Cloud Raxak, Inc. Confidential
1484 Pollard Rd #363, Los Gatos, CA 95032. USA https://www.cloudraxak.com
Getting Started:
Prerequisites and Setup for Server Resources
A checklist for preparing your environment to use the Cloud Raxak portals
We are pleased to welcome you as a new user! We are dedicated to providing you with easy and comprehensive security configuration for your IT resources.
This guide provides a short checklist to make sure your environment is ready for using the Cloud Raxak portals.
The Cloud Raxak’s portals (e.g., Raxak Protect, Raxak Manage, etc.) are used to define and apply a security posture to your company’s IT resources.
Last updated: February 2023 (for Version 4.4+ of the Cloud Raxak portals)
This guide is intended for Cloud Raxak customers setting up their IT environment to use the Cloud Raxak portals.
Note that almost all the prerequisites and setup requirements are identical whether you use our cloud based solution[1] or an on-premise appliance in your own environment. Wherever there are differences, we have indicated that in the details below.
You’ll need to ensure that the resources (servers or VMs) you enroll into Raxak Protect have operating systems (OS’s) that are supported by Cloud Raxak. As of the date of this document, we support the following OS flavors:
Operating System Type | Version Numbers |
CentOS | 6.0 to 9.3 |
Red Hat Enterprise Linux | 6.0 to 9.3 |
Ubuntu | 16.04 to 22.04 (beta) |
Amazon Linux (AMI) | 2017, 2018 & Amazon Linux 2 AMI |
SUSE | 12, 15 |
Windows Server (Workgroup and Member Servers only) | 2012 Std, 2012 R2, 2016, 2019, 2022 (beta) (requirement: Must have PowerShell Version 4+ and DSC which is available in WMF Version 4+) |
Updated: August 2022 Release 4.4.0 |
As part of enrolling Linux resources, Python version 2.7 or above is required to be installed on the resource (Python 3.x is preferred). In addition, either wget or curl should be installed on each resource being enrolled.
The diagram below shows the connections used to communicate between the Cloud Raxak SaaS service and your IT resources. Note that this connectivity works regardless of whether you are connecting to a Cloud Raxak service in the cloud, or to a Raxak Protect appliance in your own environment. Without loss of generality we will refer to this end point as Raxak Protect or the Raxak Protect Appliance.
The required settings on each resource are summarized in the table below:
Linux Resources | Windows Resources | Comments | |
Outbound Connections | Port 443 (HTTPS) | Port 443 (HTTPS) | Set in any host based firewalls or in network firewalls. See note about proxy settings below |
Inbound Connections | Port 22 (SSH) Can be changed per local policy | Port 5986 (WinRM) Can be changed per local policy | Set in any host based firewalls and in network firewalls. See note about security group settings on public clouds below |
Console access | Console access needs Port 443 access | See note about proxy settings below |
In order to set up your IT environment to use the Cloud Raxak portals, please ensure that the following conditions are met:
ECDHE-RSA-AES256-GCM-SHA512, DHE-RSA-AES256-GCM-SHA512, ECDHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES256-GCM-SHA384, ECDHE-RSA-AES256-SHA384
Some older Windows or Linux servers may not have been updated to use one of these ciphers and may cause connection issues that must be resolved before Raxak Protect can be used. Protocols earlier than TLS 1.2 are depreciated.
https_proxy = http://[username:password@]<fqdn-or-ip>:<port>/
One or more fields such as username or password may not be required in your environment.
1.Group Policy Path - Computer Configuration/Administrative
Templates/Windows Components/Windows Remote Management
(WinRM)/WinRM Client
Disallow Negotiate authentication => Should be set to Not Configured or Disabled
This Group Policy is required only during enrollment. If the policy is set to Enabled then it throws an error when creating a WinRM listener.
After enrollment, this policy can be configured as per Customer organization policy.
The three Group Policies below are required for enrollment, Check access, Scanning and Remediation.
1.Group Policy Path - Computer Configuration/Administrative
Templates/Windows Components/Windows Remote Management
(WinRM)/WinRM Service
Allow remote server management through WinRM => Should be set to Not Configured or Enabled
========================================
2.Group policy path- Computer Configuration to Policies\Administrative
Templates\Windows Components\Windows PowerShell
Turn on Script Execution => Not configured or Enable and select Allow local scripts and remote signed script
==========================================
3.Group Policy Path - Computer Configuration/Administrative
Templates/Windows Components/Windows Remote Shell
Allow Remote Shell Access => Should be set to Not Configured or Enabled
Console access to the Raxak Protect Appliance is via a standard browser (Chrome or Firefox) on any modern mobile or desktop computer. Note that access must be configured through any proxy[2] or other blocking mechanisms that may exist in your environment. Javascript must be enabled on your browser, and any ad-blocker that may be running may need to be disabled on the domain or IP address of the Appliance. If connectivity is successful, you should see a login screen that looks like this:
If you need help with setting up your environment to use the Cloud Raxak portals, please reach out to us at support@cloudraxak.com.
