configured with liberal administrative privileges for non-root users. These privileges should not be made available to users who log in using a Sun Ray Client. To limit administrative access, do the following: Review the man pages for pam_console, console.perms, and console.apps. Edit the /etc/security/console.perms file to remove display numbers from the definition of console. If a definition exists for xconsole, it should be removed. For example, a line that reads:
<console>=tty[0-9][0-9]* vc/[0-9][0-9]* :[0-9]?[0-9] :[0-9]
160
10 Greek 12 Hungarian 14 Italy 15 Japan 16 Korea 17 Latin-American 18 Netherland 19 Norway 21 Polish 22 Portugal 23 Russia 24 Slovakian 25 Spain 26 Sweden 27 Switzerland 28 Switzerland_Ge 30 Taiwan 31 TurkeyQ 32 UK-English 33 US-English 35 TurkeyF
161
b. If netType is STATIC IP, use locally configured values for IP Address Net mask Broadcast address Router MTU 3. Bring up the network interface. a. If any networking values missing, then perform DHCP. b. If AuthSrvr value is not defined, then perform DHCP_INFORM request. c. Merge any local values, DHCP vendor options, and DHCP_INFORM values (local values override DHCP except MTU, which is minimum of values seen). d. If XDispMgr was given by DHCP AND no AltAuth vendor option was found, then set AltAuth to XDispMgr (option 49) values. 4. Read Configuration Parameter file (model.parms file) on firmware server. a. Try to find the firmware servers that contain .parms file, in order: i. Locally configured value
ii. DHCP vendor option (FWSrvr) iii. Option 66 (TftpSrvr) IP Address or DNS name iv. DNS lookup of "sunray-config-servers" (if mapped to multiple addresses, choose one randomly) b. Download the .parms file. i. Search for SunRayPx.MAC.parms.
ii. Search for SunRayPx.parms. c. Parse the .parms file. parms.version = firmware version parms.revision = max supported hardware revision parms.barrier = barrier value of server firmware parms.BarrierLevel = barrier override value parms.servers = server list parms.select = inorder | random d. If .parms file was successfully parsed OR firmware server was obtained by locally configured value, then go to Step 5.
162
Note If a locally configured firmware server is unreachable or the correct configuration parameter file does not exist, the Sun Ray client will not attempt any of the other methods in Step 4 to locate configuration parameter files. This setup prevents the unintentional loading of a different firmware version than is provided by the locally designated firmware server. e. If no .parms file found AND not at end of firmware server list, then go to Step 4 and pick next firmware server on the list. f. If no firmware servers left to try, then set following values: parms.version = DHCP vendor option NewTVer (set to NULL string if none provided by DHCP) parms.BarrierLevel = DHCP BarrierLevel (set to current_barrier if none provided by DHCP) set parms.revision to current_revision set parms.barrier to current_barrier set parms.select = inorder 5. Determine if there is new firmware to load. If: parms.version is not equal to the current firmware version AND parms.version is not equal to "_NONE_" AND parms.revision is >= to current hardware revision AND either parms.barrier is >= to parms.BarrierLevel or parms.barrier is >= current firmware's barrier level Then: a. Download firmware. b. Write firmware to flash. c. Reboot. Else: No firmware is loaded. 6. Determine a Sun Ray server to connect to. a. If AlthAuth/AuthSrvr/parms.servers are all empty, then set server_list to "sunray-servers". Otherwise set server_list to parms.servers. b. If untried server_list addresses are left, then: i. Select a name in order (or randomly if parms.select=random).
163
ii. Translate the name to a list of IP addresses (either DNS lookup, or IP address notation). iii. Select an address from the list in order (or randomly if parms.select=random). iv. Set that the broadcast address was seen if the selected address is the broadcast address, and select the next address. v. Go to Step 6h. c. If untried AltAuth addresses are left, then: i. Select an address in order (or randomly if parms.select=random).
ii. Set that the broadcast address was seen if the selected address is the broadcast address, and select the next address iii. Go to Step 6h. d. If AuthSrvr is defined, then: i. Set address to AuthSrvr.
ii. Go to Step 6h. e. If broadcast address was seen, then perform broadcast protocol. f. If broadcast response received, then: i. Set selected address to responder.
ii. Go to Step 6h. g. Timeout in 30 seconds and reboot. h. Try to connect to selected address. i. If connection fails, then go to Step 6b.
164
and verify that the audio output is selected properly, for example, for headphones or speakers. Make sure the volume is not muted in your desktop session. Try a set of external speakers plugged into the Sun Ray Client's audio out or headphones port. If that works, the Sun Ray Client might have a broken speaker. To test whether the audio is working, type the following:
$ cat audiofile > $AUDIODEV
Oracle Solaris provides suitable sample PCM-encoded audio files in /usr/share/audio/samples/ au, so for instance this command:
$ cat /usr/share/audio/samples/au/gong.au > $AUDIODEV
should produce the sound of a gong. Linux generally does not provide PCM-encoded audio files. If you can not locate a suitable file then this command can be used to generate a continuous tone:
$ perl -e 'foreach(-8..8){push(@v,pack("n",4*$_))} while(1){print @v}' > $AUDIODEV
If the cat or perl command hangs, you might need to quit any other applications that are currently trying to play audio, for example, a browser.
13.20.5. Problem: Audio is not working when playing Adobe Flash Videos on an Oracle Linux Desktop
This problem is likely occurring because you are using the latest releases of Firefox or Adobe Flash Player, which provide only ALSA sound support. Oracle Linux versions supported by Sun Ray Software provide only OSS sound support. For a workaround to this problem, see Knowledge Article 1464502.1. 165
166
167
168
How to Enable and Disable the Configuration GUI on All Sun Ray Clients
If you need to enable the Configuration GUI on Sun Ray Clients once their firmware is updated, see Section 14.4, How to Enable and Disable the Configuration GUI on All Sun Ray Clients. 1. Download and unzip the latest Sun Ray Operating Software and make it accessible to the Sun Ray server. See http://www.oracle.com/technetwork/server-storage/sunrayproducts/downloads/index.html 2. Become superuser on the Sun Ray server. 3. Change directory to the unzipped firmware directory and install the firmware.
# ./utfwinstall
This command is for a Sun Ray server configured on a shared network (LAN) with external DHCP server support (used utadm -L on for network configuration). See the examples following this procedure for alternate network configurations. 5. Power-cycle the Sun Ray Clients to update to the new firmware. Note You can also use the utfwload -l command to force all Sun Ray Clients to update to the new firmware if they have older firmware and they are connected to the Sun Ray server . 6. Repeat this procedure on each Sun Ray server in a failover group being used as a firmware server. Note To update firmware versions for a specific client, use the -e enetAddr option, where enetAddr is the MAC address of the client.
14.4. How to Enable and Disable the Configuration GUI on All Sun Ray Clients
This procedure describes how to enable the Configuration GUI on all Sun Ray Clients, so users can locally configure how the clients initialize and boot. Enabling the Configuration GUI essentially enables the client to use its local configuration values first (if any) when initializing. 169
How to Enable and Disable the Configuration GUI on All Sun Ray Clients
In previous versions of the Sun Ray Software 5.2 release, two versions of firmware were shipped: one firmware with GUI capability and another firmware without GUI capability. Enabling the firmware with GUI capability was accomplished by loading the GUI firmware onto a Sun Ray Client. Now, the two firmware versions are combined into a single version, and additional control mechanisms are provided to enable or disable the Configuration GUI. In order to provide a reasonable migration path from the previous configuration, the Configuration GUI will be enabled automatically if there is any local configuration defined on the Sun Ray Client. The new control mechanisms provide a way for you to force the Configuration GUI on or off, or provide a way for each user to enable the Configuration GUI through the use of a password you define. Enabling or disabling the Configuration GUI is managed using two new keywords in the .parms files, enablegui and disablegui. In order to provide some security, there are also two new control files, SunRay.enableGUI and SunRay.disableGUI, that act like keys to unlock enabling or disabling the Configuration GUI. These control files must be installed along with the firmware and .parms files, and they must be readable by the managed Sun Ray clients. The utfwadm command has options to set these keywords and automatically install the control files, as needed. Once you enable the Configuration GUI on a Sun Ray Client, you can use the Configuration GUI to update the client's local configuration. See Section 14.5, How to Modify a Sun Ray Client's Local Configuration (Configuration GUI) for more information. 1. Become superuser on the Sun Ray server. 2. Enable the Configuration GUI on Sun Ray Clients in a shared network (LAN) configuration with external DHCP support (configured network using utadm -L on):
# utfwadm -AaV -G GUI-control
The options for GUI-control are: The Configuration GUI cannot be enabled. This is the default option. Enables the Configuration GUI after using Stop-M or Stop-C on the client. No password is required. Enables the Configuration GUI. The hashed password that the user must enter to enable the Configuration GUI. This option requires you to get the generated hashed password from the uthashpwd command, which takes a password from standard input and prints the hashed result. Prompts you to enter the password that the user must enter to enable the Configuration GUI. The password is processed by the uthashpwd command and the resulting value is assigned to the enablegui value. This command updates the enablegui keyword in the .parms file. For more details, see the utfwadm man page. Note The -g option disables the Configuration GUI and accepts the same options. 3. Power-cycle the clients to put the new firmware mode into effect. 4. Repeat these steps on each Sun Ray server in a failover group.
prompt
170
Note To enable the Configuration GUI for a specific client, use the -e enetAddr option, where enetAddr is the MAC address of the client.
14.5. How to Modify a Sun Ray Client's Local Configuration (Configuration GUI)
Sun Ray Software provides optional functionality to modify a Sun Ray Client's local configuration through a Graphical User Interface (GUI) tool. A Sun Ray Client's local configuration is checked first before using the configuration from the Sun Ray server, so this enables you to individually configure a Sun Ray Client's behavior at the local level. Most of the firmware values are stored in the Sun Ray Client's flash memory. Certain control key combinations are used to invoke the Configuration GUI, which enables you to examine and set the local configuration values. The Configuration GUI enables several features that require the ability to set and store configuration information on the Sun Ray Client itself, including: Non-DHCP network configuration for standalone operation, when configuring local DHCP operation is impossible Local configuration of Sun Ray specific parameters, such as server list, firmware server, MTU, and bandwidth limits DNS servers and domain name for DNS bootstrapping VPN configuration 802.1x configuration The firmware server specified in a client's local configuration is the default server used to provide configuration information for download, such as certificate files, .pcf files, the .parms file, and configuration files.
171
/wpa - wpa_supplicant configuration files /certs - X509 certificates /keys - Public/private keys /profiles - Cisco VPN configuration profiles (.pcf files) In addition to the files that you copy to the firmware's Trivial File System, other files may be created by some configuration operations.
172
Menu Item Descriptions IKE Lifetime - IKE Phase 1 lifetime IPsec Lifetime Dead Peer Detection Session timeout - Idle timeout, after which VPN connection is dropped Save - Save the VPN configuration.
802.1x Configuration Enable and initialize - Enables 802.1x authentication. If you choose this menu item and the wired.conf file does not exist. you are prompted to create the file in the Sun Ray Client firmware and the Sun Ray Client reboots if you accept. The reboot is required to complete the 802.1x initialization. After rebooting, choose Configure to add configuration values to the wired.conf file. Disable - Disable 802.1x authentication. This menu item removes the wired.conf file from the Sun Ray Client firmware. The Sun Ray Client must reboot to complete the process. Configure - Provides a list of configuration values that can be changed in the wired.conf file. All string values, including file names, need to be enclosed in double quotes, otherwise, they will be parsed as hexadecimal strings. You can specify NULL (without quotes) in a field to represent a variable that has no value and causes a value to be cleared. Selections for file names (keys or certificates) are displayed as a list of the available files of the correct type from the corresponding directories, including the NULL selection. The full description of these values are provided in the wpa_supplicant example configuration file. ssid - SSID (network name). This value is fixed as "wired" and it cannot be changed. key_mgmt - List of accepted authentication protocols. Values include NONE (no authentication) or IEEE8021X (perform 802.1x using EAP authentication). eap - List of acceptable Extended Authentication Protocol (EAP) methods. Only one value can be specified. Values include MD5, TLS, MSCHAPV2, PEAP, TTLS, GTC, and OTP. ca_cert - File path to the certificate file in the /certs directory, with one or more trusted CA certificates, used for EAP-TLS/TTLS/PEAP. anonymous_identity - Anonymous identy string for EAP that supports a different tunneled identity, such as EAP-TTLS and EAP-PEAP. If this is defined, it is used as the initial EAP identity, and "identity" is used in any phase 2 protocol. identity - Identity string for EAP password - Password string for EAP.
173
Menu Item Descriptions private_key - File path to the client private key file in the /keys directory. (No private_key_passwd needs to be defined, as the private key is stored in the Sun Ray Client flash memory that cannot be accessed.) client_cert - File path to a client certificate file in the /certs directory, for example, for EAP-TLS. phase2 - Inner authentication parameters. This field enables you to specify the internal authentication mode for EAP-PEAP or EAP-TTLS. Example values include "auth=xxx" or "autheap=xxx", where xxx is the selected inner authentication mode. If this value is not set, then any available authentication mode is allowed. ca_cert2 - File path to certificate file in the /certs directory for use in phase 2 authentication. private_key2 - File path to client private key file in the /keys directory for use in phase 2 authentication. client_cert2 - File path to client certificate file in the /certs directory for use in phase 2 authentication. Note: A certificate with a passphrase is not supported.
VPN Profiles
Download Profile File Remove Profile File Show Profiles Clear All Profile Files
Certificates
Download Certificate File Remove Certificate File Show Certificates Clear All Certificate Files Note: A certificate with a passphrase is not supported.
Servers
Server list - A list of comma-separated server names or IP addresses Firmware server - Name or IP address
[{tftp|http}://]server-name-or-IP
Trivial File Transfer Protocol (TFTP) is the default transport and server-nameor-IP specifies the default server used to provide configuration information for download, including certificate files, .pcf files, .parms file, firmware, and configuration files. When using TFTP, the files must be accessible from the TFTP server. On Oracle Solaris, the files must be located in the server's /tftpboot directory. When
174
Menu Item Descriptions using HTTP, the files must be located in or linked to the web server's document directory. Log host - IP address of syslog host
Network TCP/IP
Network configuration - IPv4 (default) or IPv6 Auto (available for IPv6) DHCP - MTU (available for IPv4) Static - IP address, netmask, router, broadcast address, MTU (IPv4) or IP address, Prefix Length, Router, MTU (IPv6)
DNS
Authentication
Set if network connection requires a simple HTTP authentication before it can be used. Enable/Disable switch Port number
Set password (lock configuration under password control) Version (equivalent to Stop-V) See below. Equivalent to Stop-C. Exit the Configuration GUI.
Table 14.2. Configuration GUI Advanced Menu Items Main Menu Item Download Configuration Description Prompts for a server name and the file name of a remote configuration file to be downloaded from the server, in the form:
[{tftp|http}://][server-name-or-IP/]file-name
This field can be overwritten when selected. Pressing Return causes the corresponding remote configuration file to be read and the configuration values parsed and set on the client. For configuration values, see Table 14.3, Remote Configuration File Key Values. On success, the user is prompted to save the values. Otherwise, the previous menu is displayed. No other error indications are given. The default transport used is TFTP and the default port is the corresponding port for the transport, 69 for TFTP and 80 for HTTP. The default server is the firmware server value in the local configuration (if server-name-or-IP is not defined) and the default file name is config.MAC, where MAC is the unit's MAC address in upper-case hexadecimal. When using TFTP, the remote configuration file must be accessible from the specified TFTP server. On Oracle Solaris, the remote configuration
175
Description file must be located in the server's /tftpboot directory. When using HTTP, the remote configuration file must be located in or linked to the web server's document directory. A keyboard country code (keyboard map) that is applied to a keyboard that returns a country code of 0, for use with non-U.S. USB keyboards that do not report a country code. For the list of valid keyboard country code values, see Section 13.18, Keyboard Country Codes. The maximum amount of network bandwidth in bits per second that a given client will use. Enables or disables the ability to terminate a session by pressing Stop-Q. This feature is useful when you want to terminate a VPN connection and leave the Sun Ray in an inactive state. Pressing the Escape key after the session has terminated reboots the Sun Ray Client. Sets a tag sent from the Sun Ray Client to the Xserver telling it to enable compression regardless of available bandwidth. Disables the use of lossy compression for image data. Disables the ability to explicitly force a firmware load into a Sun Ray Client. In this way, firmware can be tightly controlled using .parms files or DHCP parameters. Allows the Sun Ray Client to operate correctly when the network port that it is connected to does not auto-negotiate. In that case, the auto-negotiation results in the Sun Ray running at half duplex, which significantly impacts network performance. This setting allows the Sun Ray to operate with better performance in this situation. If set, the Sun Ray Client uses the maximum TFTP transfer size if the TFTP server supports it. Over a high latency connection, this setting typically doubles the speed of firmware downloads. There are no disadvantages to enabling fast downloads on low latency LANs. This parameter is disabled by default and the transfer size is set at 512byte packets. It is disabled by default for backwards compatibility with TFTP servers that might not support the more advanced protocol. If this parameter were on by default and a firmware download were to fail, there would be no way to recover.
Energy star power off feature for Sun Ray 3 Series Clients. The value for the power off feature is in minutes. The default power off time is 30 minutes. A value of 0 disables the power off feature. Specifies an alternative combination of modifier keys to perform the same function as the Stop key on the Sun keyboard or the Ctrl-Pause key sequence on non-Sun keyboards. By default, this alternative combination is Ctrl-Shift-Alt-Meta. See Section 13.2, Sun Ray Client Hot Keys for details. You can change Ctrl-Shift-Alt-Meta to any other combination of the same keys, but at least two of the keys must be used. For example, you can set this value to Ctrl-Alt or Meta-Ctrl-Shift. If this parameter is set to none, the alternative key combination is disabled.
176
Description Note that the Meta key has different names on different keyboards: on a PC keyboard, it is the "Windows" key, and on a Mac keyboard, it is the "Command" key. Specifies the size, in Kbytes, of the command cache look-back buffer. This area is used to store a list of recent commands used by the firmware, and the commands are replayed from the cache if used again. The default value is 512 Kbytes, maximum value is 8192 Kbytes, and a zero value disables the command cache. Blanking - Specifies the blanking timeout, which is the time until the screen is put to sleep, in minutes. Specify 0 to disable. Sun Ray 270 Client only. If set, turns off the input selector on the front of the client and locks the monitor so that it displays only the Sun Ray output. This feature prevents users from connecting a PC to the VGA video input connector on a client and using it as a monitor.
177
Key Values vpn.pin vpn.peertype vpn.authtype vpn.dhgroup vpn.pfsgroup vpn.lifetime vpn.ipsectime vpn.dpdswitch vpn.killtime DNS Submenu dns.domain dns.servers Servers Submenu servers tftpserver loghost Security Submenu password Network Submenu network TCP/IP Submenu ip.ip ip.mask ip.bcast ip.router ip.mtu ip.type TCP/IPv6 Submenu ip.ip6 ip.prefix ip.router ip.mtu ip.type Advanced Submenu kbcountry bandwidth stopqon compress
Description PIN lock for use of user/passwd Cisco or Netscreen Xauth, Preshared, or Hybrid Diffie-Hellman group to use PFS group to use Lifetime of IKE connection Lifetime of IPsec connection Dead peer detection Idle timeout value to drop VPN connection. Domain name Server list (comma-separated IP addresses) Sun Ray server Firmware (TFTP) server Syslog host Set administrator password Type of network (IPv4 or IPv6) Static IPv4 address Static netmask Static broadcast address Static router MTU IP address source (DHCP or Static) Static IPv6 address Static IPv6 prefix Static router MTU IP address source (Auto or Static) Keyboard country code Bandwidth limit in bits per second. Enable (1) or Disable (0) Stop-Q for disconnect Force compression on when 1
178
VPN Support
Key Values lossless utloadoff fastload fulldup poweroff stopkeys cmdcachesize videoindisable
Description Force use of lossless compression when 1 Disallow use of utload to force firmware download when 1 Force maximum TFTP transfer rate when 1 Force full-duplex when 1 Poweroff time in minutes Change alternate combination of keys used for Stop key Command cache size Disable input selector of Sun Ray 270 Client when 1
The format of the file is a set of key=value lines, each terminated by a newline character, which are parsed and the corresponding configuration items set (see the sample file below). No whitespace is permitted. Key values are case-sensitive and should be always lower case, as listed above. Setting a keyword to have a null value results in the configuration value being cleared in the local configuration.
179
Gateway setting for Perfect Forward Secrecy (PFS) Configuration of authentication mode (preshared, Hybrid, or XAUTH) IKE fragmentation for large negotiation packets To protect the use of stored authentication information, the VPN configuration includes a PIN entry. This feature enables two-factor authentication for Sun Ray at Home VPN deployments. Note You can also copy VPN configuration and certificate files to the firmware by using the file copy entry in a remote configuration file. See Table 14.3, Remote Configuration File Key Values for details.
180
802.1x Authentication
14.7.1. How to Configure and Enable 802.1x Authentication on a Sun Ray Client
This procedure describes how to configure and enable 802.1x authentication on a Sun Ray Client. The steps include examples to set up an 802.1x authentication using the EAP-TLS mode of operation. Note The configuration files listed in the procedure must be available in the same location as the remote configuration file, which is usually the firmware server defined in the local configuration. 1. Create the configuration files for wpa_supplicant, including the main configuration file, wired.conf, and the secondary files containing certificates and public/private keys.
