GoodTech Secure Network for Windows V3.0 Online Help

Introduction

Installing GoodTech Secure Network

System Requirements

Before Installation

Installing GoodTech Secure Client

Installing GoodTech Secure Server

Configuring the GoodTech Secure Client

Configuring the GoodTech Secure Server

Administrating the GoodTech Secure Client

Administrating the GoodTech Secure Server

Working with GoodTech Secure Network

Trouble Shooting

Top

Diagrams

Diagram  1 – Unsecured connection

Diagram  2– Secured connection

Diagram  3– How it works

Diagram  4– Multiple applications

Screen Shots

Screen Shot 1 – Windows NT Services Program, GoodTech Secure Client automatic startup

Screen Shot 2 –  GSCONFIG.DAT parameter file

Screen Shot 3– Windows NT Services Program, GoodTech Secure Server automatic startup

Screen Shot 4–  GSCONFIG.DAT parameter file

Screen Shot 5 – GoodTech Secure Client, Log File

Screen Shot 6– GoodTech Secure Server, Log File

Screen Shot 7 – Creating a new session (gt_create_session.exe)

Screen Shot 8 – Secured Telnet Session

Screen Shot 9 – Secured FTP Session

Screen Shot 10 – Tnsnames.ora

Screen Shot 11 – Password utility (gt_crypt_pass.exe)

Top

Introduction

Welcome

This help document gives you an introduction to GoodTech Secure network products, describes how to install, set up and use the Secure network products, and has a trouble shooting chapter to help you overcome problems. We hope you will find it helpful.

Although we did our best to proofread this help, we are unfortunately not immune to mistakes and omissions. If you find any mistake or have suggestions to improve this help, please let us know

Top

Introduction to GoodTech Secure Network

Much of the information transmitted across a company network is of private nature. However, companies use the unsecured Internet channel to connect remote offices and remote employees. The diagram below illustrates a typical unsecure connection over the Internet:

Diagram  1 – unsecured connection

GoodTech Secure Network turn the unsecured Internet channel into a secured one and let companies benefit from a secured Internet. GoodTech Secure Network contains two components that together build a secure channel:

  • GoodTech Secure Client (GSC) - installed on the client side.
  • GoodTech Secure Server (GSS) - installed on the server side.

The diagram below illustrates a typical connection secured by GoodTech Secure Network:

Diagram  2 – secured connection

GoodTech Secure Network is not only secure but also easy to use, reliable and affordable.

GoodTech Secure Network Key Features

  • Secures your data traffic over the Internet
    • Built-in support for securing Telnet and Ftp protocols, including Goodtech products.
    • Built-in support for securing Oracle
    • Support for Sybase, MS-Sql, POP3, SMTP, Real Audio, Real Video and many more.
    • Can secure multiple applications
    • Fits to secure traffic to remote offices and/or remote employees.
       
  • Implements best cryptography algorythms
    • Use of private key cryptography to secure and distribute session keys.
    • Session keys are used with symetric algorithms to secure messge traffic.
    • Use of RC2,RC4 and DES symetric algorithms with key lengths of 40,56,128 bits
    • Use of RSA and Diffie-Hellman providers
    • Use of MD5,SHA hashing algorithms
    • Use of Microsoft Base and Enhanced providers
  • Simple to use
    • Requires no change in your current applications
    • Ready to use out of the box
    • Easy to expand due to modular configuration
    • Easy to maintain

     

  • Fail over support when using multiple Secure Servers
  • Excellent performance
  • Complements and integrates with other vendor security products

Top

How Does GoodTech Secure Network Work

Diagram  3 –  How it works

  1. A client (i.e. telnet client) sends a request to the server (i.e telnet server). GoodTech Secure Client (GSC) pretends to be the server (i.e telnet server) and receives the request.
  2. GSC encrypts the data and sends it to GoodTech Secure Server (GSS).
  3. GSS decrypts the data, pretends to be the client and sends the data to the server.
  4. The Server sends a response to the client. GSS pretends to be the client and recieves the response.
  5. GSS encrypts the data and sends it to GSC.
  6. GSC decrypts the data, pretends to be the server and sends the data to the client.

