2.11. Security and Access Control
2.11.1. New firewall (firewalld)
firewalld, and its configuration tools: firewall-config, firewall-cmd, and firewall-applet, which is not included in the default installation of Red Hat Enterprise Linux 7.
firewalld is dynamic, changes to its configuration can be made at any time, and are implemented immediately. No part of the firewall needs to be reloaded, so there is no unintentional disruption of existing network connections.
- Firewalld configuration details are not stored in
/etc/sysconfig/iptables. Instead, configuration details are stored in various files in the/usr/lib/firewalldand/etc/firewallddirectories. - Where the firewall system in Red Hat Enterprise Linux 6 removed and re-applied all rules every time a configuration change was made,
firewalldonly applies the configuration differences. As a result,firewalldcan change settings during runtime without losing existing connections.
2.11.1.1. Migrating rules to firewalld
Important
iptables or ip6tables instead of moving to firewalld.
firewalld and continue using iptables or ip6tables are available here: https://access.redhat.com/articles/1229233.
- Use the graphical system-config-firewall tool to configure rules. This tool stored its configuration details in the
/etc/sysconfig/system-config-firewallfile, and created configuration for theiptablesandip6tablesservices in the/etc/sysconfig/iptablesand/etc/sysconfig/ip6tablesfiles. - Manually edit the
/etc/sysconfig/iptablesand/etc/sysconfig/ip6tablesfiles (either from scratch, or editing an initial configuration created by system-config-firewall).
/etc/sysconfig/system-config-firewall into the default zone of firewalld.
$ firewall-offline-cmd
/etc/sysconfig/iptables or /etc/sysconfig/ip6tables, after you install firewalld, you must either create a new configuration with firewall-cmd or firewall-config, or disable firewalld and continue to use the old iptables and ip6tables services. For details about creating new configurations or disabling firewalld, see the Red Hat Enterprise Linux 7 Security Guide, available from http://access.redhat.com/site/documentation/Red_Hat_Enterprise_Linux/.
2.11.2. Changes to PolicyKit
.pkla files to define additional local authorizations. Red Hat Enterprise Linux 7 introduces the ability to define local authorizations with JavaScript, allowing you to script authorizations if necessary.
polkitd reads .rules files in lexicographic order from the /etc/polkit-1/rules.d and /usr/share/polkit-1/rules.d directories. If two files share the same name, files in /etc are processed before files in /usr. When the old .pkla files were processed, the last rule processed took precedence. With the new .rules files, the first matching rule takes precedence.
/etc/polkit-1/rules.d/49-polkit-pkla-compat.rules file. They can therefore be overridden by .rules files in either /usr or /etc with a name that comes before 49-polkit-pkla-compat in lexicographic order. The simplest way to ensure that your old rules are not overridden is to begin the name of all other .rules files with a number greater than 49.
2.11.3. Changes to user identifiers
500. In Red Hat Enterprise Linux 7, the base user identifier is now 1000. This change involves replacing the /etc/login.defs file during the upgrade process.
/etc/login.defs file, the file is replaced during upgrade. The base user identifier number is changed to 1000, and new users will be allocated user identifiers at and above 1000. User accounts created before this change retain their current user identifiers and continue to work as expected.
/etc/login.defs file, the file is not replaced during upgrade, and the base user identifier number remains at 500.
2.11.4. Changes to libuser
libuser library no longer supports configurations that contain both the ldap and files modules, or both the ldap and shadow modules. Combining these modules results in ambiguity in password handling, and such configurations are now rejected during the initialization process.
libuser to manage users or groups in LDAP, you must remove the files and shadow modules from the modules and create_modules directives in your configuration file (/etc/libuser.conf by default).
2.11.5. Changes to opencryptoki key store
Update software
Ensure your version of opencryptoki is up to date.# yum update -y opencryptoki
Verify the slot number of your token
Usepkcsconfto determine the slot number of the token. Run the following commands as root:# pkcsconf -s # pkcsconf -t
Note the slot number of your token. The slot description will end with(CCA). The information field will identify the token as theIBM CCA Token.Stop interface access
Stop thepkcsslotdservice and anyopencryptokiprocesses.# systemctl stop pkcsslotd.service
Use the following command to identify processes to stop with thekillutility, and then terminate the appropriate processes.# ps ax | grep pkcsslotd
Back up the data store
Before you migrate, back up the CCA data store (the directory in which your tokens are stored, normally/var/lib/opencryptoki/ccatok). For example, make a copy of the directory.# cp -r /var/lib/opencryptoki/ccatok /var/lib/opencryptoki/ccatok.backup
Run the migration utility
Change to the/var/lib/opencryptoki/ccatokdirectory and run the migration utility.# cd /var/lib/opencryptoki/ccatok # pkcscca -m v2objectsv3 -v
When prompted, provide your Security Officer (SO) PIN and User PIN.Remove outdated shared memory file
Remove the/dev/shm/var.lib.opencryptoki.ccatokfile manually, or reboot the system.# rm /dev/shm/var.lib.opencryptoki.ccatok
Go back to an operational interface access
Start thepkcsslotdservice again.# systemctl start pkcsslotd.service
- Ensure you are running the commands as root, and that root is a member of the
pkcs11group. - Ensure that the
pkcsconfutility is in either the/usr/lib/pkcs11/methods/directory or the/usr/sbin/directory. - Ensure that the token data store is in the
/var/lib/opencryptoki/ccatok/directory. - Ensure that you have supplied a slot number and that the slot number is correct.
- Ensure that your Security Officer (SO) PIN and User PIN are correct.
- Ensure that you have write access to the current directory.

Where did the comment section go?
Red Hat's documentation publication system recently went through an upgrade to enable speedier, more mobile-friendly content. We decided to re-evaluate our commenting platform to ensure that it meets your expectations and serves as an optimal feedback mechanism. During this redesign, we invite your input on providing feedback on Red Hat documentation via the discussion platform.