181
For the list of valid wired.conf values, see the 802.1x Configuration menu descriptions in Table 14.1, Configuration GUI Main Menu Items. Here are some examples of secondary files and the wired.conf file. someca_cert.pem - a Certificate Authority root certificate from "someca"
-----BEGIN CERTIFICATE----MIID3DCCA0WgAwIBAgIBADANBgkqhkiG9w0BAQUFADCB0zETMBEGCgmSJomT8ixk ARkWA2NvbTETMBEGCgmSJomT8ixkARkWA3N1bjEVMBMGCgmSJomT8ixkARkWBXNm .... CkS0he0fm5xVRd6D+nQQAbUkFy0MZO39QjXbopBxaY5Vm5hg2U+O0JJ5UHQXGGMk sxyGuzhrnu09oYF7Zje1BlO2fGhC/JrSJhKFQtgqNBQ= -----END CERTIFICATE-----
sunray_cert.pem - a client certificate for the Sun Ray Client RSA key, signed by "someca"
-----BEGIN CERTIFICATE----MIIE+TCCBGKgAwIBAgIBCTANBgkqhkiG9w0BAQUFADCB0zETMBEGCgmSJomT8ixk ARkWA2NvbTETMBEGCgmSJomT8ixkARkWA3N1bjEVMBMGCgmSJomT8ixkARkWBXNm .... vv7TQOtlSlwPessnDJOFJ+oYoAMbc3f8bmvVOMvqQ98zZGdJ/VDK+siFJKeTpkoL ocRIJUFegNu4W0+pvgPY/ZBsbUchBA2rpdhwWnc= -----END CERTIFICATE-----
2. Create a remote configuration file with the needed file assignment entries, which will be used to copy the wpa_supplicant configuration files to the Sun Ray Client. Here is an example of a remote configuration file:
/certs/someca.pem=someca_cert.pem /keys/sunray.pem=sunray_key.pem /certs/sunray.pem=sunray_cert.pem /wpa/wired.conf=wired.conf
The /wpa/wired.conf=wired.conf entry is required. 3. Download the remote configuration file to a Sun Ray Client by choosing Advanced->Download Configuration in the Configuration GUI.
182
How to Display Firmware Versions for All Currently Connected Sun Ray Clients
Once the wired.conf file is loaded, 802.1x authentication is automatically enabled if the key_mgmt key is set to IEEE8021X. 4. (Optional) Make changes to the wired.conf file by choosing 802.1x Configuration in the Configuration GUI. 5. Plug the Sun Ray Client into a port that provides 802.1x authentication and test the authentication. See Section 16.12, (20) 802.1x Authentication Icon for informaton about possible error codes or status messages.
14.8. How to Display Firmware Versions for All Currently Connected Sun Ray Clients
1. Become superuser on the Sun Ray server 2. Display the firmware versions.
# /opt/SUNWut/sbin/utfwload -a
14.9. How to Display the Firmware Version from a Sun Ray Client
Press Stop-V or Ctrl-Pause-V.
The Sun Ray Clients reboot themselves and update to the new firmware if needed.
183
For a shared network (LAN) with Sun Ray server DHCP support (used utadm -A subnet for network configuration) For a private network (used utadm -a intf for network configuration)
# ./utfwadm -D -a -N all
# ./utfwadm -D -a -n all
184
185
USB Headsets
design of the Linux mass storage subsystem. Use USB redirection for optimum performance with mass storage devices. When you connect a peripheral to a Sun Ray Client, a device node is created that you can use to access the device. Sun Ray Software works with various mass storage devices such as flash disks, memory card readers, zip drives, and hard drives on Sun Ray Clients. Data CDs and DVDs can be read but not written. Other end-user peripherals such as USB headsets can also be used. For the latest list of peripherals tested to work with Sun Ray Software, see the Sun Ray Peripherals List.
186
Additional Notes
187
Directories correspond to buses and hubs, and files correspond to ports. Hub directories are named according to the port on the upstream hub into which they are attached.
If the USB device has multiple identical ports (for example, two serial ports), the name is followed by :n where n is a numerical index, starting at 1. The following example is a typical device node path:
/tmp/SUNWut/units/IEEE802.MACID/devices/usb@1/hub@1/manufacturer_name,model_name@3:1
Here are the definitions of the naming conventions. Term physical-topology Definition The physical-topology is hub@port/hub@port and so on. The port refers to the port on the parent hub into which the device or child hub is plugged. The printer and terminal name in the Sun Ray devices directory is manufacturer,model@port with a colon separating the numerical index when the string just described is not unique in the directory. The printer and terminal name in the Sun Ray dev directory is the manufacturer and serial number concatenated with an alphabetic index when the serial number is not unique.
printer-name-1, terminal-name-1
printer-name-2, terminal-name-2
The variable is manufacturer_name-serial_numberindex where index is an increasing alphabetical character, starting at a. If the manufacturer name is not available, the USB vendor and product ID numbers are used for the name of the device link.
188
189
Device links have a suffix denoting their slice number. Slice s2 is known as the backup slice, signifying the complete disk. Other slices are numbered accordingly on the file system on the disk. For UFS disks, slice numbers are derived from the disk label. For FAT disks, slices (partitions in this case) are numbered starting from s0. Disk operations such as format or eject should be directed at slice s2. Partition operations such as mount or fstyp should be directed at the individual slice concerned. See Section 15.10.5, Mass Storage Devices and Idle Sessions for examples.
190
Disable the NSCM or RHA policies Find an alternative way to perform the I/O operation more securely, for example, plug the device directly into the Sun Ray server in a locked server room Note Some of these options have security and convenience implications that should be carefully weighed against the timeout issue to determine what is best for your site.
Path of whole disk $UTDEVROOT/ Path of whole disk $UTDEVROOT/ dev/rdsk/disk3s2 dev/rdsk/disk3p0 Path of partition $UTDEVROOT/ dev/rdsk/disk3s0 Path of slice $UTDEVROOT/dev/ rdsk/disk3s0 Path of partition $UTDEVROOT/ dev/rdsk/disk3p1 Path of slice $UTDEVROOT/dev/ rdsk/disk3s0 Partition name disk3p1 Mount point $DTDEVROOT/mnt/ label1 Device alias disk3 Device alias disk3 Device alias disk3
utdiskadm -m Partition name disk3s0 utdiskadm -u Mount point $DTDEVROOT/mnt/ label1 utdiskadm -r Device alias disk3 utdiskadm -e Device alias disk3 fdisk fsck
Path of whole disk $UTDEVROOT/ Path of whole disk $UTDEVROOT/ dev/rdsk/disk3s2 dev/rdsk/disk3p0 Path of raw slice $UTDEVROOT/ dev/rdsk/disk3s0 Mount point $DTDEVROOT/mnt/ label1 Path of raw partition $UTDEVROOT/dev/rdsk/ disk3p1 Mount point $DTDEVROOT/mnt/ label1
df -k
utdiskadm -l None
191
Table 15.2. Commands for Common Disk Operation (Oracle Linux) Operation Create file system Mount Unmount Prepare to unplug Eject media Check for media Create fdisk table Repair file system Display file system capacity List devices utdiskadm -l None Command mkfs utdiskadm -m utdiskadm -u utdiskadm -r utdiskadm -e utdiskadm -c fdisk fsck df -k Device Name Argument Examples Path of partition $UTDEVROOT/dev/dsk/disk3p1 Partition name disk3p1 Mount point $DTDEVROOT/mnt/label1 Device alias disk3 Device alias disk3 Device alias disk3 Path of whole disk $UTDEVROOT/dev/dsk/disk3 Path of partition $UTDEVROOT/dev/dsk/disk3p1 Mount point $DTDEVROOT/mnt/label1
192
This condition occurs when the Sun Ray operating system does not recognize the storage devices's file system.
2. For each stale mount point, close all references to the mount point. 3. For each stale mount point, terminate all processes that refer to the mount point. 4. Remove the mount point.
# umount stale_mount_path
The path to the extended MAC address for your particular Sun Ray Client is displayed. 4. Locate the port for the printer by typing:
# cd dev/printers # pwd /tmp/SUNWut/units/IEEE802.MACID/dev/printers # ls printer-node-name
5. In the directory, locate the printer node. 6. Add the new printer. a. Start the Oracle Solaris Print Manager.
# /usr/sbin/printmgr &
b. Click OK to choose files for repository. c. Go to Printer -> New Attached Printer. d. Type the following information: Printer name: printername Description (optional) Printer port Printer make Printer model Choose Other to type the printer port path name. To locate the printer port, refer to Step 4. 7. Verify that the printer has been set up correctly.
# lpstat -d printername
194
2. To determine the MAC address of the client, press the three audio option keys to the left of the power key in the upper right corner of the keyboard. The alphanumeric string displayed below the connection icon is the MAC address. 3. Locate the Sun Ray Client.
# cd /tmp/SUNWut/units/*MAC_address # pwd /tmp/SUNWut/units/IEEE802.MACID
The path to the extended MAC address for your particular Sun Ray Client is displayed. 4. Locate the port for the printer.
# cd dev/printers # pwd /tmp/SUNWut/units/IEEE802.MACID/dev/printers # ls printer-node-name
5. In the directory, locate the printer node. 6. Use the Oracle Linux administration tools to set up the printer. Choose Other so that you can provide the device node from Step 4. 7. Verify that the printer has been set up correctly.
# lpstat -d printername
8. Create a soft link to the Sun Ray printer node in /dev/usb For example, if the device node is /tmp/SUNWut/units/IEEE802.mac-address/dev/printers/device_node, you would use the following command:
# ln -s /tmp/SUNWut/units/IEEE802.mac-address/dev/printers/device_node /dev/usb/sunray-printer
Use this soft link (/dev/usb/sunray-printer) as the Device URI while creating the print queue. 9. Update /etc/cups/cupsd.conf to set the RunAsUser property to No. 10. Restart the cups daemon.
# /etc/init.d/cups restart
195
196
197
OSD icons are shown as rectangular, light grey icons, such as the following example: Figure 16.1. On-Screen Display Icon Example
OSD icons can display even if the client is not connected to a server, and they typically provide the following detailed information: A unique graphic Ethernet address IP address of the Sun Ray Client Status of link to Sun Ray server IP address of authentication server Numeric code for icon message Alphabetic code for DHCP State Encryption and authentication information, when appropriate Alphabetic code for Firmware Download Error Codes
198
11 12
13
Network Status
199
Meaning The server is not authenticated and the graphic/keyboard network connections are not encrypted. Sun Ray Client is refusing to talk to the server due to the server's refusal or inability to authenticate or encrypt the network connection. USB bus is busy servicing a high-speed device, and the keyboard or mouse might not be responsive to user input. Sun Ray Client is attempting 802.1x authentication and this icon indicates the current progress. Sun Ray Client is booting up and is waiting for DHCP IP address and parameter assignment. Sun Ray Client is booting up and is waiting for the initial connection to a Sun Ray server. The connection between the Sun Ray Client and the network is down. Check the network drop cable. If the network drop cable is okay, check the network switch. Sun Ray Client has disconnected from the previous server. Sun Ray Client is being redirected to a new server. Sun Ray Client has connected to the server and is waiting for graphics traffic. Sun Ray Client is broadcasting to locate a Sun Ray server since either it was not provided with Sun Ray specific DHCP parameters or all of the specified servers are not responding. VPN connection being attempted. VPN connection established. VPN connection error. The network link is up, the server is authenticated, and graphics/keyboard network connections are not encrypted. The network link is up, the server is not authenticated, and graphics/keyboard network connections are encrypted. The network link is up, the server is authenticated, and graphics/keyboard are encrypted.
15
Session Connection
16
USB
20
Authentication
21
Startup
22 23
24 25 26 27
28 29 30 31
32
Network Status
33
Network Status
200
Meaning The network link is up, the server is not authenticated, and graphics/keyboard are not encrypted. Sun Ray Client has been disconnected from its server, either by a STOP-Q session disconnect event or by the VPN session timeout value having been set and exceeded. The server is authenticated, the client is authenticated, and the graphic/keyboard network connections are encrypted. The server is not authenticated, the client is authenticated, and the graphic/keyboard network connections are encrypted. The server is authenticated, the client is authenticated, and the graphic/keyboard network connections are not encrypted. The server is not authenticated, the client is authenticated, and the graphic/keyboard network connections are not encrypted. No access to server. No access for Oracle Virtual Desktop Clients. No access: registration required. No access: client key is rejected. No access: security policy violation. The network link is up, the server is authenticated, the client is authenticated, and graphics/keyboard network connections are not encrypted. The network link is up, the server is not authenticated, the client is authenticated, and graphics/keyboard network connections are encrypted. The network link is up, the server is authenticated, the client is authenticated, and graphics/keyboard are encrypted. The network link is up, the server is not authenticated, the client is authenticated, and graphics/keyboard are not encrypted. Insert card. If the site's authentication policy allows access only by card, this icon is displayed to prompt the user to insert a card. Access without a card is disabled. Waiting for primary Sun Ray Client. The client is a secondary client in a multihead
35
Startup
41
Network Status
42
Network Status
43
Network Status
44
Network Status
46 47 48 49 50 51
Server Policy Server Policy Server Policy Server Policy Server Policy Network Status
52
Network Status
53
Network Status
54
Network Status
60
Server Policy
61
Server Policy
201
General Category
62
Server Policy
Token reader. The Sun Ray Client is a token reader. When a site policy disallows pseudosessions, a Sun Ray Client configured as a token reader displays the Token Reader icon instead of the Login dialog box. Smart card not recognized. The smart card is not recognized by the Sun Ray server or there is a reader error. Waiting for session access. Access is temporarily denied, but the Sun Ray Client automatically retries when this condition is resolved.
63
Server Policy
64
Server Policy
202
Sun Ray Client Hardware State Card reader LED remains on even when card is removed
Action to Take Card reader hardware problem. Replace the Sun Ray Client.
The Sun Ray Client Startup icon indicates that the Sun Ray Client has passed the power-on self test but has not yet detected an Ethernet signal. The icon is displayed for a few seconds as part of the normal startup process. When an Ethernet signal is detected, the Network Connection Verified (21) OSD is displayed. Problem: The Sun Ray Client Startup OSD is displayed for more than 10 seconds. Check that the Ethernet cable is plugged into the Sun Ray Client correctly and that the other end is plugged in to the correct hub, switch, or network outlet. If the Sun Ray Client is connected through a hub or a switch, verify that the hub or switch is powered on and configured correctly. A link LED on the switch or hub indicates that the connection is alive.
The Firmware Download in Progress icon indicates that the Sun Ray Client is downloading new firmware from a Sun Ray server. The following message is also displayed: Reading firmware.
203
Downloading the firmware takes less than a minute. If you interrupt the download, the Sun Ray Client has to download the new firmware the next time it reboots. Note When downloading the firmware on Sun Ray 2 Series Clients, pixel artifacts fill the screen. This is normal.
The Updating Firmware icon indicates that the downloaded firmware is being updated on the Sun Ray Client. The following messages are also displayed: Erasing flash. DO NOT POWER OFF! Programming flash. DO NOT POWER OFF! The Sun Ray Client reboots after updating the firmware. Caution Do not interrupt the firmware update. Interrupting the firmware update may make the Sun Ray Client unusable. Note If there is an additional firmware update for the internal smart card controller, the Updating Firmware icon is displayed again and the smart card LED flashes while the update occurs. The following message is also displayed: Programming Smart Card Controller. DO NOT POWER OFF!. The Sun Ray Client reboots after updating the firmware for the internal smart card controller. Note When updating Sun Ray 2 Series Clients, pixel artifacts fill the screen during the update. This is normal.
204
Table 16.4, Firmware Download Error Codes and Messages lists the firmware download error codes and messages. Firmware download error codes are valid only with OSD icon 4. Table 16.4. Firmware Download Error Codes and Messages Error Code E F G H I J K L M N O Error Message FW Load: No server FW Load: Name too long FW Load: Bad read FW Load: Bad signature FW Load: Failed decompression FW Load: Invalid module type FW Load: Version mismatch FW Load: Not enough memory FW Load: Prevented by barrier FW Load: Invalid HW version FW Load: Flash write error
The Firmware Download with a 4 error code icon is displayed when the Sun Ray Client fails to download new firmware. The message "FW Load: Prevented by barrier" indicates that the Sun Ray Client already has a later version of the firmware. In the syslog, the following message indicates that a barrier level has been set to prevent Sun Ray Clients from downloading an earlier version of the firmware.
Firmware upgrade/downgrade not allowed! Barrier is 310 Firmware level is 0
205
The Session Refused icons are displayed during a possible security breach because authentication has failed. Problem: Icon shows the 15D message. The Sun Ray Client is refusing to connect to a server because it is unable to verify the validity of the Sun Ray server. This error can occur only if an unknown Sun Ray server tries to emulate a valid Sun Ray server. This situation is a session security breach. Problem: Icon shows the 50D message. The Sun Ray server is refusing to grant a session to the Sun Ray Client because the client is unable to fulfill the server's security requirements. Upgrade the Sun Ray Client's firmware version. This error can occur with firmware versions earlier than 2.0 when the server is configured for hard security mode. As an alternative, determine whether your site requires hard security mode. If not, the session can be enabled with soft security mode.
206
The Bus Busy OSD indicates that the Sun Ray USB bus is servicing a high-speed device and the keyboard or mouse might not be responsive to user input. This icon is displayed during an unusually long print job and disappears when the job is done. No action is needed unless killing the print job is necessary.
The Network Connection Verified icon indicates that the Sun Ray Client has detected the Ethernet carrier but has not yet received its initial parameters or IP address from the DHCP server. The icon is displayed for a few seconds as part of the normal startup process. After the DHCP server has allocated an IP address, the icon is updated with the Sun Ray Client's assigned IP address. When the network connection is verified, the Sun Ray Client connects to the Sun Ray server. Problem: The icon is displayed for more than 10 seconds. Verify that the DHCP server is running and has not run out of IP addresses to assign to clients. Verify that the DHCP server is configured properly for network parameters.
207
Problem: The icon displays an IP address and an icon message, either 21A or 21B, depending on whether the Sun Ray server is on a LAN network or a dedicated interconnect. This condition occurs when the Sun Ray Client receives an IP address from the DHCP but no other parameters. The Sun Ray Client issues a DHCP_INFORM request to obtain the Sun Ray-specific parameters. Code 21 A indicates that the Sun Ray Client received an IP address and is waiting for a response to its DHCP inform request. Code 21 B indicates that the Sun Ray Client received an IP address and IP router and is waiting for a response to its DHCP inform request. If no response is received, the Sun Ray Client continues the startup process using only the IP address. In a private interconnect or simple LAN configuration, the Sun Ray Client can function successfully. However, performance of the Sun Ray Client might be affected. If the Sun Ray Client is part of a complex LAN configuration, it can fail later in the start up process because it requires the additional parameters and Sun Ray-specific vendor options to handle network operations, such as when a Sun Ray Client is located several hops away from the Sun Ray server's subnet. Continue with the startup process, if possible, and at the next opportunity, do the following: For LAN configurations with other non-Sun Ray DHCP services but no bootp proxy agent, verify the DHCP server and the Sun Ray vendor tags. For routed configurations, verify that the bootp proxy agent is configured correctly in the Sun Ray Client's subnet and that it points to one of the Sun Ray servers in the failover group. For non-routed private interconnect configurations, the Sun Ray server performs the functions of a DHCP server. Verify that it is configured properly for DHCP services. When the Sun Ray Client concludes the interaction with the DHCP server, it connects to a Sun Ray server and then interacts with the server's Authentication Manager, indicated by the Waiting to Connect to Authentication Manager OSD. Occasionally, the Sun Ray Client is first routed to another Sun Ray server. In this case, the Redirection OSD icon is displayed for a few seconds and then, as the Sun Ray Client interacts with the new server's Authentication Manager, the Waiting to Connect to Authentication Manager OSD is displayed.
208
The Waiting to Connect to Authentication Manager icon indicates that the Sun Ray Client has received its parameters from the DHCP server and it has connected to the Sun Ray server but has not yet completed it authentication. The icon is displayed for a few seconds as part of the normal startup process. Problem: The icon displays for more than 10 seconds or the Sun Ray Client resets after the icon is displayed. Verify that Sun Ray services, including the Authentication Manager, are running on the Sun Ray server. In a LAN configuration or other routed environment: Verify that the Sun Ray Client's IP address can reach the Authentication Manager. Verify that the Sun Ray Client's routing information, received from the Sun Ray server, is correct. Verify that the bootp proxy agent is configured correctly in the Sun Ray Client's subnet and that it points to one of the Sun Ray servers in the failover group. Run utquery for the Sun Ray Client's IP address to see the parameters that the Sun Ray Client received. If the parameters do not include an AuthSrvr parameter, the DHCP server might not have sent the Sun Ray parameters or the parameters might not be correct. To confirm that the DHCP server can be reached, check the value of the DHCPServer parameter. To confirm that the DHCP server sends the proper Sun Ray-specific parameter values, check the value of the INFORMServer parameter. If a value is incorrect, look at your bootp relay configurations and DHCP server configurations for network and Sun Ray parameters. For details of these parameters, see the utquery man page. To restart DHCP on a Oracle Solaris server, type the following as superuser:
# /etc/init.d/dhcp stop # /etc/init.d/dhcp start
The No Ethernet Signal OSD indicates that the Sun Ray Client had an Ethernet address and an IP address but later lost the Ethernet signal. Check that the Ethernet cable has not become unplugged from the Sun Ray Client or from the switch or network outlet.