 
GoodTech Secure Network Architecture

The GoodTech Secure Network architecture is pretty flexible. You can build your system with one or more GSS components and one or more GSC components.

Servers can share a single GSS component (economic), can have a GSS component each (modular), can share multiple GSS components (performer) as well as combinations of economic/modular/performer configurations.

In a similar way clients in a remote office can share one GSC component (economic), can have a GSC component each (modular), can share GSC components (performer), as well as combinations of economic/modular/performer configurations. Remote employees can not share GSC and each has to have GSC component on his machine.

Any combination of GSS components and GSC components is supported. For example, you can structure your system with performer configuration in the head office and have a modular client configuration in your remote offices.

It is pretty simple to restructure the components so you can always start with the economic configuration and upgrade to a modular system with better performance once need comes up and your budget allows it.

The diagram below illustrates performer configuration in the head office, modular client configuration in a remote office and remote employees:

Diagram  4 –  multiple applications

How the GoodTech Secure Client Works

The GoodTech Secure Client should be installed on the client side of the application you want to secure. The installation program creates a service called gsc and adds it to the list of services available on your Windows system. When the Secure Client service is started, either manually or automatically, it executes a program named gsc.exe

The program gsc.exe opens a log file gsc.log in the %gt_gsc_installation_dir% directory.(gt_gsc_installation_dir is a the system environment variable created during installation, that contains the GoodTech Secure Client installation directory.)

Gsc.exe is now ready for connection requests. It listens to requests on the configured ports Telnet, Ftp and 3 predefined Application ports.

When a user wants to open a secure telnet/ftp or other secure connection using TCP/IP, he connects to the application defined port where the Secure Client is running.  The Secure client connects to the configured host/port of the GoodTech Secure Server via a secure channel and tells it the type of application/protocol that the user is using. The Secure Server connects to the server application host/port and a secure channel is established (encrypted channel) between the client application and the server application.

How the GoodTech Secure Server Works

The installation program creates a service called gss and adds it to the list of services available on your Windows system. When the Secure Server service is started, either manually or automatically, it executes a program named gss.exe

The program gss.exe opens a log file gss.log in the %gt_gss_installation_dir% directory.(gt_gss_installation_dir is the system environment variable, created during installation, that contains the GoodTech Secure Server installation directory.)

Gss.exe is now ready for connection requests from any Secure Client program on the configured port (the default is 100).

When the Secure Server receives a connection request from a Secure Client it tries to connect to the server application host with the configured port. If the connection succeeds, a new secure (encrypted) channel is opened and the user client server application communicates through an encrypted and secure session.

Top

Registration

Registration is very simple - you are automatically registered when you order from GoodTech Systems. When we receive your order, we will send you back your registration number along with your registered copy of the product. Our simple licensing policy lets you purchase as many copies as you need and get a single license for all copies.

Top

Installing GoodTech Secure Network

System Requirements

GoodTech Secure Network runs on Windows 98/Me and Windows NT(4.0)/2000.

The TCP/IP protocol must be installed on your Windows system. This protocol is included with the Windows operating system but is not always installed on all systems. You can check if TCP/IP is installed on your system by choosing Network from the Control Panel. If TCP/IP is installed on your system it should show up in the list of Installed Network Protocols.

You should use the Administrator account or any other account with administration privileges to install the GoodTech Secure Client. (Windows NT/2000)

Windows NT/2000:

Make sure that all users other than the administrator group have no permissions to the Secure Client installation directory. The best way to do it is by installing the product on a NTFS drive and use built-in NT/2000 security to protect the files.