NOTE: Cloud Raxak requires that all Linux and Windows servers support the keys defined below. Failure to do so will result in the Raxak Protect appliance being unable to connect with the Linux or Windows server, even if the network connection is viable.
Cloud Raxak has determined that many systems are configured by default to only accept a single SSH key exchange (KEX) algorithm: diffie-hellman-group1-sha1
This key exchange algorithm is a legacy algorithm that has been since found to be vulnerable to attack and has been deprecated. Cloud Raxak highly recommends that the customer upgrade these legacy servers to ideally eliminate support for this protocol, and replace it with one of the more secure alternatives. For example, the Raxak Protect appliance is configured to offer the following KEX algorithm choices:
diffie-hellman-group14-sha1
diffie-hellman-group14-sha256
diffie-hellman-group16-sha512
diffie-hellman-group18-sha512
diffie-hellman-group-exchange-sha1
diffie-hellman-group-exchange-sha256
ecdh-sha2-nistp256
ecdh-sha2-nistp384
ecdh-sha2-nistp521
curve25519-sha256
The primary issue with diffie-hellman-group1-sha1 it is within the theoretical range of the so-called Logjam attack. In fact, OpenSSH does not enable it by default because it is weak. If it is not possible to disable this algorithm in the customer environment due to legacy compatibility reasons, Cloud Raxak recommends that the customer add one of the newer KEX algorithms to the sshd service along with the legacy algorithm.
According to the IETF:
This method uses [RFC7296] Oakley Group 2 (a 1024-bit MODP group) and SHA-1 [RFC3174]. Due to recent security concerns with SHA-1 [RFC6194] and with MODP groups with less than 2048 bits (see [LOGJAM] and [NIST-SP-800-131Ar1]), this method is considered insecure. This method is being moved from MUST to SHOULD NOT instead of MUST NOT only to allow a transition time to get off of it. There are many old implementations out there that may still need to use this key exchange, it should be removed from server implementations as quickly as possible.
For more information on the Logjam vulnerability, see: https://weakdh.org/ and https://blog.cloudflare.com/logjam-the-latest-tls-vulnerability-explained/
To enroll the resources on cloud raxak appliance we need to download the enrollment script from the appliance server for both windows and Linux and need to run that script on resources.
Follow the Getting Started: Raxak Protect Document for Downloading the script and Enrolling the Resource for both windows and Linux.
Enrollment script for Linux : RaxakProtectSetup.sh Enrollment script for Windows : RaxakProtectSetup.ps1
Here is the explanation for enrollment scripts step by step
Linux Resource Enroll process overview:
Note: The enrollment script must be run by root or by a privileged user via the sudo command. It must run under the bash shell, not sh
Windows Resource Enroll process overview:
Prerequisite:
Before enrolling a windows server, please check if the specified Group policies are configured as mentioned above (Section 3).:
If you get 'Running scripts is disabled on this system' error when the running the Enrollment script via PowerShell, then run below commands to set the execution policy:
To set it via PowerShell:
Set-ExecutionPolicy RemoteSigned
Or to set it via Group Policy:
Navigate under Computer Configuration to Policies\Administrative Templates\Windows Components\Windows PowerShell
Configure Turn on Script Execution - Enable and select Allow local scripts and remote signed scripts
Note: The Enrollment Script must be run as an Administrator.
Steps:
Security standards resources:
National Vulnerability Database
For more information, training, or assistance, please contact:
For white papers, case studies, and other product literature, please visit:
Last updated: February 2023 for Version 4.4+ © 2017-2023 Cloud Raxak, Inc. All Rights Reserved.
[1] As of this version, the cloud based service is hosted on https://www.cloudraxak.net . The IP address of the service is 52.53.166.52
[2] For setting a proxy on a WIndows computer, see for example: https://support.microsoft.com/en-us/windows/use-a-proxy-server-in-windows-03096c53-0554-4ffe-b6ab-8b1deee8dae1
[3] Note that if the raxak user’s password is ever changed, connectivity between the Raxak Protect appliance and the Windows resource will break and may have to be manually reconfigured.