209
If the Sun Ray Client is connected through a hub or switch, make sure that the hub or switch is still powered on.
The Redirection OSD indicates that the Sun Ray Client is being redirected to a new Sun Ray server. This redirection can occur for any of several reasons, including load balancing. The icon is displayed for a few seconds while the Sun Ray Client connects to the new Sun Ray server and then the Waiting to Connect to Authentication Manager OSD is displayed.
The Wait for Session OSD indicates that the Sun Ray Client is waiting for its X Window session. The icon is displayed for a few seconds as part of the normal startup process. If this icon is displayed for a long time, display traffic from the server is not arriving to the client. Some possible reasons for this problem are: The network (routers, switches, firewalls) is not correctly transmitting UDP traffic from the server to the client. The server is attempting to display one of the Server Policy icons, but the client is behind a NAT router or gateway.
210
The X server (Xnewt or Xsun) that is the source of the display traffic on the Sun Ray server side is not working properly. It might be crashed or hung. The display manager (dtlogin on Oracle Solaris or gdm on Oracle Linux) has failed to start an X server for the session. It might be crashed, hung, or not configured properly. If you suspect that dtlogin configuration files have been corrupted, see Section 5.3, How to Check and Fix Corrupted Configuration Files (Oracle Solaris).
The DHCP Broadcast Failure icon is displayed if the Sun Ray Client is attempting to locate a Sun Ray server and either no servers respond or the Sun Ray-specific DHCP parameters are not correct.
The Establishing VPN Connection icon is displayed while a Sun Ray Client is trying to connect to the Sun Ray server through a VPN connection. This icon can also include one of the following state codes shown in Table 16.6, VPN Connection State Codes. Table 16.6. VPN Connection State Codes State Code E Meaning VPN Phase 1 IKE initiated.
211
State Code F G H I
Meaning VPN Phase 1 IKE complete. VPN connection expired. VPN Phase 2 initiated. VPN Phase 2 complete.
When the VPN connection is established, the VPN Connection Established icon is displayed.
212
The Ethernet Address OSD shows the Ethernet address, the assigned IP address, the connected server, encryption status, DHCP state, link speed and link mode. To display current information about the Ethernet link, do one of the following at any time. On a Sun keyboard, press the three audio volume keys simultaneously. To get the same effect on a nonSun keyboard, press Ctrl-Pause-N. Disconnect and reconnect the Ethernet cable. A value of 10 indicates a link speed of 10 Mbps; 100 indicates 100 Mbps. A value of F indicates that the link mode is full duplex. A value of H indicates half-duplex mode.
213
This icon usually displays if the policy disallows card access and a card is inserted.
This icon indicates that access for Oracle Virtual Desktop Clients is disabled. To enable access for Oracle Virtual Desktop Clients, refer to the Oracle Virtual Desktop Client documentation.
The card or Sun Ray Client is not registered. If ATI is configured for a site, the ATI script is run when this icon is first displayed. If the script registers the card, this state might not last long.
214
This icon is displayed if only confirmed keys are allowed access by policy. It might be displayed if there is a key conflict, but other icons might display instead.
This icon is displayed if the client is running old firmware that does not support encryption or client authentication and the server has "hard" security mode set. This icon might also display in other securityrelated cases, such as key conflict or failed key validation, but other icons might display instead.
215
If the site's authentication policy allows access only by card, this icon is displayed to prompt the user to insert a card. Access without card is disabled.
The Sun Ray Client is a secondary client in a multihead group, and the primary client is not currently connected.
The Sun Ray Client is a token reader. When a site policy disallows pseudo-sessions, a Sun Ray Client configured as a token reader displays the Token Reader icon instead of the Login dialog box.
The smart card is not recognized by the Sun Ray server or there is a reader error. The following reasons may include: The Sun Ray Client is running an older firmware.
216
The smart card's contacts are dirty, the contacts on the smart card reader are dirty, or the card is not properly inserted. The smart card is malfunctioning. The Sun Ray server is not configured to read this type of smart card or an error exists in the configuration file. To fix this problem, try one of the following actions: Upgrade the firmware on the Sun Ray Client. Clean the smart card. Replace the smart card. Verify that the Sun Ray server has the appropriate smart card configuration files installed and configured.
This icon indicates that the server is not allowing access at the current time. This problem occurs when a Sun Ray Client loses power or the network connection to the server is interrupted and the smart card from the Sun Ray Client is inserted into a different Sun Ray Client before the server has timed out the lost connection. Because the old connection is still active, new connections using the same smart card are unable to gain access. When this conditions occurs, the server checks the status of the old connection. After the time reserved for this check has elapsed (an initial default of 10 seconds), the Sun Ray Client connection is restarted and the condition should be automatically resolved. Either the session access is granted or the Sun Ray Client remains in this Waiting for Access state (64). If a Sun Ray Client continues to remain in this state, the same token is being used with another connection. Specifically, two physical tokens (smart card, Sun Ray Client, Oracle Virtual Desktop Client profile) are trying to connect to the same session. Possible reasons for this issue include the following: A security incident where a copied or fake smart card is used to gain access to the session. A security incident where a copy of an Oracle Virtual Desktop Client profile is used to gain access to the session. This situation might also indicate a user error. Oracle Virtual Desktop Client profile files should not be copied to a different computer or user account. A registered token policy is in effect, alias tokens have been configured, and an alias token is still connected to the session the user is trying to access. If access is denied because of a currently
217
connected alias token, the connected alias token needs to be disconnected to regain access. For example, the aliased smart card must be removed from its Sun Ray Client.
218
219
Client computers. Ensure that firewall settings on the client computers allow Oracle Virtual Desktop Clients to access the Internet. Sun Ray servers. See Section 3.1.13, Ports and Protocols for information on the ports used by Oracle Virtual Desktop Clients. Oracle Virtual Desktop Clients can be used to access both smart card sessions and non-smart card sessions. Session mobility, or hotdesking, is supported with or without smart cards. Note The following procedures use a warm restart of Sun Ray services. If you disable access for Oracle Virtual Desktop Clients, use a cold restart.
Note The -M option enables non-smart card mobile (NSCM) sessions. 2. Edit the current policy, to enable access for Oracle Virtual Desktop Clients. Do one of the following: a. To enable both smart card and non-smart card sessions, add the -u both option to your policy options.
# /opt/SUNWut/sbin/utpolicy -a -g -z both -M -u both
b. To enable only non-smart card sessions, add the -u pseudo option to your policy options.
# /opt/SUNWut/sbin/utpolicy -a -g -z both -M -u pseudo
c. To enable only smart card sessions, add the -u card option to your policy options.
# /opt/SUNWut/sbin/utpolicy -a -g -z both -M -u card
220
How to Enable the Clipboard Service for Oracle Virtual Desktop Clients
# /opt/SUNWut/sbin/utstart
After enabling or disabling access for Oracle Virtual Desktop Clients, a restart of Sun Ray services in the server group is required.
17.3. How to Enable the Clipboard Service for Oracle Virtual Desktop Clients
This procedure describes how to enable copy and paste text between an application running in an Oracle Virtual Desktop Client session and an application running on the local desktop. When enabled, Oracle Virtual Desktop Client users can copy and paste text between an application running in an Oracle Virtual Desktop Client session and an application running on the local desktop. Copying and pasting Unicode characters is supported. For the copy and paste functionality to work, the clipboard service must be enabled on the Sun Ray server and clipboard sharing must be enabled on the Oracle Virtual Desktop Clients. You can use the utdevadm command or the Advanced->Security page on the Admin GUI to check if the clipboard service is enabled. Note This feature is not available on Sun Ray servers running Oracle Solaris Trusted Extensions. Follow these steps to enable the clipboard service on the Sun Ray server.
17.4. Client ID Differences Between Oracle Virtual Desktop Clients and Sun Ray Clients
If you have existing scripts using the Sun Ray Software commands, or you plan to create scripts, you must be aware of the client ID differences between Oracle Virtual Desktop Clients and Sun Ray Clients. All clients are represented in the Sun Ray Software administration tools by a client ID, also called CID, terminal CID, or client identifier. A client ID has both a full ID and a short ID version:
221
Full client ID: namespace.id-part Short client ID: id-part The namespace value is a tag that determines the format of the id-part value. Short client IDs are usually used and accepted because the current namespaces, one for Sun Ray Clients and one for Oracle Virtual Desktop Clients, use different id-part formats. The full client ID is used to help distinguish between these different types of clients more easily. See Table 17.1, Oracle Virtual Desktop Client ID Details for the details of the client ID. Table 17.1. Oracle Virtual Desktop Client ID Details Client Sun Ray Client Oracle Virtual Desktop Client Note The client key is part of an Oracle Virtual Desktop Client profile, so every Oracle Virtual Desktop Client profile has its own client ID. See Table 17.2, Example Sun Ray Client IDs and Table 17.3, Example Oracle Virtual Desktop Client IDs for examples of client IDs. Table 17.2. Example Sun Ray Client IDs Short ID 0003badc1b9d 00144f85f52f 080020b5ca55 Full CID IEEE802.0003badc1b9d IEEE802.00144f85f52f IEEE802.080020b5ca55 namespace Value IEEE802 MD5 id-part Meaning MAC address of DTU MD5 hash of client key id-part Format 12 hex digits 32 hex digits
Table 17.3. Example Oracle Virtual Desktop Client IDs Short ID 1bd97b44ea9458fac256a7a778a282fe d8b3a4eb29497e0c6fbb0f2a810267f5 Full CID MD5.1bd97b44ea9458fac256a7a778a282fe MD5.d8b3a4eb29497e0c6fbb0f2a810267f5
Note The format of the client ID for an Oracle Virtual Desktop Client is different to the client ID for a Sun Ray Client. See Section 17.4, Client ID Differences Between Oracle Virtual Desktop Clients and Sun Ray Clients for more information.
222
where server-name is the name of the Sun Ray server and bytes is the packet size. On Mac OS X platforms:
ping -s bytes -D server-name
where server-name is the name of the Sun Ray server and bytes is the packet size. On Linux platforms:
ping server-name -s bytes
where server-name is the name of the Sun Ray server and bytes is the packet size. To calculate the MTU setting, add eight bytes to the packet size. To set the MTU, either change the setting on the Network tab or run the following command:
ovdc --mtu bytes server-name
223
where bytes is the MTU, in bytes and server-name is the name of the Sun Ray server.
By default, the logging level is 0, which sets logging to off. You can also set the logging domains (categories to log) with the --logging-domains option, but all logging domains are logged by default. The logging level is cumulative. For example, the maximum logging level 3 includes informational messages, warnings, and critical messages. To set the logging level, run the following command:
ovdc --logging-level num server-name
where num is the logging level and server-name is the name of the Sun Ray server. For example, to record warnings and critical messages for a connection to the sr-1.example.com Sun Ray server, run the following command:
ovdc --logging-level 2 sr-1.example.com
224
Mac OS X platforms $HOME/.OVDC/profilename.log Linux platforms $HOME/.OVDC/profilename.log If you use the --profile command option to specify the path to a profile, the log file is created automatically in the same directory as the profile. In the following example, log messages are written to the C:\temp\fullscreen.log file.
ovdc --profile C:\temp\fullscreen
The following example uses the default profile and writes log messages to the C:\temp\logfile.txt file.
ovdc --logfile C:\temp\logfile.txt
The following example uses the C:\profiles\fullscreen profile and writes log messages to the C: \temp\logfile.txt file.
ovdc --profile C:\profiles\fullscreen --logfile C:\temp\logfile.txt
The following example uses the C:\profiles\fullscreen profile and writes log messages to the mylog.txt file in the default location.
ovdc --profile C:\profiles\fullscreen --logfile mylog.txt
225
226
227
18.16.5. How to Set Up Follow-Me Printing .............................................................................. 18.16.6. Printers Troubleshooting ............................................................................................ 18.17. uttsc Error Messages ........................................................................................................ 18.17.1. General Troubleshooting ............................................................................................ This chapter provides information about managing the Windows connector.
228
Once the Windows connector is configured, a user has to use the uttsc command to connect to a Windows system if the kiosk mode is not configured. The user can modify the command to accommodate a variety of preferences or options, such as specifying screen size or a list of available printers. Table 18.1, Windows Connector Features lists the features provided by the Windows connector. Table 18.1. Windows Connector Features Feature Section 18.6, USB Device Redirection Section 18.5, Video Acceleration Section 18.4, Audio Input Clipboard Description Enables users to access USB devices connected to a Sun Ray Client from their Windows sessions, provided that the appropriate device drivers are installed on the Windows system. The Windows connector provides features to increase the performance for video streams and Adobe Flash content. The support provided is dependent on the Windows OS. Users can play sound files on their Sun Ray Clients (audio out) with audio applications located on the Windows system. Recording from the Sun Ray Client to the Windows system (audio in) is also supported. The Windows connector enables cut-and-paste text functionality between Windows applications and the applications running on the Oracle Solaris or Oracle Linux desktop. Copying and pasting is enabled for all supported languages, including double-byte languages such as Chinese, Japanese, and Korean. The Windows connector does not support copying and pasting functionality for Rich Text Format. The following behaviors, although similar, are caused by limitations in different applications:
229
Requirements
Feature
Description Once a copy-and-paste operation has been performed from a dtterm window, subsequent copy-and-paste operations from the same window to a Windows application always show the data from the first such operation. Cut-and-paste operations do not work from dtpad to Windows applications. Cut-and-paste menu options do not work correctly in transfers from StarOffice applications.
The Windows connector uses RDP bulk compression to compress data between the Sun Ray server, which runs the Windows connector, and the Windows system.
Section 18.9, Network The Windows connector uses RSA Security's RC4 cipher, which encrypts data of Security varying size with a 56-bit or a 128-bit key, to secure all data being transferred to and from the Windows system. Alternatively, using TLS/SSL or CredSSP through the enhanced network security option, all traffic is encrypted as per protocol specifications and system configuration. Local Drive Mapping File systems from removable media devices, such as flash drives, can be connected to the Sun Ray Client's USB ports and mapped to the Windows environment, where they are displayed as locally mounted drives. Any file can be mounted and mapped from the Sun Ray environment to the Windows environment. In most cases, USB redirection should be used instead. From a Windows session, a user can print from a Windows application using any of the following configurations: a network printer or a locally attached printer on the Windows system, a network printer or a locally-attached printer on the Sun Ray server, or a local printer attached to the Sun Ray Client. Users can access the serial devices connected to a Sun Ray Client from their Windows sessions. Serial devices can be connected either directly to the serial ports on a Sun Ray Client or by means of a serial adapter.
Section 18.8, Session The Windows connector supports server session reconnection based on Directory load balancing information and the Session Directory, a database that keeps track of which users are running which sessions on which Windows systems. Session Directory functionality enables users to reconnect automatically to the right Windows session. Terminal services session load balancing is handled transparently by the Windows Terminal Server. Section 18.13, Smart Cards The Windows connector uses the PC/SC framework to enable applications on the Windows system to access smart cards inserted in the Sun Ray Client. Typically, this feature is used to provide two-factor authentication with digital certificates or to permit the use of electronic signatures or other information stored on a smart card.
18.2. Requirements
For the list of supported Windows remote desktops, see Section 3.1.3, Windows Remote Desktop Support.
230
configure the Windows connector as part of the Sun Ray Software installation or through the utconfig -c command. By default, remote desktop services is not enabled on a Windows system, so you must specifically enable it. See the Windows documentation for details. The uttsc command enables you to establish a remote connection with a Windows system through the Windows connector. An alternative uttscwrap command is also provided for users that use JDS on Oracle Solaris. Many of the functions provided by a local Windows desktop are provided with a Windows session on a client, including the ability to access USB devices connected directly to a Sun Ray Client using USB redirection.
If the Windows system is in the same domain as the Sun Ray Client, you do not have to specify the domain name. However, if you prefer, you may specify the full IP address instead of hostname.domain. Issuing the uttsc command with no options except the name or address of a Windows system displays a Windows session on the Sun Ray Client, as shown in Figure 18.2, Windows Connector (uttsc) Example.
231
The default screen size is 640 x 480 pixels. To display a session in full-screen mode or to modify it in other ways, see the uttsc(1) man page.
Log in as user, enable full screen, enable 24-bit color, disables access to the RDP pull-down menu, and connect to the Windows system at 192.168.1.20:
uttsc -u user -A 24 -m -b 192.168.1.20
Log in as user, enable 24-bit color, set resolution to 1024x768, enable sound quality to high, enable 2 factor authentication, and connect to the Windows system at 192.168.1.20:
uttsc -u user -A 24 -g 1024x768 -r sound:high -r scard:on 192.168.1.20
Log in as user, enable 24-bit color, set resolution to 1024x768, enable sound quality to high, map the home directory to Windows H: drive, and connect to the Windows system at 192.168.1.20:
232
Enable full screen session with smart card authentication enabled and connect to the Windows system windows_system:
uttsc -r scard:on -m windows_system
18.3.2. How to Start a Windows Session Within Java Desktop System (JDS)
The Sun Java Desktop System (JDS) integration package for the Oracle Solaris operating system delivers the command uttscwrap command, which improves integration of the Windows connector with the JDS desktop on Oracle Solaris. The JDS integration package is included in the Supplemental folder of the Sun Ray Software Media Pack. See Section 3.2.5.1, Installing the JDS Integration Package (Oracle Solaris) for detailed installation instructions. The uttscwrap command provides a login dialog that enables you to input credentials for passwordbased authentication (username/domain/password). The credentials can be saved through the dialog for subsequent invocations. At the next launch, the dialog displays the credentials. Note uttscwrap is designed for credential caching for password-based authentication only. It cannot be used with smart card authentication. For smart card authentication, use the uttsc command. Credentials are saved separately for each Windows system and application combination. This convention enables you to save different credentials in the following ways: For different applications on the same server For different applications on different servers For different server sessions with no applications launched Any new credentials saved for a server or application replace previously saved credentials. To use the uttscwrap command, specify the same parameters as the uttsc command line.
Steps
1. Log in to a Sun Ray Client. 2. Start a Windows session on a Windows system.
% /opt/SUNWuttscwrap/bin/uttscwrap options hostname.domain
If the Windows system is in the same domain as the Sun Ray desktop, you do not have to specify the domain name. However, if you prefer, you may specify the full IP address instead of hostname.domain.
233
Ray interfaces for purposes other than their intended use. For these reasons, this feature is not provided as a supported feature. A commonly used approach to implement session locking is to send the lockscreen keystrokes to the Windows Session using xvkbd, which is invoked by utaction. You can invoke the utaction command from an Xsession.d or xinitrc.d script as follows:
#!/bin/sh XVKBD=/usr/openwin/bin/xvkdb /opt/SUNWut/bin/utaction -d "$XVKBD -text 'Ml'" &
Because xvkbd is not available by default, you should modify the XVKBD setting in the example so that it correctly identifies the installation location of xvkbd. Note The keystroke sequence Ml activates the Windows lock for Windows XP and Windows Server 2003 sessions. You might need to substitute a different keystroke sequence for other Windows versions.
The /opt/SUNWuttscwrap/bin path is required only if you are using the JDS integration package.
18.3.6. How to Separate Settings for Session Locale and Keyboard Layout
The Windows connector provides the ability to separate settings for the session local and keyboard layout. The -G option specifies the language/locale for the session and the -Y option specifies the keyboard layout used to process the keyboard input. For example, you can specify the nl-NL Dutch locale with a US international keyboard layout as follows: uttsc -G nl-NL -Y en-US:INT. See the uttsc man page for more details. The -l option is still available and sets both the language/ locale and keyboard layout.
234
Audio input is disabled by default. You can enable audio input by using the following uttsc option:
-r soundin:[low|medium|high|off]
MPEG-2, H.264, Windows Media and VC-1 video Player 10, 11, or 12
Multimedia redirection Audio/Video demuxer component for MPEG-2 and H.264 videos (for example, MatroskaSplitter). This is required because Windows XP and Windows Server 2003 do not decode MPEG-2 and H.264 natively.
Note For Windows 7 and Windows Server 2008, all video players should benefit from the heuristic video detection and acceleration algorithm provided by Sun Ray Software.