Top

Before installation

Please note that in order to get the Secure Network to work correctly, you need to install the GoodTech Secure Client on your local machine where the client application is running, or on any machine that reside on your local network if this network is secured. You should install the GoodTech Secure Server on a machine where your server application is running, or on any machine on the local network where this server application is running.

Installing the GoodTech Secure Client

Running the Installation Program

After downloading the evaluation copy of the GoodTech Secure Client or receiving the registered copy, you have to perform the following steps:

    Unzip the GSC zip file to your installation directory on one of your local drives, recommended on NTFS (NT/2000). Installation on a network drive is not supported. After extracting the zipped file you will see the following files in your Secure Client installation directory:

    README.htm - Make sure you read this file before proceeding with the installation process.

    Install.exe - The GoodTech Secure Client installation program.
    Uninstall.exe - The GoodTech Secure Client uninstall program.
    gsc.exe - This program is executed by the Secure Client service after it is started.
    gt_send_message.exe - This program is used to send control messages to the Secure Client service. gt_create_session.exe - This program is used to create a new secured session with the Secure Client service. gt_crypt_pass.exe - This program is used to create a new password key. The key that is generated is kept in a file named gs_pass.dat.

    Run install.exe to install GoodTech Secure Client. The installation program will ask you the following questions:

  • Enter GSS host name [localhost]:

    The host or IP address specified here is used by the GSC to connect to the GSS (GoodTech Secure Server). You can specify more than one server. The GSC will try to connect to the GSS using the first name and if it fails, it will try the second server on the list and so on.

  • Enter GSS port number [100]:


    The port specified here is used by the GSC to connect to the port the GSS is listening on. The GSC uses each port in this list with the matching host/IP address from the previous question, so if you have two GSS servers, GSS1 listens on port 100 and GSS2 listens on port 200, you will specify in the previous question GSS1,GSS2 and in this question 100,200

  • Enter listening port number for Telnet [23]:


    The port specified here is used to listen to Telnet requests.
    All Telnet requests that need to be encrypted should connect to this port.

  • Enter listening port number for Ftp [21]:


    The port specified here is used to listen to Ftp requests.
    All Ftp requests that need to be encrypted should connect to this port.

  • Enter listening port number for Appl1 [0]:


    The port specified here is used to listen to user defined application (client/server applications) requests.
    All user defined requests that need to be encrypted should connect to this port.

  • Enter listening port number for Appl2 [0]:


    The port specified here is used to listen to user defined application (client/server applications) requests.
    All user defined requests that needt to be encrypted should connect to this port.

  • Enter listening port number for Appl3 [0]:


    The port specified here is used to listen to user defined application (client/server applications) requests.
    All user defined requests that need to be encrypted should connect to this port.

  • Select Cryptographic Type. 
    Valid types are: 
    1. PROV_RSA_FULL 
    2. PROV_DSS_DH
    Enter a number [1]:

    PROV_RSA_FULL- supports both digital signatures and data encryption. It is considered a general purpose CSP. The RSA public-key algorithm is used for all public-key operations.

    PROV_DSS_DH - supports Diffie-Hellman (D-H) key exchange (a 40-bit DES derivative), SHA hashing, DSS data signing, and DSS signature verification

  •  Select Cryptographic Hash. 
    Valid types are: 
    1. CALG_MD5 
    2. CALG_SHA
    Enter a number [1]:

    MD5 - a hashing algorithm that creates a 128-bit hash value, which is twice the size of the block (64 bits). 

    SHA - a hashing algorithm that generates a 160-bit hash value. SHA is used with the Digital Signature Algorithm(DSA) in the Digital Signature Standard(DSS), among other places. 

  • Select Symetric Algorithm.
    Valid types are: 
    1. CALG_RC2 
    2. CALG_RC4
    3. CALG_DES
    Enter a number [1]:

    RC2 - uses 64-bit symmetric block cipher.
    RC4 - uses a symetric stream cipher.
    DES - uses a 64-bit symetric block cipher that has a fixed length 0f 56 bits.

    The installation creates a new service with the internal name GSC. If a service with a name GSC is already in use in your system, you have to uninstall the existing service before you install GoodTech Secure Client.

    The installation program asks you to reboot the system. You should reboot your system in order to get changes in effect. The installation creates a system environment variable called gt_gsc_installation_dir that contains the GoodTech Secure Client installation directory. (Please note that the Secure Client service starts automatically every time you reboot your machine)

Top

Upgrading to a New Version

If you want to install a new version of the Secure Client but have a previous version currently installed on your system, you have to do the following:

Top

Running the Uninstall Program

If you want to uninstall the GoodTech Secure Client from your system, all you have to do is:

    Make sure the gsc service is not running. If it is running, stop the service. Run uninstall.exe to uninstall your current version of GoodTech Secure Client.

Top

Installing the GoodTech Secure Server

Running the Installation Program

After downloading the evaluation copy of the GoodTech Secure Server or receiving the registered copy, you have to perform the following steps:

    Unzip the GSS zip file to your installation directory on one of your local drives, recommended on NTFS (NT/2000). Installation on a network drive is not supported.After extracting the zipped file you will see the following files in your Secure Server installation directory:

    README.htm - Make sure you read this file before proceeding with the installation process.
    Install.exe - The GoodTech Secure Server installation program.
    Uninstall.exe - The GoodTech Secure Server uninstall program.
    gss.exe - This program is executed by the Secure Server service after it is started.
    gt_crypt_pass.exe - This program is used to create a new password key. The key that is generated is kept in a file named gs_pass.dat.

    Run install.exe to install GoodTech Secure Server. The installation program will ask you the following questions:

  • Enter GSS listening port number [100]:


    The port specified here is used by the GSS to listen to Secure Client requests. The default port number is 100.

  • Enter listening port number for Telnet application [23]:


    The port specified here is used for connection to telnet server application.
    Set this port number according to the listening port number of your telnet server application. 

  • Enter listening port number for Ftp application [21]:


    The port specified here is used for connection to ftp server application.
    Set this port number according to the listening port number of your ftp server application. 

  • Enter listening port number for Oracle application [0]:


    The port specified here is used for connection to Oracle server (Oracle Listener). Set this port number according to the listening port number of your Oracle server (Oracle Listener). 

  • Enter listening port number for Appl1 application [0]:


    The port specified here is used for connection to Appl1 server application.
    Set this port number according to the listening port number of your Appl1 server application. 

  • Enter listening port number for Appl2 application [0]:


    The port specified here is used for connection to Appl2 server application.
    Set this port number according to the listening port number of your Appl2 server application. 

  • Enter listening port number for Appl3 application [0]:


    The port specified here is used for connection to Appl3 server application.
    Set this port number according to the listening port number of your Appl3 server application. 

  • Select Cryptographic Type.
    Valid types are:
    1. PROV_RSA_FULL 
    2. PROV_DSS_DH
    Enter a number [1]:

    The PROV_RSA_FULL type supports both digital signatures and data encryption. It is considered a general purpose CSP. The RSA public-key algorithm is used for all public-key operations.

    The PROV_DSS_DH type supports Diffie-Hellman (D-H) key exchange (a 40-bit DES derivative), SHA hashing, DSS data signing, and DSS signature verification

  •  Select Cryptographic Hash. 
    Valid types are: 
    1. CALG_MD5 
    2. CALG_SHA
    Enter a number [1]:

    MD5 - a hashing algorithm that creates a 128-bit hash value, which is twice the size of the block (64 bits). 

    SHA - a hashing algorithm that generates a 160-bit hash value. SHA is used with the Digital Signature Algorithm(DSA) in the Digital Signature Standard(DSS), among other places. 

  • Select Symetric Algorithm. 
    Valid types are: 
    1. CALG_RC2 
    2. CALG_RC4
    3. CALG_DES
    Enter a number [1]:

    RC2 - uses 64-bit symmetric block cipher.
    RC4 - uses a symetric stream cipher.
    DES - uses a 64-bit symetric block cipher that has a fixed length 0f 56 bits.