235
Videos Accelerated
Advanced Profile Level 0, 352x288 1, 2, and 3 Table 18.4. Video Acceleration on Sun Ray 3 and 3i Clients Windows Desktop Windows 7, 2008, XP, and 2003 Windows 7 and 2008 Windows XP and 2003 Video Type Adobe Flash content MPEG-2 and VC-1 MPEG-2 H.264 Profiles n/a n/a Main Profile Main Level Baseline Profile Level 2.0 Extended Profile minus Data Partitioning Maximum Resolution Size 1024x768 352x288 720x480 720x480
236
Audio Accelerated
Windows Desktop
Video Type
VC-1
Simple Profile Low and 720x480 Medium Level Main Profile Low, Medium, and High Level Advanced Profile Level 0, 1, and 2
Table 18.5. Video Acceleration on Sun Ray 3 Plus Clients Windows Desktop Windows 7, 2008, XP, and 2003 Windows 7 and 2008 Windows XP and 2003 Video Codec Adobe Flash content MPEG-2 and VC-1 MPEG-2 H.264 Profiles n/a n/a Main Profile Main Level Baseline Profile Level 2.0 Extended Profile minus Data Partitioning Main Profile minus CABAC Entropy Coding VC-1 Simple Profile Low and 1280x720 Medium Level Main Profile Low, Medium, and High Level Advanced Profile Level 0, 1, and 2 Maximum Resolution Size 1280x720 352x288 1280x720 1280x720
237
Additional Notes
238
If you hotdesk a client while currently playing a video, the audio and video may become out-of-sync or a run-time error may occur. The workaround is to restart Windows Media Player or Internet Explorer and replay the video. This is a current issue with the MS-RDP client. See Section 18.5.5.7, Windows Media Player Error During Session Reconnection for an example of the Windows Media Player error message. When using 64-bit versions of Windows 7 and Windows Server 2008, a task bar pop-up menu will display behind any Adobe Flash playback area that covers the menu area. If this happens, you need to move the playback area to access the pop-up menu. Adobe Flash playback problems may occur when using Adobe Flash Player 11 on Windows Server 2003. Try using Adobe Flash Player 10.x instead. Third-party software providing similar media acceleration may conflict with the Flash Acceleration component and make it unusable. To make the Flash Acceleration work properly in this situation, you need to uninstall the third-party software and remove/reinstall the Windows connector components on the Windows system.
Steps
1. Become superuser on the Sun Ray server. 2. Enable video acceleration logging:
# kill -USR2 Xnewt-pid
Note To disable messages, use the same command. The Xnewt-pid value is the Xnewt process ID for an individual Sun Ray session. You can find the Xnewt process ID by using the following commands: For Oracle Solaris:
# ps -aef | grep Xnewt | grep userid
Where display is the session display number listed from the utsession command.
239
You can use the Video port Id and stream Id values to find the corresponding performance statistics for the video stream, as described in Section 18.5.5.3, Video Acceleration Performance Statistics. In a multihead configuration, Display indicates the head on which the video is being played. For example, Display :3.1 and Display :3.2. And, each head's Video port Id is in a different range. Table 18.6, Video Acceleration Status Messages provides the list of the video acceleration status messages. Table 18.6. Video Acceleration Status Messages Message Compressed: MPEG-1 Audio Compressed: MPEG-1/2 Video Compressed: VC-1 Compressed: WMA Compressed: H.264 Compressed: AAC Compressed: JPEG-D Start of a compressed video stream (Adobe Flash acceleration). This message is also provided when improved rendering occurs on Windows 7 and 2008. A compressed video stream tried to connect to a client that does not support decoding, either because of the hardware or outdated firmware. The Sun Ray Client signalled an error and the acceleration feature is resending the video header buffers. Start of an XVideo stream. Note that the XVideo protocol does not require start/stop, so an application may send multiple streams without a new debug message. An XVideo stream is using the low bandwidth logic or the bandwidth has increased so it is resuming the normal logic. The session running a video stream has been hotdesked. Comments Start of a compressed video stream (multimedia redirection).
Compressed: codec hotdesked firmware does not support compressed video Compressed: codec error. Replaying headers. YUV: YV12 YUV: I420 YUV: YV12 low bandwidth on YUV: YV12 low bandwidth ended YUV: YV12 hotdesked or swapped codec hotdesked or swapped
If Adobe Flash acceleration has occurred (indicated by the video acceleration icon), but there are no status messages in the log file, then the Adobe Flash content was decompressed on the Sun Ray server and displayed through the X11 API.
240
The column titles in the output are as follows: XvEnc - The name of the accelerated video path. +delta - The delta time (in seconds) from the previous performance entry for the video. This value may be higher (+3) in the first entry when the video is buffering. scrn - The screen on which the video is displaying. prt - The video port ID the video is using. Use this value to find the corresponding status message. strm - The stream ID of the video. Use this value to find the corresponding status message. codec - The video's codec and whether it is using software or hardware decoding. Values include (s) for software decoding without extended firmware, (h) for hardware decoding with extended firmware, and (se) software decoding with extended firmware. WxH - The width by height of the video's output size. X:Y - The X and Y coordinates of the video window's upper-left corner on the screen. avg fps - The average frames per second for the last measured second of the video stream. Examples include: 21 fps = 21 fps rendered
241
17 (26 d) fps = 26 fps were decoded but only 17 were rendered to the screen frames dropped - Used by Oracle support. frames lost - Used by Oracle support. overflow - Used by Oracle support. ms tpf - Used by Oracle support. dtu idle - The average amount of idle time on the Sun Ray Client's CPU. This value ranges from 0-254.
242
Workaround
Delete the following Windows registry key to revert back to the default audio device for the Windows Media Player:
HKEY_CURRENT_USER/Software/Microsoft/MediaPlayer/Preferences/DefaultAudioDevice
Caution Always back up the registry on the Windows system before modifying registry keys.
Workaround
Restart Windows Media Player and replay the video.
243
244
Additional Notes
Note USB headsets do not require or use USB redirection. See Section 15.2, USB Headsets for details.
Writing files to USB flash drives with Oracle Linux may take longer than expected. This reduced performance is because of the 1 Kbyte block size and the file synchronization mechanism of Oracle Linux. Writing files to USB secure flash drives may require administrator permissions on the Windows system.
245
1. Make sure the Windows system has access to the Windows XP ISO used to create the VM. 2. Copy the usbd.sy_ file from the Windows XP ISO to the VM. For 32-bit:
cp ISO-image\i386\usbd.sy_ \windows\system32\drivers
For 64-bit:
cp ISO-image\amd64\usbd.sy_ \windows\system32\drivers
246
reinstall the USB redirection component. See Section 3.2.6, How to Install the Windows Connector Components on a Windows System for details. Figure 18.7. Verifying USB Redirection in Windows Device Manager
When you see this icon, you can connect USB devices to the Sun Ray Client. If you don't see this icon but you know the component is installed, run the following command on the Windows system to restart the USB redirection component:
C:\Program Files\Oracle\Sun Ray\utUsbRedirector\utUsbRedirector.exe
247
Hotdesking
Note The tracer utility output should be sent to Oracle support. The output is not intended for customer diagnosis. To use the tracer utility: 1. Log in as the administrator account on the Windows system. 2. Choose Run from the Start menu. 3. Start the tracing utility using the following command:
C:Program Files\Oracle\SunRay\utUsbTraceController\uttrace start [-s filesize]
This example shows the location of the uttrace command based on the default installation. The -s filesize option specifies the size of the log file before the log output rotates to a new file. filesize must be specified in Mbytes. Default is 500 Mbytes. 4. Log in as the user account and replicate the issue. 5. Stop the tracing utility using the following command:
C:Program Files\Oracle\SunRay\utUsbTraceController\uttrace stop
The tracer utility log files are located in the following directory:
C:Program Files\Oracle\SunRay\Logs
18.7. Hotdesking
This section describes the various ways you can manage a Windows session when hotdesking occurs.
248
Location Awareness
Obtain the unique client's name in a Windows session after session startup or even after hotdesking. The client's name is forwarded during hotdesking. Set up actions through commands or scripts to execute in a Windows session when the associated client session disconnects and reconnects during hotdesking. Actions set up for reconnection also occur at session startup. Note In the context of the Windows connector, the client name is the Sun Ray Client's or Oracle Virtual Desktop Client's ID, also known as the DTU ID. In some situations, this feature replaces the need to use the utaction at the Sun Ray server operating system level, such as setting up follow-me printing. To enable this feature, you must install the Client Information Agent on the Windows system using the Sun Ray Windows Components installer, which is described in Section 3.2.6, How to Install the Windows Connector Components on a Windows System. Once installed, location awareness is enabled by default and is automatically used when a Windows session starts.
249
Session Directory
Caution Always back up the registry on the Window system before modifying registry keys. Here are some examples of registry values for the registry keys mentioned above, where the Commandn name is used to imply order.
Command1=notepad.exe Command2=wscript.exe c:\tmp\myscript.vbs
The data value specifies the command or script to be executed, and you can specify either a 'String' or REG_SZ value type. For an executable command, such as a .exe file, you can specify an absolute path. If you do not provide a path, the executable is searched for in the following order: the current directory, the Windows system directory, the Windows directory, and the directories in the PATH environment. For a script, you should specify the script to be run in an interpreter or shell and the script path must be absolute. For example cmd.exe /c c:\foo\script.bat or wscript.exe c:\foo\script2.vbs
250
Network Security
Data Center edition, or Windows 2008. Session Directory is an optional component that can be configured to use Microsoft proprietary or third-party load balancing products. Terminal services session load balancing is handled transparently by the Windows Terminal Server. For details about setting up and managing a Session Directory and load balancing, refer to the Microsoft documentation.
FIPS-Compliant
251
Auto-reconnect
additional search path/PEM file by using the -j CAPath:path or -j CAfile:pem-file options of the uttsc command. For NLA support, the RDP host must be running Windows 7 or Windows 2008 R2, and you must use the u and -p options with the uttsc command. For both TLS/SSL and NLA support, the Windows system's security layer must be configured as "SSL (TLS 1.0)" or "Negotiate." Table 18.8, Command Line Examples for Enhanced Network Security provides a list of uttsc command line examples that show which security mechanism is used when the Windows Remote Desktop Service is configured to negotiate with the client. A result of "RDP" means that the built-in RDP security is used. Table 18.8. Command Line Examples for Enhanced Network Security uttsc Command Line Examples -u user -p Windows XP RDP Windows Server 2003 SSL/TLS SSL/TLS SSL/TLS RDP Windows 7 NLA SSL/TLS NLA RDP Windows Server 2008 NLA SSL/TLS NLA RDP
You can enforce NLA security on a Windows system. For example, when using Windows Server 2008, select the following option on the Remote tab of the System Properties window: "Allow connections only from computers running Remote Desktop with Network Level Authentication (more secure)". With this option selected, users must use the -u and -p options with the uttsc command to connect to the server. TLS/SSL connections require a certificate to be present on the Windows system. If that is not the case, the connection might fall back to the built-in RDP security (if allowed) or fail.
18.10. Auto-reconnect
The auto-reconnect feature enables a Windows session to reestablish a network connection if it is unexpectedly disconnected. When you are disconnected from a Window session, the Windows connector displays an icon on your screen, as shown in Figure 18.9, Auto-reconnect Icon. Figure 18.9. Auto-reconnect Icon
252
Compression
By default, the Windows connector attempts to reconnect six times before ending the connection. You can control the number of reconnects through the -U number option of the uttsc command. Specifying -U 0 disables the auto-reconnect feature. Note You can also use the -S timeout option, in seconds, to specify the interval for auto-reconnect to detect network loss.
18.11. Compression
The Windows connector uses RDP bulk compression to compress data between the Sun Ray server, which runs the Windows connector, and the Windows system. Compression is enabled by default.
18.12. Licensing
Microsoft Terminal Services licensing information is stored in the Sun Ray data store automatically upon Windows session startup, using the existing LDAP schema. No administrator setup or intervention is required. Licenses can be administered, such as listing and deleting licenses, with the utlicenseadm command. See the utlicenseadm man page for details. The Windows connector supports both per-user and per-device Terminal Server Client Access Licenses (TS-CAL): Per-user mode - The user's hotdesking experience is virtually seamless. Per-device mode - The user must reauthenticate every time they hotdesk to a different client to ensure correct TS-CAL license handling. Note If you access terminal server functionality provided by Microsoft operating system products, you need to purchase additional licenses to use such products. Consult the license agreements for the Microsoft operating system products that you are using to determine which licenses you must acquire. Currently, information regarding Terminal Services can be found at: http://www.microsoft.com/ windowsserver2008/en/us/how-to-buy.aspx
253
Smart Cards
Table 18.9. Windows Licensing Modes The User Removes the Smart Card and... Reinserts the Smart Card in the same client. Per-user Mode Per-device Mode
The user is instantly reconnected to the The user is instantly reconnected to the existing Windows session. existing Windows session.
Inserts the Smart Card in a The user is instantly reconnected to the The Windows login screen prompts the user different client. existing Windows session. for username and password, after which the user is reconnected to the existing Windows session. Other features and services are similarly affected. For example: Windows Media Player stops playing audio/ video file, although the application is still active on the Windows session. The user needs to replay the audio/video file. Any serial port transfer is stopped. All the command line options specified remain valid. Note You can use the -H nodisconnect option of the uttsc command to prevent the Windows connector from disconnecting upon detection of hotdesking events. Note With the -H nodisconnect option, the Windows connector does not disconnect and reconnect when a hotdesk event occurs, nor does it refresh licenses on different clients. Instead, it uses the original license granted upon connection to the first client. This behavior might cause you to inadvertently violate your Microsoft Terminal Server license agreement. Because you have full responsibility for license compliance, be aware of the danger and use the -H nodisconnect option only with caution.
254
255
By default, desktop resizing is disabled. You can enable desktop resizing by using the -f all option of the uttsc command when you initiate a windows session. There are other specific desktop resizing options, which are detailed in the uttsc man page. If you enable desktop resizing in windowed mode (-g option), you can resize the Windows session window by dragging the edge of the window. The size of the Windows desktop is automatically updated. If you enable desktop resizing in fullscreen mode (-m option), you can use the /opt/SUNWut/bin/ utscreenresize -s all command to automatically resize the desktop using the optimal resolutions. Note Desktkop resizing will not work if the Xinerama extension is enabled. See Section 12.2.9, How to Enable and Disable Xinerama for more details.
Oracle Linux:
# cd /etc/X11/xinit/xinitrc.d
3. Create the following customized script to enable automatic desktop resizing (the script is called 0050.desktopresize.sh in this procedure).
#!/bin/sh # Enable automatic Windows desktop resizing each time a user hotdesks /opt/SUNWut/bin/utaction -i -c "/opt/SUNWut/bin/utscreenresize -s all" &
Note The script name should have the 0050. prefix to make sure it is run at the appropriate time. Note For Oracle Linux, the script name must have the .sh extension, otherwise the script will not get sourced. 4. Save the script and make the script executable for everyone.
# chmod 775 0050.desktopresize.sh
256
Printing
5. Start a new session, so the script gets sourced. For the details about configuring a Kiosk session, see Section 10.10, Configuring the Windows Connector Kiosk Session Type.
18.16. Printing
The Windows connector supports printing for the following printer configurations: Network printers visible on the Windows system Network printers visible on the Sun Ray server Local printers attached to the Windows system Local printers attached to the Sun Ray server Local printers attached to the client Here are some important notes about setting up printers for the Windows connector. Network printers are not affected by hotdesking. Printers connected to clients are available for printing from any client connected to the same Sun Ray server. For printers accessible through the Sun Ray server (network visible or local), you need to perform some initial configuration to make the printers accessible through the Windows connector.
To update the Windows session with the available print queues on the Sun Ray server, you must restart the Windows connector with the relevant print queues specified on the command line. See Section 18.16.3, How to Make Sun Ray Printers Available to a Windows Session for details.
257
If a network printer is visible on the Sun Ray server, the queue has been set up already and you should not have to perform this task. These instructions pertain to raw print queues, which is a print queue configured without a printer driver. Please consult your operating system documentation for instructions on setting up queues for PostScript drivers. See also the lp and lpadmin man pages. 1. Uncomment the following line from the /etc/cups/mime.convs file:
application/octet-stream application/vnd.cups-raw 0 -
4. Create a soft link to the Sun Ray printer node in /dev/usb For example, if the device node is /tmp/SUNWut/units/IEEE802.mac-address/dev/ printers/device-node, then use the following command:
# ln -s /tmp/SUNWut/units/IEEE802.mac-address/dev/printers/device-node \ /dev/usb/sunray-printer
Use this soft link (/dev/usb/sunray-printer) as the Device URI while creating the print queue. Note After rebooting, you might have to create the /dev/usb directory and re-create the soft link. 5. To complete the procedure, set up a raw print queue.
# /usr/sbin/lpadmin -p printer-name -E -v usb:/dev/usb/sunray-printer
To update the Windows session with the available print queues on the Sun Ray server, you must restart the Windows connector with the relevant print queues specified on the command line. See Section 18.16.3, How to Make Sun Ray Printers Available to a Windows Session for details.
258
/Control/Print/Environments/Windows NT x86/Drivers/Version-3
All the printer drivers installed on the system are displayed on this list.
Steps
To specify a printer's Windows driver:
% /opt/SUNWuttsc/bin/uttsc -r printer:printer-name="windows-printer-driver-name" hostname.domain
where printer-name is a valid raw print queue on the Sun Ray server and windows-printerdriver-name is the name of the printer exactly as shown on the Windows server. Double quotes are required around the name of the printer. To make a printer available without specifying a driver:
% /opt/SUNWuttsc/bin/uttsc -r printer:printer-name hostname.domain
where printer-name is a valid raw print queue on the Sun Ray server. To make multiple printers available:
% /opt/SUNWuttsc/bin/uttsc -r printer:printer1=driver1,printer2=driver2 hostname.domain
259
Printers Troubleshooting
For example:
#!/bin/sh if [ 'uname' = Linux ] ; then theFlag="-P" fi theMACAddress='cd $theFlag $UTDEVROOT ; /bin/pwd | sed 's/.*?............?/1/'' thePrinter='/opt/SUNWut/sbin/utdesktop -o | grep $theMACAddress | /usr/bin/awk -F, '{print $3}'' echo "_default $thePrinter" > $HOME/.printers
3. Use utaction to invoke the script above on an initial connection and subsequently whenever a user moves from one Sun Ray Client to another. Provide the following scripts based on the user's login manager: dtlogin login manager - Xsession.d script Gnome Display Manager (GDM) - xinitrc.d script For example, you might create the script /usr/dt/config/Xsession.d/1100.SUNWut for dtlogin or /etc/X11/xinit/xinitrc.d/1100.SUNWut for GDM as follows:
#!/bin/sh /opt/SUNWut/bin/utaction -i -c path-to-script &
where path-to-script is the path to the script you created to retrieve the printer name in step 2. Note The name 1100.SUNWut is chosen purposely in this case to ensure that the script is run or sourced after the existing script 0100.SUNWut. The 0100.SUNWut script is responsible for setting $UTDEVROOT, which is needed by the first sample script in step 2. Note For information about the bundled gdmgreeter, see the kiosk man page. 4. Modify your Kiosk session script arguments to redirect the printer to Windows. You may modify these arguments through the Admin GUI. In this example you need to add the argument -r printer:_default to the existing arguments, resulting in an argument list similar to the following:
-t 1800 -- -m -b -r printer:_default myHost
260
Error(%d): Unable to launch Sun Ray Connector. Only SRSS x.x and above are supported.
Sun Ray session is not connected, please try again. Ensure that the Windows connector is being launched from a valid connected Sun Ray session. Cannot obtain client MAC address. The Windows connector was unable to contact the Sun Ray Authentication Manager to retrieve the client's MAC address. Ensure that this daemon is reachable.
Error: Sun Ray Token ID cannot be determined. Sun The Windows connector was launched from a nonRay Connector can only be launched from a Sun Sun Ray session (for example, telnet or console). Ray session. It can only be launched from a connected client session. Unable to create new audio device. Using default audio device. utaudio failed to create a new audio device. Check the messages logged by utaudio for more information. The Windows connector will try to use the default audio device for the session. On Oracle Solaris Trusted Extensions platforms, if the default audio device is not allocated, then the Windows connector will not be able to use any new audio device or the default audio device. In this case, the Windows connector session will proceed but without audio support. If uttscadm has not been run before the Windows connector is launched, the printer preferences as sent by the Windows system will not be stored and hence cannot later be reused. This error is not fatal. The session will continue to be launched. Make sure the proxy daemon (uttscpd) is up and running. If the Windows connector is launched before uttscadm has been run to configure it, then the Windows connector proxy is not reachable. This message occurs only on Oracle Solaris systems.
Device device_name is not allocated. Audio will not work in this session. Continuing..
Warning. Printer preferences will not be stored. Please run uttscadm to complete configuration before launching Sun Ray Connector.
Unable to connect to Sun Ray Connector Proxy. Please ensure uttscadm has been run before launching the Windows connector.
261
General Troubleshooting
Message Unable to launch Sun Ray Connector. Please ensure utconfig has been run before launching the Sun Ray Connector.
Comments If the Windows connector is launched without having configured Sun Ray data store using utconfig (from Sun Ray Software), then the connector cannot be used.
262
This chapter describes how to configure the VMware View connector, which enables Sun Ray Client users to connect to Windows virtual machines through the VMware View Manager.
19.2. Requirements
The following VMware View releases are supported by Sun Ray Software: VMware View 5.0 VMware View 4.6 VMware View 4.5 VMware View 4.0 VMware View 3.1 For the list of supported Windows remote desktops, see Section 3.1.3, Windows Remote Desktop Support.
263
2. Copy the vmware.cer file to the Sun Ray server. 3. Import the certificate into a keystore on the Sun Ray server:
# keytool -import -file vmware.cer -trustcacerts -v -keystore \ /etc/opt/SUNWkio/sessions/vdm/keystore
4. Edit the kiosk script (/etc/opt/SUNWkio/sessions/vdm/vdm) and modify the line that begins with javaKeyStorePass= to include the password for the keystore.
264
5. Restart the Sun Ray server via the Admin GUI. Note The administrator may choose to import the certificate into the default keystore of the server's Java installation instead of following steps 3 and 4. If this is done, the kiosk script must be modified and all references to javaKeyStore and javaKeyStorePass should be removed.