    The installation creates a new service with the internal name GSS. If a service with a name GSS is already in use in your system, you have to uninstall the existing service before you install GoodTech Secure Server.

    The installation program asks you to reboot the system. You should reboot your system in order to get changes in effect. The installation creates a system environment variable called gt_gss_installation_dir that contains the GoodTech Secure Server installation directory. (Please note that the Secure Server service starts automatically every time you reboot your machine)

Top
 

Upgrading to a New Version

If you want to install a new version of the Secure Server  but have a previous version currently on your system, you have to do the following:

Top

Running the Uninstall Program

If you want to uninstall the GoodTech Secure Server from your system, all you have to do is:

    Make sure the gss service is not running. If it is running, stop the service. Run uninstall.exe to uninstall your current version of GoodTech Secure Server.

Top

Configuring the GoodTech Secure Client

Setting up parameters to GoodTech Secure Client

Automatic Startup (NT/2000)

It is possible to specify an automatic startup for the GoodTech Secure Client. To do so, you have to perform the following steps:

Configuration Parameters (GSCONFIG.DAT)

GoodTech Secure Client (GSC) is reading GSCONFIG.DAT for configuration parameters.

Server_Host - Defines the name of the GoodTech Secure Server (GSS) Host or IP address. This parameter may contain more than one Host/IP. For example, you can put two Hosts separated by commas. For example, Server_Host=Host1,Host2

Server_Port - Defines the GoodTech Secure Server (GSS) listening port number. You can put more than one port number in this parameter. For example, Server_Port =100,110. These port numbers correspond to each server name in the Server_Host parameter.

Telnet_Port - Defines the secure listening Telnet port number that accepts Telnet requests from a Telnet client application. The Telnet client application should use this port number when connecting to GoodTech Secure Client (GSC) application. If the Telnet client application does not use this port number the Telnet session will not be secured.

Ftp_Port - Defines the secure listening Ftp port number that accepts Ftp requests from a Ftp client application. The Ftp client application should use this port number when connecting to GoodTech Secure Client (GSC) application. If the Ftp client application does not use this port number the Ftp session will not be secured.

Cryptographic_Type - Supported types are: PROV_RSA_FULL and PROV_DSS_DH

PROV_RSA_FULL -

PROV_DSS_DH -

The default type is PROV_RSA_FULL.

Cryptographic_Hash - Identifies the hash algorithm. Supported hash algorithm are: MD5 and SHA. The default is MD5.

Symetric_Algorithm - Identifying the symmetric encryption algorithm. Supported symetric algorithm are: RC2,RC4 and DES. The default is RC2.

Provider_Name -Identifies the name of the CSP to be used. The supported CSP are: MS_DEF_PROV and MS_ENHANCED_PROV. The default is MS_DEF_PROV.

MS_DEF_PROV: Microsoft Base Cryptographic Provider v1.0
MS_ENHANCED_PROV: Microsoft Enhanced Cryptographic Provider.

Trace - Enables trace information. To enable trace information specify YES. The default is no trace.

Encrypt - Disables encryption. To disable encryption specify NO. The default is to encrypt all sessions. Please note that you should not disable encryption if it is not necessary.

Appl1_Port - Defines an application listening port number for predefined application1.

Appl2_Port - Defines an application listening port number for predefined application2.

Appl3_Port - Defines an application listening port number for predefined application3.

Local_Port1 - Defines the temporary start port number for GSC. The default port number is 1124.

Local_Port2 - Defines the temporary start port number for GSC. The default port number is 3024.

Session_Port - Defines the listening session port number. The default is port number 120.

Main_Port - Defines the internal port number to used by GSC. The default is port 140.

Read_Buffer - Defines the buffer size for the session. The default size is 256. The maximum size is 512.

Session_Timeout - Defines the timeout in seconds for new created sessions. This parameter determine how much time new created sessions will remain open until client application is connected to them.

Connection_Lifetime - Defines the lifetime for closed connections. The default is to reuse the closed connections. When a 0 value is defined the connection will remain open for infinite time.

Login_Idle - Defines the timeout value for idle login to GSC. The default is infinite.

Predefined_Connections - Defines a set of predefined connections to be used when a client is connected.

The syntax is port,host,type:[port,host,type:]

For example, if you put 205,host1,1: any telnet client application can use a secure telnet session by connecting to the host where the GSC is running using port 205 and immediately the telnet session will connect to host1 where the telnet server is running. We currently support up to 10 predefined connections. Please make sure that you terminate the line with :
 

Each parameter in the GSCONFIG.DAT file should be written exactly as described in this help file (case sensitive) and immediately followed by '=' char. For example, to add trace information you should put in the GSCONFIG.DAT file the line Trace=YES. Each parameter should be in a separate line.  
 


Screen Shot 2 –  GSCONFIG.DAT parameter file

Top
 
 Connection Restriction based on Host or IP Address

You may optionally restrict connections to GoodTech Secure Client based upon the host or IP address. Remote access may be limited only to specific hosts or IP addresses. Restrictions based on host or IP are enforced when the file GT_IPF.DAT exists in your installation directory. The first line in this file can be ONE of the keywords, INCLUDE or EXCLUDE. When the first line contains the INCLUDE keyword, then all hosts or IP addresses listed on the following lines are the only hosts/IP addresses that have the permission to access the GSC. (All other hosts or IP addresses are not allowed). If the first line contains the keyword EXCLUDE, then all hosts/IP addresses listed after this line do not have permission to access the GSC. (All other hosts or IP addresses are allowed.)

Top

Configuring the GoodTech Secure Server

Setting up parameters to GoodTech Secure Server

Automatic Startup (NT/2000)

It is possible to specify an automatic startup for the GoodTech Secure Server. To do so, you have to perform the following steps:

Configuration Parameters (GSCONFIG.DAT)

GoodTech Secure Server (GSS) is reading GSCONFIG.DAT for it's parameters.

Server_Port - Defines the GoodTech Secure Server (GSS) listening port number. 

Telnet_Port - Defines the Telnet server port number that GoodTech Secure Server will use when a Telnet secured session is created by the GoodTech Secure Client.

Ftp_Port - Defines the Ftp server port number that GoodTech Secure Server will use when a Ftp secured session is created by the GoodTech Secure Client.

Oracle_Port - Defines the Oracle Listener port number that GoodTech Secure Server will use when a Oracle secured session is created by the GoodTech Secure Client.

Cryptographic_Type - See above

Cryptographic_Hash - See above

Symetric_Algorithm - See above

Provider_Name - See above

Trace - Enables trace information. To enable trace information specify YES. The default is no trace.

Encrypt - Disables encryption. To disable encryption specify NO. The default is to encrypt all sessions. Please note that you should not disable encryption if it is not necessary.

Appl1_Port - Defines an application connecting port number for predefined application1.

Appl2_Port - Defines an application connecting port number for predefined application2.

Appl3_Port - Defines an application connecting port number for predefined application3.

Read_Buffer - Defines the buffer size for the session. The default size is 256. The maximum size is 512.

Session_Timeout - Defines the timeout in seconds for new created sessions. This parameter determine how much time new created sessions will remain open until client application is connected to them.

Telnet_Catch_Port - defines a Telnet listening port number to catch unsecured Telnet connections.

Ftp_Catch_Port - defines a Ftp listening port number to catch unsecured Ftp connections.

Oracle_Catch_Port - defines a Oracle listening port number to catch unsecured Oracle connections.

Appl1_Catch_Port - defines an Application1 listening port number to catch unsecured Application1 connections.

Appl2_Catch_Port - defines a Application2 listening port number to catch unsecured Application2 connections.