19.7.1.2. This desktop is currently not available. Please try connecting to this desktop again later, or contact your system administrator. The desktop sources for this desktop are not responding. Please try connecting to the desktop again later, or contact your system administrator.
The desktop is not set up properly or is already in use. For example: Someone is logged into the machine (over remote desktop or via the console in VMware vCenter). The machine is powering on/off, or suspending. No free desktops exist for that user. VMware View Agent is not installed on the desktop, or it is not working correctly. Check that the desktop status is available in the VMware View Connection Server. Active Directory and/or DNS is not set up properly on the desktop. There is a network communication problem between VMware View Connection Server and the desktop. A Windows firewall is blocking connections to the desktop.
19.7.1.3. Connection tunneling is required to connect to the desktop, but it is not supported by this client.
Connection tunneling is not supported by the VMware View connector. Solution: See Section 19.4, Disabling Connection Tunneling.
265
Error Messages
266
267
Updating the Default /etc/hosts File Before Configuring Sun Ray Network (Oracle Linux)
20.2. Updating the Default /etc/hosts File Before Configuring Sun Ray Network (Oracle Linux)
The utadm command is not able to parse the default /etc/hosts file when trying to configure the Sun Ray network. The following error may occur when using the utadm -a or utadm -A commands on an Oracle Linux-based Sun Ray server:
Error: host IP address must be set. Set host IP address and try again
On Oracle Linux systems, you must make sure that the system's host name specified during the Oracle Linux installation is configured properly in the /etc/hosts file. The system's host name must be on a separate line in the /etc/hosts file with an IP address matching the host's primary IP address. Here is an example of an etc/hosts file that contains the system's host name, srshost, on the same line as localhost:
127.0.0.1 ::1 srshost localhost.localdomain localhost localhost6.localdomain6 localhost6
The srshost host name must be on its own line for the utadm command to work:
127.0.0.1 ::1 192.168.1.1 localhost.localdomain localhost localhost6.localdomain6 localhost6 srshost
268
How to Configure a Sun Ray Server on a Shared Network to Provide DHCP Services
Table 20.1. Shared Network Configuration Worksheet Aspect or Variable Configuring the Sun Ray interconnect interface using utadm Subnetwork Host address Net mask Net address Host name
(1) (1)
Default Value, Example, or (Other) (Provide the start time) 192.168.128.0 192.168.128.1 255.255.255.0 192.168.128.0 hostnameinterface-name
If the Sun Ray server is used for IP address allocation: First Sun Ray Client address Firmware server Router
(3) (3) (2) (2)
Specify additional server list? (optional) If yes, filename Or, Server IP address
(1) (2)
These values are different for each Sun Ray server, even if that server is part of a failover group.
These values must be unique among the servers in a failover group. The following guidelines can help you determine what addresses to allocate for each Sun Ray server: X = (Number of clients/(Number of servers - 1)) - 1. First unit address for primary server= 192.168.128.16. Last unit address for all servers = X + first unit address. If last unit address is greater than 240, reduce to 240. First unit address for secondary servers = 1 + last unit address of previous server. If first unit address is greater than 239, configure for a class B network. Example: 120 clients, 4 servers. X= 39.
(3)
These values are the same as the interface host address by default.
20.3.2. How to Configure a Sun Ray Server on a Shared Network to Provide DHCP Services
This procedure shows how to configure a Sun Ray Server to provide DHCP services to Sun Ray Clients. 1. Log in as the superuser of the Sun Ray server. 2. Configure the Sun Ray LAN subnet:
# /opt/SUNWut/sbin/utadm -A subnet#
269
The utadm script begins configuring DHCP for the Sun Ray interconnect, restarts the DHCP daemon, and configures the interface. The script then lists the default values and asks whether they are acceptable. Note If the IP addresses and DHCP configuration data are not set up correctly when the interfaces are configured, the failover feature cannot work properly. In particular, configuring the Sun Ray server's subnet IP address as a duplicate of any other server's subnet IP address may cause the Sun Ray Authentication Manager to issue Out of Memory errors. 3. Evaluate the default values. If you are satisfied with the default values and the server is not part of a failover group, answer y. Otherwise, answer n and accept whatever default values are shown by pressing Return or provide the correct values from the worksheet. The utadm script prompts for the following: New netmask (255.255.255.0) New first Sun Ray Client address (192.168.128.16) Total number of Sun Ray Client addresses New authorization server address (192.168.128.1) New firmware server address (192.168.128.10) New router address (192.168.128.1) An additional server list. If you answer yes, it requests either a file name (_filename_) or a server IP address (192.168.128.2) 4. The utadm script again lists the configuration values and asks whether they are acceptable. If not, answer n and revise the answers you provided in Step 3. If the values are correct, answer y. The utadm script configures the Sun Ray Client firmware versions and restarts the DHCP daemon. 5. Repeat this procedure for each of the secondary servers in your failover group. 6. If a router is between the Sun Ray server and the Clients, configure bootp forwarding in the routers.
270
271
273
The default values initially suggested by utadm were not appropriate. Specifically, this server would not have offered any IP addresses on the 130.146.59.0 subnet because utadm assumes that basic networking parameters, including IP addresses, are provided by some external DHCP service when the client is located on a shared subnet. In this example, however, the Sun Ray server is required to provide IP addresses, so the administrator replied n to the first "Accept as is?" prompt and was given the opportunity to provide alternative values for the various parameters. Twenty IP addresses, starting at 130.146.59.200, were made available for allocation to DHCP clients on this subnet. 2. Restart Sun Ray services on the Sun Ray server by issuing the utstart command to fully activate Sun Ray services on the shared subnet.
# /opt/SUNWut/sbin/utstart A warm restart has been initiated... messages will be logged to /var/opt/SUNWut/log/messages.
274
2. Configure the Sun Ray server to accept client connections from shared subnets by running the following command:
# /opt/SUNWut/sbin/utadm -L on ### Turning on Sun Ray LAN connection NOTE: utstart must be run before LAN connections will be allowed
3. Restart Sun Ray services on the Sun Ray server by issuing the utstart command to fully activate Sun Ray services on the shared subnet.
# /opt/SUNWut/sbin/utstart A warm restart has been initiated... messages will be logged to /var/opt/SUNWut/log/messages.
based mechanism. However, the clients broadcast packets propagate only on the local subnet so they cannot reach a Sun Ray server located on a remote subnet, and cannot establish contact. The next two examples illustrate representative remote shared subnet configurations. In the first example, an external DHCP service provides basic networking parameters, and the Sun Ray server provides additional parameters. This configuration is by far the most likely for a Sun Ray deployment in an enterprise that has an established DHCP infrastructure. In the second example, basic networking parameters and a bare minimum of additional parameters, just enough to enable the client to contact a Sun Ray server, are supplied by an external DHCP. In this case, the DHCP service is in a Cisco router. This scenario is less than ideal. No firmware parameters are delivered to the client, so it cannot download new firmware. The administrator must make some other arrangement to provide the client with new firmware, for instance, by rotating it off this subnet periodically onto an interconnect or onto some other shared subnet where a full set of additional configuration parameters is offered.
276
Because the Sun Ray server does not have its own direct connection to this subnet, the administrator must configure a DHCP Relay Agent to deliver the subnet's DHCP traffic to the Sun Ray server. The most likely location for such a Relay Agent would be on a router in this subnet, in this case, the router named r22-59 in Figure 20.1, Example of Alternate Shared Network Topology. For a brief introduction to this topic, refer to Section 20.5, Sun Ray Client Initialization Requirements Using DHCP. If r22-59 is running the Cisco IOS, the ip helper-address command can be used to activate its DHCP Relay Agent to relay DHCP broadcasts from its 10/100 Ethernet port number 4 to the Sun Ray server at 130.146.59.5
r22-59> interface fastethernet 4 r22-59> ip helper-address 130.146.59.5 r22-59>
If the external DHCP service also lacks a connection to this subnet, configure a DHCP Relay Agent to forward requests from the client to the following services: The external DHCP service so that the client can obtain basic networking parameters The DHCP service on the Sun Ray server so that the client can obtain additional parameters The Cisco IOS ip helper-address command accepts multiple relay destination addresses, so if, for example, the external DHCP service could be contacted at 130.146.59.2 on subnet B in Figure 20.1, Example of Alternate Shared Network Topology, the appropriate sequence would be:
r22-59> interface fastethernet 4 r22-59> ip helper-address 130.146.59.2 130.146.59.5 r22-59>
Note Details of the IOS interaction vary according to the specific release of IOS, the model of the router, and the hardware installed in the router. 3. Configure the Sun Ray server to provide additional parameters to the shared subnet. Use the utadm -A subnet command to configure DHCP service for clients on a shared subnet. In this example, the shared subnet has network number 130.146.22.0, so the appropriate command is utadm -A 130.146.22.0.
# /opt/SUNWut/sbin/utadm -A 130.146.22.0 Selected values for subnetwork "130.146.22.0" net mask: 255.255.255.0 no IP addresses offered auth server list: 130.146.59.5 firmware server: 130.146.59.5 router: 130.146.22.1 Accept as is? ([Y]/N): n new netmask:[255.255.255.0] Do you want to offer IP addresses for this subnet? (Y/[N]): new auth server list: [130.146.59.5] To read auth server list from file, enter file name: Auth server IP address (enter <CR> to end list): If no server in the auth server list responds, should an auth server be located by broadcasting on the network? ([Y]/N): new firmware server: [130.146.59.5] new router: [130.146.22.1] 130.146.22.6 Selected values for subnetwork "130.146.59.0"
277
net mask: 255.255.255.0 no IP addresses offered auth server list: 130.146.59.5 firmware server: 130.146.59.5 router: 130.146.22.6 Accept as is? ([Y]/N): ### Building network tables - this will take a few minutes ### Configuring firmware version for Sun Ray All the units served by "helios" on the 130.146.22.0 network interface, running firmware other than version "2.0_37.b,REV=2002.12.19.07.46" will be upgraded at their next power-on. ### Configuring Sun Ray Logging Functions ### stopped DHCP daemon ### started DHCP daemon #
In this example, the default values initially suggested by utadm were not appropriate. Specifically, the default router address to be used by clients on this subnet was not correct because utadm guesses that the address of the default router for any shared subnet will have a host part equal to 1. This was a great guess for the directly connected subnet B in Figure 20.1, Example of Alternate Shared Network Topology, but it is not correct for subnet C. The appropriate router address for clients on this subnet is 130.146.22.6 (port 4 of router r22-59), so the administrator replied n to the first Accept as is? prompt and was given the opportunity to provide alternative values for the various parameters. 4. Restart Sun Ray services on the Sun Ray server by issuing the utstart command to fully activate Sun Ray services on the shared subnet.
# /opt/SUNWut/sbin/utstart A warm restart has been initiated... messages will be logged to /var/opt/SUNWut/log/messages.
278
1. Configure the external DHCP service. Determining how to configure the external DHCP infrastructure to provide basic networking parameters to the clients on this subnet is beyond the scope of this document. However, for this example, assume that DHCP service is provided by Cisco IOS-based router r22-71 in Figure 20.1, Example of Alternate Shared Network Topology, attached to the 130.146.71.0 subnet through its 10/100 Ethernet port 3. This router can be configured to provide basic networking parameters and the location of a Sun Ray server as follows:
r22-71> interface fastethernet 3 r22-71> ip dhcp excluded-address 130.146.71.1 130.146.71.15 r22-71> ip dhcp pool CLIENT r22-71/dhcp> import all r22-71/dhcp> network 130.146.71.0 255.255.255.0 r22-71/dhcp> default-router 130.146.71.4 r22-71/dhcp> option 49 ip 130.146.59.5 r22-71/dhcp> lease 0 2 r22-71/dhcp> ^Z r22-71>
Note Details of the IOS interaction vary according to the specific release of IOS, the model of router and the hardware installed in the router. DHCP option 49, the standard option of the X Window Display Manager, identifies 130.146.59.5 as the address of a Sun Ray server. In the absence of AltAuth and Auth-Srvr vendor-specific options, the client tries to find a Sun Ray server by broadcasting on the local subnet. If the broadcasts evoke no response, the client uses the address supplied in t option of the X Window Display Manager. Note This example is an unorthodox use of the option of the X Window Display Manager, but in a remote subnet deployment where vendor-specific options can not be delivered, it might be the only way of putting a client in touch with a server. 2. Configure the Sun Ray server to accept client connections from shared subnets by running utadm -L on.
# /opt/SUNWut/sbin/utadm -L on ### Turning on Sun Ray LAN connection NOTE: utstart must be run before LAN connections will be allowed #
3. Restart Sun Ray services on the Sun Ray server by issuing the utstart command to fully activate Sun Ray services on the shared subnet.
# /opt/SUNWut/sbin/utstart A warm restart has been initiated... messages will be logged to /var/opt/SUNWut/log/messages.
279
The Sun Ray server handles all the Sun Ray Client's IP and device configurations. The Sun Ray server defines the subnet's characteristics (such as the IP range and subnet). Only Sun Ray Clients are connected to the subnet. The Sun Ray server provides DHCP services. The private network is configured by using the utadm -a interface command. Figure 20.2, Private Network Example shows an example of a private network configuration. Figure 20.2. Private Network Example
280
Default Value, Example, or (Other) hme1 (Oracle Solaris), eth1 (Oracle Linux)
(1)
If the Sun Ray server is used for IP address allocation: First Sun Ray Client address Number of Sun Ray Client addresses Firmware server Router
(3) (3) (2)
192.168.128.16 X 192.168.128.1 192.168.128.1 (yes or no) filename 192.168.128.2 (Provide the start time) adminpass /opt/apachetomcat 1660 (yes or no) (yes or no) (yes or no) utku utkiosk 150000 25 (yes or no) signature1
(5)
Specify additional server list? (optional) If yes, filename Or, Server IP address Configuring Sun Ray Software using utconfig Admin password Configure Admin GUI? If yes, then: Apache Tomcat installation directory Sun Ray admin server port number Enable remote administration? (optional) Enable secure connection? (optional) Configure Kiosk Mode? (optional) If yes, User prefix Group name User ID range start Number of users
(4)
These values are different for each Sun Ray server, even if that server is part of a failover group.
These values must be unique among the servers in a failover group. The following guidelines can help you determine what addresses to allocate for each Sun Ray server: X = (Number of clients/(Number of servers - 1)) - 1 First unit address for primary server= 192.168.128.16
281
Last unit address for all servers = X + first unit address. If last unit address is greater than 240, reduce to 240. First unit address for secondary servers = 1 + last unit address of previous server. If first unit address is greater than 239, configure for a class B network. Example: 120 clients, 4 servers. X= 39
(3) (4)
These values are the same as the interface host address by default. The value entered for the number of users is the greater of:
The total number of Sun Ray Clients The total number of disconnected and active sessions
(5)
This signature^ must be the same for every Sun Ray server in a failover group. The signature requires at least one numeric character.
where interface-name is the name of the interface to the Sun Ray interconnect, for example: hme1, qfe0, or ge0 (Oracle Solaris) or eth1 (Oracle Linux). The utadm script begins configuring DHCP for the Sun Ray interconnect, restarts the DHCP daemon, and configures the interface. The script then lists the default values and asks whether they are acceptable. Note If the IP addresses and DHCP configuration data are not set up correctly when the interfaces are configured, the failover feature cannot work properly. In particular, configuring the Sun Ray server's interconnect IP address as a duplicate of any other server's interconnect IP address may cause the Sun Ray Authentication Manager to generate Out of Memory errors. 3. Evaluate the default values: If you are satisfied with the default values, and the server is not part of a failover group, answer y. Otherwise, answer n and accept whatever default values are shown by pressing Return, or provide the correct values from the worksheet. The utadm script prompts for the following: New host address (192.168.128.1) New netmask (255.255.255.0)
282
New host name (hostname-interface-name) Offer IP addresses for this interface? ([Y]/N) New first Sun Ray Client address (92.168.128.16) Total number of Sun Ray Client address (X) New authorization server address (192.168.128.1) New firmware server address (192.168.128.1) New router address (192.168.128.1) An additional server list. If you answer yes, it requests either a file name (filename) or a Server IP Address (192.168.128.2). 4. The utadm script again lists the configuration values and asks whether they are acceptable. If not, answer n and revise the answers provided in Step 3. If the values are correct, answer y. The following Sun Ray files are configured: For Oracle Solaris:
/etc/hostname.interface-name /etc/inet/hosts /etc/inet/netmasks /etc/inet/networks
The utadm script configures the Sun Ray Client firmware versions and restarts the DHCP daemon. 5. Repeat this procedure for each of the secondary servers in your failover group.
For each interface, this command displays the host name, network, netmask, and number of IP addresses assigned to Sun Ray Clients by DHCP. Note Sun Ray servers require static IP addresses; therefore, they cannot be DHCP clients.
283
This command deletes the entries that were made in the hosts, networks, and netmasks files and deactivates the interface as a Sun Ray interconnect.
284
Subnet A is a private network. Its subnet will use IP addresses in the range 192.168.128.0/24. The Sun Ray server named helios is attached to the interconnect through its qfe2 network interface, which will be assigned the IP address 192.168.128.3.
285
In an interconnect scenario, the DHCP service on the Sun Ray server always provides both basic networking parameters and additional configuration parameters to the Sun Ray Client. The answers to the three predeployment questions are as follows: From which DHCP server will clients on this subnet get their basic IP networking parameters? On a directly connected dedicated interconnect, basic networking parameters are always supplied by the DHCP service on the Sun Ray server. From which DHCP server will clients on this subnet get additional configuration parameters to support features such as firmware download? On a directly connected dedicated interconnect, additional configuration parameters are always supplied by the DHCP service on the Sun Ray server. How will clients on this subnet locate their Sun Ray server? On a directly connected dedicated interconnect, the Sun Ray Client is always notified of the location of the Sun Ray server through an additional configuration parameter supplied when Sun Ray services are restarted. This example shows the DHCP service for the directly connected dedicated interconnect A shown in Figure 20.3, Example of Alternate Private Network Topology. 1. Configure the Sun Ray server to provide both basic and additional parameters to the interconnect. Use the utadm -a interface-name command to configure DHCP service for clients on an interconnect. In this example, the interconnect is attached through interface qfe2:
# /opt/SUNWut/sbin/utadm -a qfe2 ### Configuring /etc/nsswitch.conf ### Configuring Service information for Sun Ray ### Disabling Routing ### configuring qfe2 interface at subnet 192.168.128.0 Selected values for interface "qfe2" host address: 192.168.128.1 net mask: 255.255.255.0 net address: 192.168.128.0 host name: helios-qfe2 net name: SunRay-qfe2 first unit address: 192.168.128.16 last unit address: 192.168.128.240 auth server list: 192.168.128.1 firmware server: 192.168.128.1 router: 192.168.128.1 Accept as is? ([Y]/N): n new host address: [192.168.128.1] 192.168.128.3 new netmask: [255.255.255.0] new host name: [helios-qfe2] Do you want to offer IP addresses for this interface? ([Y]/N): new first Sun Ray address: [192.168.128.16] number of Sun Ray addresses to allocate: [239] new auth server list: [192.168.128.3] To read auth server list from file, enter file name: Auth server IP address (enter <CR> to end list): If no server in the auth server list responds, should an auth server be located by broadcasting on the network? ([Y]/N): new firmware server: [192.168.128.3] new router: [192.168.128.3] Selected values for interface "qfe2" host address: 192.168.128.3 net mask: 255.255.255.0 net address: 192.168.128.0
286
host name: helios-qfe2 net name: SunRay-qfe2 first unit address: 192.168.128.16 last unit address: 192.168.128.254 auth server list: 192.168.128.3 firmware server: 1 192.168.128.3 router: 192.168.128.3 Accept as is? ([Y]/N): ### successfully set up "/etc/hostname.qfe2" file ### successfully set up "/etc/inet/hosts" file ### successfully set up "/etc/inet/netmasks" file ### successfully set up "/etc/inet/networks" file ### finished install of "qfe2" interface ### Building network tables - this will take a few minutes ### Configuring firmware version for Sun Ray All the units served by "helios" on the 192.168.128.0 network interface, running firmware other than version "2.0_37.b,REV=2002.12.19.07.46" will be upgraded at their next power-on. ### Configuring Sun Ray Logging Functions DHCP is not currently running, should I start it? ([Y]/N): ### started DHCP daemon #
In this example, the default values initially suggested by utadm were not appropriate. Specifically, the suggested value for the server's IP address on the interconnect was not the desired value. The administrator replied n to the first "Accept as is?" prompt and was given the opportunity to provide alternative values for the various parameters. 2. Restart Sun Ray services on the Sun Ray server by issuing the utstart command to fully activate Sun Ray services on the newly defined interconnect.
# /opt/SUNWut/sbin/utstart A warm restart has been initiated... messages will be logged to /var/opt/SUNWut/log/messages.
DHCP Basics
Ray Client. The Oracle Solaris DHCP service is one such implementation. Third-party implementations executing on non-Sun platforms can also be configured to deliver information to Sun Ray Clients. The DHCP protocol defines a number of standard options that can be used to inform the client of a variety of common network capabilities. DHCP also allows a number of vendor-specific options that carry information that is meaningful only to individual products. For more information, see Table 20.4, Alternate Vendor-Specific DHCP Options. The Sun Ray Client depends on a small number of standard options to establish its basic network parameters. It depends on several standard and vendor-specific options to provide the additional information that constitutes a complete client configuration. If these additional configuration parameters are not supplied, the client cannot perform certain activities, the most important of which is the downloading of new Sun Ray Client firmware. Table 20.4, Alternate Vendor-Specific DHCP Options lists the vendorspecific options. Note If an administrator chooses not to make this additional configuration information available to the Sun Ray Clients, a procedure must be established to deliver firmware updates to them. One solution would be a small, dedicated interconnect on one Sun Ray server. Then, the administrator can transfer the clients one-by-one when new firmware becomes available on the server, for example, through a patch or Sun Ray product upgrade. The location of the Sun Ray server is usually conveyed to the Sun Ray Client through one of a pair of DHCP vendor-specific options, AuthSrvr and AltAuth. If the Sun Ray Client does not receive this information, it uses a broadcast-based discovery mechanism to find a Sun Ray server on its subnet. If the broadcast-based discovery mechanism fails, the Sun Ray Client interprets the DHCP standard option (option 49) of the X Window Display Manager as a list of Sun Ray server addresses where it attempts to contact Sun Ray services. This feature can simplify the DHCP configuration of LAN-deployed Sun Rays by removing the need for a DHCP vendor option to carry this information. Table 20.3, DHCP Service Parameters Available provides the list of available DHCP service parameters. Table 20.3. DHCP Service Parameters Available Parameters Sun Ray Server DHCP Service External DHCP Service With Vendor-Specific Options Yes Yes External DHCP Service Without Vendor-Specific Options Yes No No DHCP Service
Yes
No No
Additional Yes parameters (for firmware download, etc.) Sun Ray server location Yes
Yes
Yes, through Yes, through broadcast discovery broadcast discovery or the X Display Manager standard option
288
Option 49, the X Window System Display Manager option, lists IP addresses 10.6.129.67 and 129.146.58.136 as Sun Ray servers. The Sun Ray Client tries to connect to those servers when it
289
receives a DHCP response from the router. Option 26 sets the Maximum Transmission Unit (MTU), which defines the maximum packet size for the Sun Ray connections, in this case, 1366 bytes rather than the default Ethernet MTU of 1500 bytes. This setting is necessary to provide space for the IPSec headers to implement a virtual private network (VPN) connection. The DHCP service, either directly from an ISP or from a home firewall, is also required to assign the router its IP address behind the firewall. The router's WAN port either plugs directly into the DSL/Cable modem or into the home firewall or gateway. The Sun Ray Client then plugs into one of the four LAN ports on the router. A VPN router plugged directly into the DSL or cable modem can be connected only to a Sun Ray Client. If the router has been configured to supply DHCP parameters to the Sun Ray Client, it will instruct the client to try to connect to the appropriate Sun Ray server. The router should start a VPN tunnel when it is plugged in, which it should always be on. Each router should be connected to the VPN gateway and programmed with a user name based on an user's ID and a random password. The VPN gateway should be configured to allow only Sun Ray traffic to pass, and only to a limited number of hosts, so that users cannot connect anything else to the LAN side of the router and then connect into the corporate network. However, users may connect more than one Sun Ray Client. Whenever a VPN or other tunnel is being used, you need to take account of the IP MTU across the path between the server and the Sun Ray Client. The VPN typically packs additional control data into each packet, which reduces the available space for application data. The latest Sun Ray firmware attempts to compensate for this reduction automatically, but this process is not always possible. Make sure that the Sun Ray Client has the latest firmware. Installing the latest patch on the server is not sufficient. You must also make sure that the client was configured to update its firmware and then check that the update occurred. If the Sun Ray Client has the latest firmware but the problem still occurs, then the client must be set to work with a reduced MTU. You can update the client through whatever mechanism you use to give the Sun Ray its basic configuration data, such as DHCP, TFTP or, if the client is running GUI-capable firmware, local configuration on the Sun Ray Client itself. The site should know what the effective MTU is across the VPN. If not, see any available technical archives or the ThinkThin blog on http://blogs.oracle.com/ThinkThin/. If a precise MTU is not important, then a low estimate, such as 1350 (the standard value is 1500), should be sufficient to let you verify that MTU is the cause of the problem. After you update and restart the Sun Ray Client, the client reports the new MTU value to the server, and the server adjusts its packet-construction strategy to fit within that MTU. The client should no longer send Sun Ray traffic that is too big to be delivered in one piece through the VPN tunnel. Note Local settings on the Sun Ray Client generally override values obtained from other sources, such as .parms files or DHCP. Therefore, you must provide the ability to clear a setting so that the value from a .parms file is not overridden and can be used for configuration. For numeric values, include an empty field. For switch settings, click the Clear button when modifying a setting. The utquery output from a client reflects the values that are defined in the local configuration.
290
If sunray-config-servers and sunray-servers are defined appropriately by the DNS serving a set of remote Sun Rays Clients, no extra DHCP parameters are required other than basic network information. A DNS client incorporated in the firmware allows many values to be names rather than IP addresses. Most values can be either a name or an IP address. If a name is specified, the DNS lookup appends the configured domain name. Components are stripped successively until the lookup succeeds or only two components are left in the domain name. If none of those lookups succeed, the name is looked up by itself. If the name itself ends with a dot character ("."), the name is taken to be a rooted name, and it is looked up without domain name components appended. DHCP option 66 (TFTP server name) is supported as an alternative to the FWSrvr vendor-specific option listed in Section 20.5.6, Vendor-specific DHCP Options. This string value must either be a single IP address or a DNS host name that resolves to a list of IP addresses. If it is a list of IP addresses, one is chosen randomly. A firmware maintenance mechanism creates *.parms files in /tftpboot (one for each model type), which are read in lieu of using the NewTVer DHCP vendor option. Thus, remote firmware upgrades are possible without DHCP access to the NewTVer value. The *.parms files contain the version, hardware revision, and barrier levels, eliminating unnecessary file reads in cases where the barrier would have prevented writing the firmware to flash memory. For details on options that can be used to configure the .parms files, see the utfwadm man page. A default DNS name for the firmware server, sunray-config-servers, is used when neither option 66 nor FWSrvr given. Defining this name in DNS provides the firmware server address without DHCP options, just DNS servers and domain name. Inclusion of servers=_server name list_ and select=inorder|random in the *.parms files enables specification of a list of server names and specification of whether the names should be used in order, or at random. If a name resolves to multiple addresses, an IP address is chosen according to the select keyword. When neither a server list nor an AltAuth list is provided, the default name sunray-servers is looked up in DNS and the list of IP addresses is used in place of the AltAuth list. In the event of an error in the firmware download, error messages provide additional information that can be useful in diagnosing and correcting the problem. See Chapter 16, Sun Ray Client Troubleshooting Icons. Also, during DNS lookups, a status line in the OSD icon shows the name being looked up and, if one is found, the IP address.
SUNW.NewT.SUNW IP
22
AuthPort
SUNW.NewT.SUNW NUMBER
Optional
291
Client Class
Data Type Required? Granularity Max Comments Count Optional 1 0 Desired firmware version Syslog server IP address Log level for kernel Log level for network Log level for USB Log level for video Log level for firmware application Bandwidth cap, value is bits per second Firmware TFTP server IP address Obsolete. Do not use. Sun Ray server interface name Obsolete. Do not use. List of Sun Ray server IP addresses Firmware Download: barrier level
SUNW.NewT.SUNW ASCII
24
LogHost
SUNW.NewT.SUNW IP
Optional
25 26 27 28 29
SUNW.NewT.SUNW NUMBER SUNW.NewT.SUNW NUMBER SUNW.NewT.SUNW NUMBER SUNW.NewT.SUNW NUMBER SUNW.NewT.SUNW NUMBER
1 1 1 1 1
1 1 1 1 1
30
NewTBW
SUNW.NewT.SUNW NUMBER
Optional
31
FWSrvr
SUNW.NewT.SUNW IP
Optional
32 33
Optional Optional
4 1
1 0
34 35
NewTFlags AltAuth
Optional Optional
4 1
1 0
36
Mandatory 4
The client can perform its basic functions even if none of these options are delivered during initialization, but some advanced client features do not become active unless certain options are delivered to the client. In particular:
292
Encapsulated Options
AltAuth and AuthSrvr indicate the IP addresses of Sun Ray servers. Addresses in the AltAuth list are tried in order until a connection is established. Current firmware ignores AuthSrvr if AltAuth is provided, but always specify AuthSrvr for the benefit of old (pre Sun Ray Server Software 1.3) firmware, which cannot handle the AltAuth option. If neither of these options is supplied, the client tries to locate a Sun Ray server by sending broadcasts on the local subnet. The client tries to contact a Sun Ray server at the address supplied in the option of the X Window Display Manager if that option has been provided. NewTVer and FWSrvr must both be provided in order for the client to attempt a firmware download. NewTVer contains the name of the firmware version that the client should use. If this name does not match the name of the firmware version that the client is actually running, the client tries to download the desired firmware from a TFTP server at the address given by FWSrvr. LogHost must be specified in order for the client to report messages through the syslog protocol. Reporting thresholds for major client subsystems are controlled by the LogKern, LogNet, LogUSB, LogVid, and LogAppl options. Note Because the message formats, contents, and thresholds are intended for use only by service personnel, they are not documented here. The DHCP Client Class name for all Sun Ray vendor-specific options is SUNW.NewT.SUNW. The client cites this name in DHCP requests so that the server can respond with the appropriate set of vendorspecific options. This mechanism guarantees that the client is not sent vendor options defined for some other type of equipment and that other equipment is not sent options that are meaningful only to the client.
Note In this description, hexadecimal values are preceded by 0x and followed by their decimal value, after an = sign, as in 0x2b=43. The first byte is the option code. The next byte represents the encapsulated option length, that is, the number of bytes that make up the option value. The next one or more bytes make up the multi-byte option value. The option value is followed by another encapsulated option code, and so on. 293
Failover Groups
The example begins with 0x2b=43, the DHCP option for vendor-specific information. It has a length of 0x4a=74 bytes, which is the total number of bytes that follow. These bytes contain the encapsulated vendor options. The remainder of the example represents the value of the vendor-specific information options. The first byte contains the first encapsulated option, whose value is 0x17=23, and the NewTVer option, whose value type is ASCII. The next byte is 0x1d=29, which is the length of the NewTVer string. These options are followed by 29 bytes that represent the string itself. The ASCII interpretation at the right of the DHCPACK, is 2.0_19.c,REV=2002.09.06.15.54. This is the end of the first encapsulated option. The next byte is the beginning of the next option, Intf, represented by 0x21=33. The next byte, the length, is 0x04=4, and the next four bytes are the ASCII value hme0. That's the end of the second encapsulated option. The next byte is 0x1f=31, which represents the FWSrvr parameter, whose function is to indicate the IP address of the firmware TFTP server. The next byte is the length, 4, which is always be true for an IP address. The hexadecimal value is 0x81 0x92 0x3a 0x88, which corresponds to the IP address 129.146.58.136.
294
Network Topologies
Figure 20.4, Simple Failover Group shows a simple failover group setup. Figure 20.4. Simple Failover Group
When a server in a failover group fails for any reason, each Sun Ray Client connected to that server reconnects to another server in the same failover group. The failover occurs at the user authentication level: the client connects to a previously existing session for the user's token. If session exists, the client connects to a server selected by the load-balancing algorithm. This server then presents a login screen to the user, and the user must relogin to create a new session. The state of the session on the failed server is lost. Figure 20.5, Redundant Failover Group shows an example of a redundant failover group.
295
Setting Up IP Addressing
The redundant failover group, shown in the illustration above, can provide maximum resources to a few Sun Ray Clients. The server sr47 is the primary Sun Ray server, and sr48 is the secondary Sun Ray server; other secondary servers (sr49, sr50, and so on) are not shown.
296
Setting Up IP Addressing
Table 20.5. Configuring 5 Servers for 100 clients CLASS C (2 Servers Fail) Servers serverA serverB serverC serverD serverE Interface Address 192.168.128.1 192.168.128.2 192.168.128.3 192.168.128.4 192.168.128.5 Client Address Range 192.168.128.16 to 192.168.128.49 192.168.128.50 to 192.168.128.83 192.168.128.84 to 192.168.128.117 192.168.128.118 to 192.168.128.151 192.168.128.152 to 192.168.128.185 CLASS B (4 Servers Fail) Interface Address 192.168.128.1 192.168.129.1 192.168.130.1 192.168.131.1 192.168.132.1 Client Address Range 192.168.128.16 to 192.168.128.116 192.168.129.16 to 192.168.129.116 192.168.130.16 to 192.168.130.116 192.168.131.16 to 192.168.131.116 192.168.132.16 to 192.168.132.116
The formula for address allocation is: address range (AR) = number of clients/(total servers - failed servers). For example, in the case of the loss of two servers, each DHCP server must be given a range of 100/(5-2) = 34 addresses. Ideally, each server would have an address for each client. This setup requires a class B network. Consider these conditions: If AR multiplied by the total number of servers is less than or equal to 225, configure for a class C network If AR multiplied by the total number of servers is greater than 225, configure for a class B network Note If all available DHCP addresses are allocated, a Sun Ray Client could request an address and still not find one available, perhaps because another unit has been allocated IP addresses by multiple servers. To prevent this condition, provide each DHCP server with enough addresses to serve all the Sun Ray Clients in a failover group.
297
Setting Up IP Addressing
Note For the broadcast feature to be enabled, the broadcast address (255.255.255.255) must be the last one in the list. Any addresses after the broadcast address are ignored. If the local server is not on the list, Sun Ray Clients cannot attempt to contact it. Once a TCP connection to an Authentication Manager has been established, the client presents its token. The token is either a pseudo-token representing the individual client (its unique Ethernet address) or a smart card. The Session Manager then starts an X Window/X server session and binds the token to that session. The Authentication Manager then sends a query to all the other Authentication Managers on the same subnet and asks for information about existing sessions for the token. The other Authentication Managers respond, indicating whether a session for the token exists and the last time the token was connected to the session. The requesting Authentication Manager selects the server with the latest connection time and redirects the client to that server. If no session is found for the token, the requesting Authentication Manager selects the server with the lightest load and redirects the token to that server. A new session is created for the token. The Authentication Manager enables both implicit (smart card) and explicit switching.
20.6.2.3.1. Coexistence of the Sun Ray Server With Other DHCP Servers
The Sun Ray DHCP server can coexist with DHCP servers on other subnets, provided that you isolate the Sun Ray DHCP server from other DHCP traffic. Verify that all routers on the network are configured not to relay DHCP requests, which is the default behavior for most routers. Caution If the IP addresses and DHCP configuration data are not set up correctly when the interfaces are configured, the failover feature cannot work properly. In particular, configuring the Sun Ray server's interconnect IP address as a duplicate of any other server's interconnect IP address may cause the Sun Ray Authentication Manager to issue "Out of Memory" errors.
20.6.2.5. How to Set Up IP Addressing on Multiple Servers, Each with One Sun Ray Interface
1. Log in to the Sun Ray server as superuser and, open a shell window. Type:
# /opt/SUNWut/sbin/utadm -a interface_name
298
Setting Up IP Addressing
where interface_name is the name of the Sun Ray network interface to be configured; for example, hme[0-9], qfe[0-9], or ge[0-9]. You must be logged on as superuser to run this command. The utadm script configures the interface (for example, hme1) at the subnet (in this example, 128). The script displays default values, such as the following:
Selected values for interface "hme1" host address: 192.168.128.1 net mask: 255.255.255.0 net address: 192.168.128.0 host name: serverB-hme1 net name: SunRay-hme1 first unit address: 192.168.128.16 last unit address: 192.168.128.240 auth server list: 192.168.128.1 firmware server: 192.168.128.1 router: 192.168.128.1 |
The default values are the same for each server in a failover group. Certain values must be changed to be unique to each server. 2. When you are asked to accept the default values, type n
Accept as is? ([Y]/N): n
3. Change the second server's IP address to a unique value, in this case 192.168.128.2:
new host address: [192.168.128.1] 192.168.128.2 |
4. Accept the default values for netmask, host name, and net name:
new netmask: [255.255.255.0] new host name: [serverB-hme1]
5. Change the client address ranges for the interconnect to unique values. For example:
Do you want to offer IP addresses for this interface? [Y/N]: new first Sun Ray address: [192.168.128.16] 192.168.128.50 number of Sun Ray addresses to allocate: [205] 34
The utadm script asks if you want to specify an authentication server list:
auth server list: 192.168.128.1 To read auth server list from file, enter file name: Auth server IP address (enter <CR> to end list): If no server in the auth server list responds, should an auth server be located by broadcasting on the network? ([Y]/N):
These servers are specified by a file containing a space-delimited list of server IP addresses or by manually entering the server IP addresses. The newly selected values for interface hme1 are displayed:
Selected values for interface "hme1" host address: 192.168.128.2 net mask: 255.255.255.0 net address: 192.168.128.0 host name: serverB-hme1
299
net name: SunRay-hme1 first unit address: 192.168.128.50 last unit address: 192.168.128.83 auth server list: 192.168.128.1 firmware server: 192.168.128.2 router: 192.168.128.2
8. Stop and restart the server and power cycle the clients to download the firmware. Table 20.6, utadm Available Options lists the options available for the utadm command. For additional information, see the utadm man page. Table 20.6. utadm Available Options Option -c -r -A subnetwork Definition Create a framework for the Sun Ray interconnect. Remove all Sun Ray interconnects. Configure the subnetwork specified as a Sun Ray sub-network. This option only configures the DHCP service to allocate IP address and/or to provide Sun Ray parameters to Sun Ray clients. It also will automatically turn on support for LAN connections from a shared subnetwork. Add interface_name as Sun Ray interconnect. Delete the subnetwork specified form the list of configured Sun Ray subnetworks. Delete interface_name as Sun Ray interconnect. Print the current configuration for all the Sun Ray subnetworks, including remote subnetworks. Print the current configuration. Take a server offline Bring a server online Print the current configuration in a machine-readable format
300
Table 20.7. Sun Ray Server Failover Group Worksheet Aspect or Variable Default Value, Your Primary Example, or (Other) Server Value Your Secondary Server Value
Configuring the Sun Ray server hierarchy (Provide the start using utreplica (required for failover groups) time) Primary Sun Ray server host name
(1) (1)
primary-server secondary-server
These values are different for each Sun Ray server, even if that server is part of a failover group.
Table 20.8. First and Last Unit Address in a Failover Group Server Primary Secondary Secondary Secondary Note If you forget the address range, use utadm -l to list the addresses you specified or utadm -p to print them. First Unit Address 192.168.128.16 192.168.128.56 192.168.128.96 192.168.128.136 Last Unit Address 192.168.128.55 192.168.128.95 192.168.128.135 192.168.128.175
301
302
21.2. How to Improve Sun Ray Client Performance by Decreasing Buffering on the Network Switch (Oracle Solaris)
Some network switches do not work well with Sun Ray Clients when the server-side connection is configured to run at 1 Gbps. Because the Sun Ray Clients run at 100 Mbps and the data is sent from the X Windows server in periodic bursts, these switches are required to buffer a certain amount of data. This situation can happen even when the average data rate from the X server is well under 100 Mbps. The X server is programmed in such a way that a certain allowed amount of data is sent at tick intervals. The original implementation had 50 ticks per second. The X server is allowed to send at a certain specific rate granted by the Sun Ray Client. For example, if the Sun Ray Client's grant is 40 Mbps, it can send 5 MB per second in bursts that are sent every 1/50th of a second. This means that at each tick, the server can send 100 KB of data at a rate of 1 Gbps. This rate would cause a queue buildup in the switch of close to 100 KB, which would then drain out at 100 Mbps over the next 1/50th of a second. The first action to mitigate this type of issue is to increase the number of ticks per second to 100 per second from 50. Thus, in the example above, the X server would send 50 KB every 10 ms rather than 100 KB every 20 ms. This setting would improve the situation considerably, but the problem would still remain. The 100 ticks per second rate was chosen because it corresponded to the normal resolution of the timer in Oracle Solaris and Oracle Linux. To increase the number of ticks per second beyond 100, the operating system's timer must also be increased. For Oracle Solaris, use the following procedure.
Steps
1. Open the /etc/system file. 2. Add the following command:
303
Improving Sun Ray Client Start-Up Time by Disabling Spanning Tree Protocol on the Network Switch
set hires_tick=1
3. Save and close the file. 4. Reboot the system. The hires_tick=1 setting increases the system timer resolution to 1000 ticks per second. Because the X server code uses the system setting, the X server's bursts of data now use the same value, 1000 ticks = 1 second, that is, 1 tick = 1 ms. In the example, using the new tick duration results in the X server sending 5 KB of data every 1 ms. Because the change to the tick duration decreases the amount of buffering required on the network switch, the performance of the Sun Ray Clients should improve.
21.3. Improving Sun Ray Client Start-Up Time by Disabling Spanning Tree Protocol on the Network Switch
The Sun Ray Clients are designed to power on and be fully operational in a very short time--typically less than 10 seconds. Some network switches have initial configurations that can cause this start-up time to be considerably longer, often taking 30 seconds or longer to achieve a fully working state. Longer start-on times typically are due to the configuration of the Ethernet switch that implements capabilities not needed in the Sun Ray environment. The most common of these capabilities is enabling the spanning tree protocol, which is designed to detect and compensate for loops in the network. In the Sun Ray environment, the spanning tree protocol should be disabled or deferred for ports connected directly to the Sun Ray Clients. Some manufacturers support a feature that immediately puts a port into the spanning tree forwarding mode. This feature is an acceptable alternative to disabling the spanning tree protocol on the port. If the spanning tree protocol is disabled and the start-up time is still excessive, contact the switch manufacturer to determine if there are other features or proprietary protocols that might be interfering with the Sun Ray Client. Some switches might have features designed into the switch that cannot be changed; if this is the case, then it may not be possible to reduce the start-up time.
21.4. Applications
Some applications, such as intensive 3-D visual simulations, might run very slowly on a Sun Ray Client. Applications that use double-buffering such as pseudo-stereo viewers and applications that use highfrequency dynamic color table flips on 8-bit visual displays might not show the proper result. Turn off antialiasing to save screen resources. Install interactive applications such as web browsers and OpenOffice and PC interoperability tools such as Citrix and Sun Secure Global Desktop (SGD) software on the Sun Ray server. The applications benefit from faster transport of commands to the Sun Rays X server and network traffic is reduced. If an application can be configured to use shared memory instead of DGA or OpenGL(R), using shared memory results in improved performance.
304
For more instructions and recommendations, refer to the following information: Java Desktop System documentation GNOME Performance Enhancement Tips for the Oracle Solaris Platform GNOME Performance Script for Oracle Solaris
If excessive swapping is occurring, the system might be undersized or overutilized. The solution is to add more memory or increase the size of the swap partition.
If the SUNWxscreensaver-hacks-gl package is not removed successfully, remove the gl package and then remove the SUNWxscreensaver-hacks-gl package.
305
306
307
THIS SOFTWARE IS PROVIDED BY JARKKO TURKULAINEN ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL JARKKO TURKULAINEN BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. ========================================================================================== wpa_supplicant ----------------Oracle elects to license all wpa_suppliant code under the BSD license. /* * WPA Supplicant * Copyright (c) 2003-2009, Jouni Malinen <[email protected]> * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License version 2 as * published by the Free Software Foundation. * * Alternatively, this software may be distributed under the terms of BSD * license. * * See README and COPYING for more details. * * This file implements functions for registering and unregistering * %wpa_supplicant interfaces. In addition, this file contains number of * functions for managing network connections. */ Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. Neither the name(s) of the above-listed copyright holder(s) nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. wpa_supp/ctrl_iface_dbus.h /* * WPA Supplicant / dbus-based control interface * Copyright (c) 2006, Dan Williams <[email protected]> and Red Hat, Inc. * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License version 2 as
308
* published by the Free Software Foundation. * * Alternatively, this software may be distributed under the terms of BSD * license. * * See README and COPYING for more details. */ Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. Neither the name(s) of the above-listed copyright holder(s) nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. wpa_supp/mlme.h /* * WPA Supplicant - Client mode MLME * Copyright (c) 2003-2007, Jouni Malinen <[email protected]> * Copyright (c) 2004, Instant802 Networks, Inc. * Copyright (c) 2005-2006, Devicescape Software, Inc. * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License version 2 as * published by the Free Software Foundation. * * Alternatively, this software may be distributed under the terms of BSD * license. * * See README and COPYING for more details. */ Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. Neither the name(s) of the above-listed copyright holder(s) nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
309
"AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. common/ieee802_11_defs.h /* * WPA Supplicant - Client mode MLME * Copyright (c) 2003-2007, Jouni Malinen <[email protected]> * Copyright (c) 2004, Instant802 Networks, Inc. * Copyright (c) 2005-2006, Devicescape Software, Inc. * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License version 2 as * published by the Free Software Foundation. * * Alternatively, this software may be distributed under the terms of BSD * license. * * See README and COPYING for more details. */ Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. Neither the name(s) of the above-listed copyright holder(s) nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. ========================================================================================== libXrandr --------Copyright 2000, Compaq Computer Corporation, Copyright 2002, Hewlett Packard, Inc. Permission to use, copy, modify, distribute, and sell this software and its documentation for any purpose is hereby granted without fee, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation, and that the name of Compaq or HP not be used in advertising or publicity pertaining to distribution of the software without specific, written prior
310
permission. HP makes no representations about the suitability of this software for any purpose. It is provided "as is" without express or implied warranty. HP DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT SHALL HP BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. ========================================================================================== xrandr -----Copyright 2001 Keith Packard, member of The XFree86 Project, Inc. Copyright 2002 Hewlett Packard Company, Inc. Copyright 2006 Intel Corporation Permission to use, copy, modify, distribute, and sell this software and its documentation for any purpose is hereby granted without fee, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation, and that the name of the copyright holders not be used in advertising or publicity pertaining to distribution of the software without specific, written prior permission. The copyright holders make no representations about the suitability of this software for any purpose. It is provided "as is" without express or implied warranty. THE COPYRIGHT HOLDERS DISCLAIM ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT SHALL THE COPYRIGHT HOLDERS BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. ========================================================================================== OpenSSL ------OpenSSL License Copyright (c) 1998-2008 The OpenSSL Project. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgment: "This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/)" 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact [email protected]. 5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their names without prior written permission of the OpenSSL Project. 6. Redistributions of any form whatsoever must retain the following acknowledgment: "This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/)" THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
311
FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. This product includes cryptographic software written by Eric Young ([email protected]). This product includes software written by Tim Hudson ([email protected])
Original SSLeay License Copyright (C) 1995-1998 Eric Young ([email protected]) All rights reserved. This package is an SSL implementation written by Eric Young ([email protected]). The implementation was written so as to conform with Netscapes SSL. This library is free for commercial and non-commercial use as long as the following conditions are aheared to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson ([email protected]). Copyright remains Eric Young's, and as such any Copyright notices in the code are not to be removed. If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: "This product includes cryptographic software written by Eric Young ([email protected])" The word 'cryptographic' can be left out if the rouines from the library being used are not cryptographic related :-). 4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement: "This product includes software written by Tim Hudson ([email protected])" THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. The licence and distribution terms for any publically available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution licence [including the GNU Public Licence.] ========================================================================================== Assembly instructions for JPEG compression on x86: -------------------------------------------------The assembly code has a different license than the rest of the TurboJpeg package and it is listed in simd/jsimdext.inc.
312
Copyright 2009 Pierre Ossman for Cendio AB Copyright 2010 D. R. Commander Based on x86 SIMD extension for IJG JPEG library - version 1.02 Copyright (C) 1999-2006, MIYASAKA Masaru. This software is provided 'as-is', without any express or implied warranty. In no event will the authors be held liable for any damages arising from the use of this software. Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions: 1. The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation would be appreciated but is not required. 2. Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software. 3. This notice may not be removed or altered from any source distribution. ========================================================================================== The Independent JPEG Group's JPEG software: ------------------------------------------LEGAL ISSUES ============ In plain English: 1. We don't promise that this software works. (But if you find any bugs, please let us know!) 2. You can use this software for whatever you want. You don't have to pay us. 3. You may not pretend that you wrote this software. If you use it in a program, you must acknowledge somewhere in your documentation that you've used the IJG code. In legalese: The authors make NO WARRANTY or representation, either express or implied, with respect to this software, its quality, accuracy, merchantability, or fitness for a particular purpose. This software is provided "AS IS", and you, its user, assume the entire risk as to its quality and accuracy. This software is copyright (C) 1991-2010, Thomas G. Lane, Guido Vollbeding. All Rights Reserved except as specified below. Permission is hereby granted to use, copy, modify, and distribute this software (or portions thereof) for any purpose, without fee, subject to these conditions: (1) If any part of the source code for this software is distributed, then this README file must be included, with this copyright and no-warranty notice unaltered; and any additions, deletions, or changes to the original files must be clearly indicated in accompanying documentation. (2) If only executable code is distributed, then the accompanying documentation must state that "this software is based in part on the work of the Independent JPEG Group". (3) Permission for use of this software is granted only if the user accepts full responsibility for any undesirable consequences; the authors accept NO LIABILITY for damages of any kind. These conditions apply to any software derived from or based on the IJG code, not just to the unmodified library. If you use our work, you ought to acknowledge us. Permission is NOT granted for the use of any IJG author's name or company name in advertising or publicity relating to this software or products derived from it. This software may be referred to only as "the Independent JPEG Group's software".
313
We specifically permit and encourage the use of this software as the basis of commercial products, provided that all warranty or liability claims are assumed by the product vendor. ansi2knr.c is included in this distribution by permission of L. Peter Deutsch, sole proprietor of its copyright holder, Aladdin Enterprises of Menlo Park, CA. ansi2knr.c is NOT covered by the above copyright and conditions, but instead by the usual distribution terms of the Free Software Foundation; principally, that you must include source code if you redistribute it. (See the file ansi2knr.c for full details.) However, since ansi2knr.c is not needed as part of any program generated from the IJG code, this does not limit you more than the foregoing paragraphs do. The Unix configuration script "configure" was produced with GNU Autoconf. It is copyright by the Free Software Foundation but is freely distributable. The same holds for its supporting scripts (config.guess, config.sub, ltmain.sh). Another support script, install-sh, is copyright by X Consortium but is also freely distributable. The IJG distribution formerly included code to read and write GIF files. To avoid entanglement with the Unisys LZW patent, GIF reading support has been removed altogether, and the GIF writer has been simplified to produce "uncompressed GIFs". This technique does not use the LZW algorithm; the resulting GIF files are larger than usual, but are readable by all standard GIF decoders. We are required to state that "The Graphics Interchange Format(c) is the Copyright property of CompuServe Incorporated. GIF(sm) is a Service Mark property of CompuServe Incorporated." ========================================================================================== JPEG Encoding: -------------The libjpeg-turbo toplevel license text is this: Some of the optimizations to the Huffman encoder (jchuff.c) and decoder (jdhuff.c) were borrowed from VirtualGL, and thus any distribution of libjpeg-turbo which includes those optimizations must, as a whole, be subject to the terms of the wxWindows Library Licence, Version 3.1. A copy of this license can be found in this directory under LICENSE.txt. The wxWindows Library License is based on the LGPL but includes provisions which allow the Library to be statically linked into proprietary libraries and applications without requiring the resulting binaries to be distributed under the terms of the LGPL. The rest of the source code, apart from the Huffman codec optimizations, falls under a less restrictive, BSD-style license (see README.) You can choose to distribute libjpeg-turbo, as a whole, under this BSD-style license by simply replacing the optimized jchuff.c and jdhuff.c with their unoptimized counterparts from the libjpeg v6b source. We only use the code that falls under the less restrictive BSD style license, the text for that is: LEGAL ISSUES ============ In plain English: 1. We don't promise that this software works. (But if you find any bugs, please let us know!) 2. You can use this software for whatever you want. You don't have to pay us. 3. You may not pretend that you wrote this software. If you use it in a program, you must acknowledge somewhere in your documentation that you've used the IJG code. In legalese: The authors make NO WARRANTY or representation, either express or implied, with respect to this software, its quality, accuracy, merchantability, or fitness for a particular purpose. This software is provided "AS IS", and you, its user, assume the entire risk as to its quality and accuracy. This software is copyright (C) 1991-1998, Thomas G. Lane.
314
All Rights Reserved except as specified below. Permission is hereby granted to use, copy, modify, and distribute this software (or portions thereof) for any purpose, without fee, subject to these conditions: (1) If any part of the source code for this software is distributed, then this README file must be included, with this copyright and no-warranty notice unaltered; and any additions, deletions, or changes to the original files must be clearly indicated in accompanying documentation. (2) If only executable code is distributed, then the accompanying documentation must state that "this software is based in part on the work of the Independent JPEG Group". (3) Permission for use of this software is granted only if the user accepts full responsibility for any undesirable consequences; the authors accept NO LIABILITY for damages of any kind. These conditions apply to any software derived from or based on the IJG code, not just to the unmodified library. If you use our work, you ought to acknowledge us. Permission is NOT granted for the use of any IJG author's name or company name in advertising or publicity relating to this software or products derived from it. This software may be referred to only as "the Independent JPEG Group's software". We specifically permit and encourage the use of this software as the basis of commercial products, provided that all warranty or liability claims are assumed by the product vendor. ansi2knr.c is included in this distribution by permission of L. Peter Deutsch, sole proprietor of its copyright holder, Aladdin Enterprises of Menlo Park, CA. ansi2knr.c is NOT covered by the above copyright and conditions, but instead by the usual distribution terms of the Free Software Foundation; principally, that you must include source code if you redistribute it. (See the file ansi2knr.c for full details.) However, since ansi2knr.c is not needed as part of any program generated from the IJG code, this does not limit you more than the foregoing paragraphs do. The Unix configuration script "configure" was produced with GNU Autoconf. It is copyright by the Free Software Foundation but is freely distributable. The same holds for its supporting scripts (config.guess, config.sub, ltconfig, ltmain.sh). Another support script, install-sh, is copyright by M.I.T. but is also freely distributable. It appears that the arithmetic coding option of the JPEG spec is covered by patents owned by IBM, AT&T, and Mitsubishi. Hence arithmetic coding cannot legally be used without obtaining one or more licenses. For this reason, support for arithmetic coding has been removed from the free JPEG software. (Since arithmetic coding provides only a marginal gain over the unpatented Huffman mode, it is unlikely that very many implementations will support it.) So far as we are aware, there are no patent restrictions on the remaining code. The IJG distribution formerly included code to read and write GIF files. To avoid entanglement with the Unisys LZW patent, GIF reading support has been removed altogether, and the GIF writer has been simplified to produce "uncompressed GIFs". This technique does not use the LZW algorithm; the resulting GIF files are larger than usual, but are readable by all standard GIF decoders. We are required to state that "The Graphics Interchange Format(c) is the Copyright property of CompuServe Incorporated. GIF(sm) is a Service Mark property of CompuServe Incorporated." ========================================================================================== Cryptolib: ---------* * * * * * * This is version 1.2 of CryptoLib The authors of this software are Jack Lacy, Don Mitchell and Matt Blaze Copyright (c) 1991, 1992, 1993, 1994, 1995 by AT&T. Permission to use, copy, and modify this software without fee is hereby granted, provided that this entire notice is included in all copies of any software which is or includes a copy or
315
* * * * * * * * * * * * * * * * * ?
modification of this software and in all copies of the supporting documentation for such software. NOTE: Some of the algorithms in cryptolib may be covered by patents. It is the responsibility of the user to ensure that any required licenses are obtained.
SOME PARTS OF CRYPTOLIB MAY BE RESTRICTED UNDER UNITED STATES EXPORT REGULATIONS.
THIS SOFTWARE IS BEING PROVIDED "AS IS", WITHOUT ANY EXPRESS OR IMPLIED WARRANTY. IN PARTICULAR, NEITHER THE AUTHORS NOR AT&T MAKE ANY REPRESENTATION OR WARRANTY OF ANY KIND CONCERNING THE MERCHANTABILITY OF THIS SOFTWARE OR ITS FITNESS FOR ANY PARTICULAR PURPOSE.
1. Rijmen.x: Vincent Rijmen "This code is hereby placed in the public domain" 2. MD5.c: RSA Data Security Inc., 1991 3. des_xxx and podd.c: Eric Young 1995-98 (various similar but not identical forms and years depending on the source module) Copies of the notices in the code follow: ============================================================= 1. Vincent Rijmen "This code is hereby placed in the public domain" -----/* * @author Vincent Rijmen * @author Antoon Bosselaers * @author Paulo Barreto * * This code is hereby placed in the public domain. * * THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, * EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ ============================================================= 2. RSA Data Security Inc., 1991 -----/* MD5C.C - RSA Data Security, Inc., MD5 message-digest algorithm */ /* Copyright (C) 1991, RSA Data Security, Inc. All rights reserved. License to copy and use this software is granted provided that it is identified as the "RSA Data Security, Inc. MD5 Message-Digest Algorithm" in all material mentioning or referencing this software or this function. License is also granted to make and use derivative works provided that such works are identified as "derived from the RSA Data Security, Inc. MD5 Message-Digest Algorithm" in all material mentioning or referencing the derived work. RSA Data Security, Inc. makes no representations concerning either the merchantability of this software or the suitability of this software for any particular purpose. It is provided "as is" without express or implied warranty of any kind. These notices must be retained in any copies of any part of this documentation and/or software. */
316
============================================================= 3. Eric Young 1995-98 (various forms and years depending on the source module) Eric Young 1 -----des.h /* $NetBSD: des.h,v 1.5 2001/09/09 11:01:02 tls Exp $ */ /* $KAME: des.h,v 1.7 2000/09/18 20:59:21 itojun Exp $ */ /* lib/des/des.h */ /* Copyright (C) 1995-1996 Eric Young ([email protected]) * All rights reserved. * * This file is part of an SSL implementation written * by Eric Young ([email protected]). * The implementation was written so as to conform with Netscapes SSL * specification. This library and applications are * FREE FOR COMMERCIAL AND NON-COMMERCIAL USE * as long as the following conditions are aheared to. * * Copyright remains Eric Young's, and as such any Copyright notices in * the code are not to be removed. If this code is used in a product, * Eric Young should be given attribution as the author of the parts used. * This can be in the form of a textual message at program startup or * in documentation (online or textual) provided with the package. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. All advertising materials mentioning features or use of this software * must display the following acknowledgement: * This product includes software developed by Eric Young ([email protected]) * * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. * * The licence and distribution terms for any publically available version or * derivative of this code cannot be changed. i.e. this code cannot simply be * copied and put under another distribution licence * [including the GNU Public Licence.] */ Eric Young 2 ------------------------des_cbc.c /* * * * * * Copyright (C) 1995-1998 Eric Young ([email protected]) All rights reserved. This package is an SSL implementation written by Eric Young ([email protected]). The implementation was written so as to conform with Netscapes SSL.
317
* * This library is free for commercial and non-commercial use as long as * the following conditions are aheared to. The following conditions * apply to all code found in this distribution, be it the RC4, RSA, * lhash, DES, etc., code; not just the SSL code. The SSL documentation * included with this distribution is covered by the same copyright terms * except that the holder is Tim Hudson ([email protected]). * * Copyright remains Eric Young's, and as such any Copyright notices in * the code are not to be removed. * If this package is used in a product, Eric Young should be given attribution * as the author of the parts of the library used. * This can be in the form of a textual message at program startup or * in documentation (online or textual) provided with the package * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. All advertising materials mentioning features or use of this software * must display the following acknowledgement: * "This product includes cryptographic software written by * Eric Young ([email protected])" * The word 'cryptographic' can be left out if the rouines from the library * being used are not cryptographic related :-) . * 4. If you include any Windows specific code (or a derivative thereof) from * the apps directory (application code) you must include an acknowledgement: * "This product includes software written by Tim Hudson ([email protected])" * * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. * * The licence and distribution terms for any publically available version or * derivative of this code cannot be changed. i.e. this code cannot simply be * copied and put under another distribution licence * [including the GNU Public Licence.] */ Eric Young 3 ------------/* /* /* /* * * * * * * * * * $NetBSD: des_ecb.c,v 1.7 2002/11/02 07:19:51 perry Exp $ */ $KAME: des_ecb.c,v 1.5 2000/11/06 13:58:08 itojun Exp $ */ crypto/des/ecb_enc.c */ Copyright (C) 1995-1998 Eric Young ([email protected]) All rights reserved. This file is part of an SSL implementation written by Eric Young ([email protected]). The implementation was written so as to conform with Netscapes SSL specification. This library and applications are FREE FOR COMMERCIAL AND NON-COMMERCIAL USE as long as the following conditions are aheared to.
318
* Copyright remains Eric Young's, and as such any Copyright notices in * the code are not to be removed. If this code is used in a product, * Eric Young should be given attribution as the author of the parts used. * This can be in the form of a textual message at program startup or * in documentation (online or textual) provided with the package. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. All advertising materials mentioning features or use of this software * must display the following acknowledgement: * This product includes software developed by Eric Young ([email protected]) * * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. * * The licence and distribution terms for any publically available version or * derivative of this code cannot be changed. i.e. this code cannot simply be * copied and put under another distribution licence * [including the GNU Public Licence.] */ Eric Young 4 -----------------/* crypto/des/des_enc.c */ /* Copyright (C) 1995-1998 Eric Young ([email protected]) * All rights reserved. * * This package is an SSL implementation written * by Eric Young ([email protected]). * The implementation was written so as to conform with Netscapes SSL. * * This library is free for commercial and non-commercial use as long as * the following conditions are aheared to. The following conditions * apply to all code found in this distribution, be it the RC4, RSA, * lhash, DES, etc., code; not just the SSL code. The SSL documentation * included with this distribution is covered by the same copyright terms * except that the holder is Tim Hudson ([email protected]). * * Copyright remains Eric Young's, and as such any Copyright notices in * the code are not to be removed. * If this package is used in a product, Eric Young should be given attribution * as the author of the parts of the library used. * This can be in the form of a textual message at program startup or * in documentation (online or textual) provided with the package. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright
319
* notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. All advertising materials mentioning features or use of this software * must display the following acknowledgement: * "This product includes cryptographic software written by * Eric Young ([email protected])" * The word 'cryptographic' can be left out if the rouines from the library * being used are not cryptographic related :-) . * 4. If you include any Windows specific code (or a derivative thereof) from * the apps directory (application code) you must include an acknowledgement: * "This product includes software written by Tim Hudson ([email protected])" * * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. * * The licence and distribution terms for any publically available version or * derivative of this code cannot be changed. i.e. this code cannot simply be * copied and put under another distribution licence * [including the GNU Public Licence.] */ Eric Young 5 -----------/* $NetBSD: des_locl.h,v 1.4 2001/09/09 11:01:02 tls Exp $ */ /* $KAME: des_locl.h,v 1.6 2000/11/06 13:58:09 itojun Exp $ */ /* crypto/des/des_locl.h */ /* Copyright (C) 1995-1997 Eric Young ([email protected]) * All rights reserved. * * This file is part of an SSL implementation written * by Eric Young ([email protected]). * The implementation was written so as to conform with Netscapes SSL * specification. This library and applications are * FREE FOR COMMERCIAL AND NON-COMMERCIAL USE * as long as the following conditions are aheared to. * * Copyright remains Eric Young's, and as such any Copyright notices in * the code are not to be removed. If this code is used in a product, * Eric Young should be given attribution as the author of the parts used. * This can be in the form of a textual message at program startup or * in documentation (online or textual) provided with the package. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. All advertising materials mentioning features or use of this software * must display the following acknowledgement: * This product includes software developed by Eric Young ([email protected]) * * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
320
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. * * The licence and distribution terms for any publically available version or * derivative of this code cannot be changed. i.e. this code cannot simply be * copied and put under another distribution licence * [including the GNU Public Licence.] */ Eric Young 6 -------------------/* $NetBSD: des_setkey.c,v 1.8 2002/11/07 07:04:13 thorpej Exp $ */ /* $KAME: des_setkey.c,v 1.6 2001/07/03 14:27:53 itojun Exp $ */ /* crypto/des/set_key.c */ /* Copyright (C) 1995-1996 Eric Young ([email protected]) * All rights reserved. * * This file is part of an SSL implementation written * by Eric Young ([email protected]). * The implementation was written so as to conform with Netscapes SSL * specification. This library and applications are * FREE FOR COMMERCIAL AND NON-COMMERCIAL USE * as long as the following conditions are aheared to. * * Copyright remains Eric Young's, and as such any Copyright notices in * the code are not to be removed. If this code is used in a product, * Eric Young should be given attribution as the author of the parts used. * This can be in the form of a textual message at program startup or * in documentation (online or textual) provided with the package. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. All advertising materials mentioning features or use of this software * must display the following acknowledgement: * This product includes software developed by Eric Young ([email protected]) * * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. * * The licence and distribution terms for any publically available version or * derivative of this code cannot be changed. i.e. this code cannot simply be * copied and put under another distribution licence * [including the GNU Public Licence.] */
321
Eric Young 7 ----------------------/* $NetBSD: podd.h,v 1.1 2000/06/14 19:45:36 thorpej Exp $ */ /* $KAME: podd.h,v 1.3 2000/03/27 04:36:34 sumikawa Exp $ */ /* crypto/des/podd.h */ /* Copyright (C) 1995-1996 Eric Young ([email protected]) * All rights reserved. * * This file is part of an SSL implementation written * by Eric Young ([email protected]). * The implementation was written so as to conform with Netscapes SSL * specification. This library and applications are * FREE FOR COMMERCIAL AND NON-COMMERCIAL USE * as long as the following conditions are aheared to. * * Copyright remains Eric Young's, and as such any Copyright notices in * the code are not to be removed. If this code is used in a product, * Eric Young should be given attribution as the author of the parts used. * This can be in the form of a textual message at program startup or * in documentation (online or textual) provided with the package. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. All advertising materials mentioning features or use of this software * must display the following acknowledgement: * This product includes software developed by Eric Young ([email protected]) * * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. * * The licence and distribution terms for any publically available version or * derivative of this code cannot be changed. i.e. this code cannot simply be * copied and put under another distribution licence * [including the GNU Public Licence.] */ ========================================================================================== libusb: ------Oracle elects to license libusb under the BSD license. Copyright (c) 2000-2003 Johannes Erdfelt This file (and only this file) may alternatively be licensed under the BSD license as well, read LICENSE for details. Redistribution and permitted provided 1. Redistributions conditions and the use in source and binary forms, with or without modification, are that the following conditions are met: of source code must retain the above copyright notice, this list of following disclaimer.
322
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. The name of the author may not be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. ========================================================================================== XWindow: -------Copyright 1987, 1998? The Open Group Permission to use, copy, modify, distribute, and sell this software and its documentation for any purpose is hereby granted without fee, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation. The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.? IN NO EVENT SHALL THE OPEN GROUP BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. Except as contained in this notice, the name of The Open Group shall not be used in advertising or otherwise to promote the sale, use or other dealings in this Software without prior written authorization from The Open Group. Copyright 1987 by Digital Equipment Corporation, Maynard, Massachusetts. All Rights Reserved Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby granted, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation, and that the name of Digital not be used in advertising or publicity pertaining to distribution of the software without specific, written prior permission. DIGITAL DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT SHALL DIGITAL BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. ******************************************************************/ /* The panoramix components contained the following notice */ /***************************************************************** Copyright (c) 1991, 1997 Digital Equipment Corporation, Maynard, Massachusetts. Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge,
323
publish, distribute, sublicense, and/or sell copies of the Software. The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.? IN NO EVENT SHALL DIGITAL EQUIPMENT CORPORATION BE LIABLE FOR ANY CLAIM, DAMAGES, INCLUDING, BUT NOT LIMITED TO CONSEQUENTIAL OR INCIDENTAL DAMAGES, OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. Except as contained in this notice, the name of Digital Equipment Corporation shall not be used in advertising or otherwise to promote the sale, use or other dealings in this Software without prior written authorization from Digital Equipment Corporation. Newer files in the distribution have licenses similar to this one, except the author/organization may be different: /* ?* Copyright ? 2000 Compaq Computer Corporation ?* Copyright ? 2002 Hewlett-Packard Company ?* Copyright ? 2006 Intel Corporation ?* ?* Permission to use, copy, modify, distribute, and sell this software and its ?* documentation for any purpose is hereby granted without fee, provided that ?* the above copyright notice appear in all copies and that both that copyright ?* notice and this permission notice appear in supporting documentation, and ?* that the name of the copyright holders not be used in advertising or ?* publicity pertaining to distribution of the software without specific, ?* written prior permission.? The copyright holders make no representations ?* about the suitability of this software for any purpose.? It is provided "as ?* is" without express or implied warranty. ?* ?* THE COPYRIGHT HOLDERS DISCLAIM ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, ?* INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO ?* EVENT SHALL THE COPYRIGHT HOLDERS BE LIABLE FOR ANY SPECIAL, INDIRECT OR ?* CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, ?* DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER ?* TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE ?* OF THIS SOFTWARE. ?* ?* Author: ? Jim Gettys, Hewlett-Packard Company, Inc. ?*????????? Keith Packard, Intel Corporation ? */ ========================================================================================== TurboJPEG: ---------Copyright (C) 1998-2005 Julian Smart, Robert Roebling et al Everyone is permitted to copy and distribute verbatim copies of this licence document, but changing it is not allowed. WXWINDOWS LIBRARY LICENCE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION This library is free software; you can redistribute it and/or modify it under the terms of the GNU Library General Public Licence as published by the Free Software Foundation; either version 2 of the Licence, or (at your option) any later version. This library is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Library General Public Licence for more details.
324
You should have received a copy of the GNU Library General Public Licence along with this software, usually in a file named COPYING.LIB. If not, write to the Free Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA. EXCEPTION NOTICE 1. As a special exception, the copyright holders of this library give permission for additional uses of the text contained in this release of the library as licenced under the wxWindows Library Licence, applying either version 3.1 of the Licence, or (at your option) any later version of the Licence as published by the copyright holders of version 3.1 of the Licence document. 2. The exception is that you may use, copy, link, modify and distribute under your own terms, binary object code versions of works based on the Library. 3. If you copy code from files distributed under the terms of the GNU General Public Licence or the GNU Library General Public Licence into a copy of this library, as this licence permits, the exception does not apply to the code that you add in this way. To avoid misleading anyone as to the status of such modified files, you must delete this exception notice from such code and/or adjust the licensing conditions notice accordingly. 4. If you write modifications of your own for this library, it is your choice whether to permit this exception to apply to your modifications. If you do not wish that, you must delete the exception notice from such code and/or adjust the licensing conditions notice accordingly. ========================================================================================== IPSEC ipsec_tools: -----------------* Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. Neither the name of the project nor the names of its contributors * may be used to endorse or promote products derived from this software * without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. */ Some files have: /* * Copyright (C) 2004 Emmanuel Dreyfus * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions
325
* are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. Neither the name of the project nor the names of its contributors * may be used to endorse or promote products derived from this software * without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. */ and some files have: /* * Copyright (C) 2004 SuSE Linux AG, Nuernberg, Germany. * Contributed by: Michal Ludvig , SUSE Labs * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. Neither the name of the project nor the names of its contributors * may be used to endorse or promote products derived from this software * without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. */ ========================================================================================== PC/SC-lite: ----------Copyright (c) 1999-2003 David Corcoran All rights reserved. Redistribution and permitted provided 1. Redistributions conditions and the 2. Redistributions use in source and binary forms, with or without modification, are that the following conditions are met: of source code must retain the above copyright notice, this list of following disclaimer. in binary form must reproduce the above copyright notice, this list of
326
conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. The name of the author may not be used to endorse or promote products derived from this software without specific prior written permission. Changes to this license can be made only by the copyright author with explicit written consent. THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. ==========================================================================================
327
328
Appendix B. Glossary
A alias token An alias token enables a card owner to access the same Sun Ray session with more than one physical token. This setup can be useful, for example, when a user needs a duplicate smart card. ALP The Sun Appliance Link Protocol, a suite of network protocols that enable communication between Sun Ray servers and Sun Ray Clients. AMGH Automatic Multigroup Hotdesking. See regional hotdesking. authentication policy The Authentication Manager, using the selected authentication modules, decides what tokens are valid and which users, as token owners, have access to the system and sessions. authentication token Although all tokens are used by the Authentication Manager to grant or deny access to Sun Ray sessions, this term usually refers to a user's smart card token. See token. B backplane bandwidth Sometimes also referred to as switch fabric. A switch's backplane is the pipe through which data flows from an input port to an output port. Backplane bandwidth usually refers to the aggregate bandwidth available amongst all ports within a switch. barrier mechanism To prevent clients from downloading firmware that is older than the firmware they already have, the administrator can set a barrier mechanism. The barrier mechanism symbol BarrierLevel is defined by default in the DHCP table of Sun Ray servers. bpp Bits per pixel. C CAM Controlled Access Mode, was renamed to kiosk mode. card reader See token reader. client See Sun Ray Client. client ID The unique identifier for a client. For Sun Ray Clients, it is the client's MAC address. For Oracle Virtual Desktop Clients, it is an MD5 hash of the client key. Client ID is also referred to as CID, terminal CID, client identifier, or desktop ID. client key An automatically generated public-private key pair that represents a Sun Ray Client or an Oracle Virtual Desktop Client. A client key is used to authenticate the device when it connects to a server.
329
client-server A common way to describe network services and the user processes (programs) of those services. codec A device or program capable of encoding or decoding a digital data stream or signal. cold restart See restart. Configuration GUI A tool to modify a Sun Ray Client's local configuration for initialization and booting. D DHCP Dynamic Host Configuration Protocol, which is a means of distributing IP addresses and initial parameters to the clients. display One or more screens from a single Sun Ray session. DTU See Sun Ray Client. F failover The process of transferring processes from a failed Sun Ray server to a functional Sun Ray server. failover group Two or more Sun Ray servers configured to provide continuity of service in the event of a network or system failure. Sometimes abbreviated as FOG or HA (for high availability). The term high availability refers to the benefit of this type of configuration; the term failover group refers to the functionality. firmware A small piece of software residing on Sun Ray Clients that handles power-on self test (POST), client initialization, authentication, and low-level input an output. See Sun Ray Operating Software. firmware barrier See barrier mechanism. FOG See failover group. fps Frames per second. frame buffer Video output device that drives the video display. See virtual frame buffer. G group-wide Across a failover group. H HA High availability. See failover group.
330
head A Sun Ray Client, with one or two monitors, used in a multihead group. high availability See failover group. hotdesking The ability for a user to remove a smart card, insert it into any other client within a failover group, and have the user's session "follow" the user, thus allowing the user to have instantaneous access to the user's windowing environment and current applications from multiple clients. hot key A predefined key that causes an activity to occur. For example, a hot key is used to display the Settings screen on the Sun Ray Client. hot-pluggable A property of a hardware component that can be inserted into or removed from a system that is powered on. USB devices connected to Sun Ray Clients are hot-pluggable. I idle session A session that is running on a Sun Ray server but to which no user (identified by a smart card token or a pseudo-token) is logged in. K keyboard country code A number representing a specific USB keyboard map that can be set in the Sun Ray client firmware to provide better Non-US keyboard support. This code is used if the keyboard returns a country code of 0. kiosk mode A facility to deliver an almost unlimited variety of desktops or applications to users, even though the actual desktop or application may be running elsewhere. Kiosk mode bypasses the normal authentication methods of the platform and runs anything that the administrator defines. Kiosk sessions are configured through a Kiosk session type. kiosk session A user session running in kiosk mode. Also called kiosk mode session. kiosk session type A set of scripts and configuration files, which are described by a kiosk session descriptor file. A kiosk session type defines the kind of user session that will run in kiosk mode. A session type is sometimes referred to as a session configuration. M mobile token If mobile sessions are enabled, a user can log into an existing session from different locations without a smart card, in which case the user name is associated with the session. This type of pseudo-token is called a mobile token. mobility For the purposes of the Sun Ray Software, the property of a session that allows it to follow a user from one client to another within a server group. On the Sun Ray system, mobility requires the use of a smart card or other identifying mechanism.
331
monitor The physical monitor connected to a client. MTU Maximum Transmission Unit, used to specify the number of bytes in the largest packet a network can transmit. multicasting The process of enabling communication between Sun Ray servers over their Sun Ray network interfaces in a failover environment. multihead group A type of multiple monitor configuration that enables you to merge and control multiple Sun Ray Clients, referred to in this context as heads, and their screens using a single keyboard and mouse attached to a primary client. multi-monitor A type of multiple monitor configuration that supports multiple monitors connected to the dual video connectors on a Sun Ray 2FS or Sun Ray 3 Plus Client. By using RandR 1.2, the multiple monitors are managed as one screen. N network latency The time delay associated with moving information through a network. Interactive applications such as voice, video displays and multimedia applications are sensitive to these delays. non-smart card mobility NCSM. A mobile session on a Sun Ray Client that does not rely on a smart card. NSCM requires a policy that allows pseudo-token. NSCM See non-smart card mobility. O offline A specific mode for a server in a failover group, which means the server does not participate in load balancing any more (the load balancing algorithm does not select this server for new sessions). New sessions can still be manually created on it. Oracle Virtual Desktop Client A software application that runs on a common client operating system and provides the ability to connect to a desktop session running on a Sun Ray server. It is a software version of a Sun Ray Client. The desktop running the application is also referred to as an Oracle Virtual Desktop Client in this document. OSD On-screen display. The Sun Ray Client uses OSD icons to alert the user about potential start-up or connectivity problems. output A single instance of a physical monitor. Each output has a physical video connector. P PAM Pluggable Authentication Module. A set of dynamically loadable objects that gives system administrators the flexibility of choosing among available user authentication services.
332
PAM session A single PAM handle and runtime state associated with all PAM items, data, and the like. policy See authentication policy. Pop-up GUI See configuration GUI. power cycling Using the power cord to restart a client. private network A network configuration where Sun Ray Clients are directly connected to the Sun Ray server, that is, the server has a network interface connected to the subnet and the server is devoted entirely to carrying Sun Ray traffic. Also known as directly-connected dedicated interconnect or private interconnect. pseudo-session A Sun Ray session associated with a pseudo-token rather than a smart card token. pseudo-token A user accessing a Sun Ray session without a smart card is identified by the client's built-in type and MAC address, known as a pseudo-token. See token. R RDP Microsoft Remote Desktop Protocol. regional hotdesking Enables users to access their sessions across wider domains and greater physical distances. You can enable this feature by defining how user sessions are mapped to an expanded list of servers in multiple failover groups. Originally known as Automatic Multigroup Hotdesking (AMGH). restart Sun Ray services can be restarted either from the utstart command or with the Warm Restart or Cold Restart buttons through the Admin GUI. A cold restart terminates all Sun Ray sessions; a warm restart does not. RDS Remote Desktop Services. Formally known as Terminal Services. See Windows Terminal Services. RHA Remote Hotdesk Authentication, a security enhancement that requires Sun Ray Software authentication before users can reconnect to an existing session. RHA does not apply to kiosk sessions, which are designed for anonymous access without authentication. RHA policy can be administered either through the Admin GUI or with the utpolicy command. S screen A monitor or group of monitors that show a single desktop to a user. A screen can be provided by a single monitor or by multiple monitors on a Sun Ray Client with dual video connectors, such as the Sun Ray 3 Plus Client. A multihead group can also show a single desktop when using Xinerama. screen flipping The ability to pan to individual screens that were originally created by a multihead group on a client with a single head.
333
service For the purposes of Sun Ray Software, any application that can directly connect to the Sun Ray Client. It can include audio, video, X servers, access to other machines, and device control of the client. session A group of services associated with an authentication token. A session may be associated with a token embedded on a smart card. See token. session mobility See mobility. smart card Generically, a plastic card containing a microprocessor capable of making calculations. Smart cards that can be used to initiate or connect to Sun Ray sessions contain identifiers such as the card type and ID. Smart card tokens may also be registered in the Sun Ray data store, either by the Sun Ray administrator or, if the administrator chooses, by the user. smart card-based authentication Using a smart card to authenticate a card holder based on credentials supplied by the card and authentication information from the card holder, such as a PIN or biometric data. smart card-based session mobility Using a smart card to provide a unique token ID and token type that enables Sun Ray Software to locate the card holder's session. In some cases, card holders might be required to authenticate themselves using smart card-based authentication. smart token An authentication token contained on a smart card. See token. Sun Ray Client A hardware client that obtains a desktop session from a Sun Ray server. The software client counterpart is called an Oracle Virtual Desktop Client. Previously referred to as Sun Ray thin clients, Sun Ray virtual display terminals, and Sun Ray DTUs (Desktop Terminal Units). Sun Ray Operating Software The name of the Sun Ray Client firmware. See firmware. Sun Ray system The Sun Ray system consists of Sun Ray Clients, servers, server software, and the physical networks that connect them. T thin client Thin clients remotely access some resources of a computer server such as compute power and large memory capacity. The Sun Ray Clients rely on the server for all computing power and storage. token The Sun Ray system requires each user to present a token that the Authentication Manager uses to allow or deny access to the system and to sessions. A token consists of a type and an ID. If the user uses a smart card, the smart card's type and ID are used as the token. If the user is not using a smart card, the client's built-in type and ID (the unit's Ethernet, or MAC, address) are used instead as a pseudo-token. If mobile sessions are enabled, a user can log into an existing session from different locations without a smart card, in which case the user name is associated with the session. A pseudotoken used for mobile sessions is called a mobile token. Alias tokens can also be created to enable users to access the same session with more than one physical token.
334
token reader A Sun Ray Client that is dedicated to reading smart cards and returning their identifiers, which can be associated with card owners (that is, with users). trusted-server Servers in the same failover group that "trust" one another through a common group signature. U user session A session that is running on a Sun Ray server and to which a user, identified by a smart card token or a pseudo toke, is logged in. V video acceleration A feature provided in the Windows connector to improve video playback performance, which consists of the multimedia redirection and Adobe Flash acceleration components. virtual desktop A virtual machine containing a desktop instance that is executed and managed within the virtual desktop infrastructure, usually a Windows desktop accessed through RDP. VMware View connector Enables Sun Ray Client users to connect to Windows virtual machines through the VMware View Manager. virtual frame buffer A region of memory on the Sun Ray server that contains the current state of a user's display. W warm restart See restart. Windows connector A Microsoft Remote Desktop Protocol (RDP) client that enables Sun Ray users to access applications running on remote Microsoft Windows systems. Windows system A generic term used throughout the Sun Ray Software documentation to indicate a remote desktop server running the Windows OS that can be accessed remotely from a Sun Ray Client using the Windows connector. See Windows Terminal Services for the different ways a remote desktop is provided based on the Windows OS. Windows Terminal Services A Microsoft Windows component that makes Windows applications and desktops accessible to remote users and clients. Depending on the Windows release, this feature may be called Terminal Services, Remote Desktop Services, or Remote Desktop Connection. X X server A process that controls a bitmap display device in an X Window System. It performs operations on request from client applications. Sun Ray Software contains two X servers: Xsun, which was the default Xserver in previous versions of Sun Ray Software, and Xnewt, which is the default Xserver for Sun Ray Software. Xnewt enables the latest multimedia capabilities.
335
Xinerama An extension to the X Window System that enables the use of two or more monitors as one large virtual display. Xinerama mode allows the display of a single desktop across multiple monitors. Xnewt The default X server for Sun Ray Software on Oracle Solaris. xrandr The X Resize, Rotate and Reflect extension to the X Window System, which enables clients to resize, rotate, and change screen resolution settings dynamically. For Sun Ray Software, this extension is especially useful when a user hotdesks to Sun Ray Clients that use monitors of different sizes or resolutions than the one where a given session began.
336