Appl3_Catch_Port - defines a Application3 listening port number to catch unsecured Application3 connections.

Each parameter in the GSCONFIG.DAT file should be written exactly is described in this help file (Case sensitive) and immediately followed by '=' char. For example, to add trace information you should put in the GSCONFIG.DAT file the line Trace=YES. Each parameter should be in a separate line.
 
 


Screen Shot 4–  GSCONFIG.DAT parameter file

Top
 
 

Connection Restriction based on Host or IP Address

You may optionally restrict connections to GoodTech Secure Client based upon the host or IP address. Remote access may be limited only to specific hosts or IP addresses. Restrictions based on host or IP are enforced when the file GT_IPF.DAT exists in your installation directory. The first line in this file can be ONE of the keywords, INCLUDE or EXCLUDE. When the first line contains the INCLUDE keyword, then all hosts or IP addresses listed on the following lines are the only hosts/IP addresses that have the permission to access the GSC. (All other hosts or IP addresses are not allowed). If the first line contains the keyword EXCLUDE, then all hosts/IP addresses listed after this line do not have permission to access the GSC. (All other hosts or IP addresses are allowed.)

Top

Administrating GoodTech Secure Client

Controlling the GoodTech Secure Client Service

Starting the GoodTech Secure Client Service

    Go to the Control Panel / Services program, select GoodTech Secure Client from the list of Services and press the Start button. (Windows NT/2000) Go to the Command Shell Prompt and type "NET START GSC". 

Stopping the GoodTech Secure Client Service

    Go to the Control Panel / Services program, select GoodTech Secure Client from the list of Services and press the Stop button. (Windows NT/2000) Go to the Command Shell Prompt and type "NET STOP GSC" . 

Pausing the GoodTech Secure Client Service (Windows NT/2000)

    Go to the Control Panel / Services program, select GoodTech Secure Client from the list of Services and press the Pause button. Go to the Command Shell Prompt and type "NET PAUSE GSC". 

Continuing the paused GoodTech Secure Client Service (Windows NT/2000)

    Go to the Control Panel / Services program, select GoodTech Secure Client from the list of Services and press the Continue button. Go to the Command Shell Prompt and type "NET CONTINUE GSC". 

Top

The Log File

What is the Log File

The GoodTech Secure Client service uses one Log file gsc3.0.log , to keep a record of everything it does. The log file is kept in the GoodTech Secure Client installation directory. 

Here is an example of the GSC log file content:


Screen Shot 5 – GoodTech Secure Client, Log File

Top

Resetting the Log File

Your log file can grow quite large and quite fast, especially if your host is getting a large number of GSC requests per day. The size of the file can eat into your disk quota and tie up needed space. 

To reset your log file, simply delete the file when the Secure Client service is not running. Make sure that you don't try to delete your log file when it is actually being written to by the Secure Client. The next time the Secure Client will run, new log file will be created. 

Enabling Tracing

To enable trace information in the log file you should enter the keyword 'Trace=yes' in  gsconfig.dat parameter file.

Top

Administrating GoodTech Secure Server

Controlling the GoodTech Secure Server Service

Starting the GoodTech Secure Server Service

    Go to the Control Panel / Services program, select GoodTech Secure Server from the list of Services and press the Start button. (Windows NT/2000) Go to the Command Shell Prompt and type "NET START GSS". 

Stopping the GoodTech Secure Server Service

    Go to the Control Panel / Services program, select GoodTech Secure Server from the list of Services and press the Stop button. (Windows NT/2000) Go to the Command Shell Prompt and type "NET STOP GSS". 

Pausing the GoodTech Secure Server Service (Windows NT/2000)

    Go to the Control Panel / Services program, select GoodTech Secure Server from the list of Services and press the Pause button. Go to the Command Shell Prompt and type "NET PAUSE GSS". 

Continuing the paused GoodTech Secure Server Service (Windows NT/2000)

    Go to the Control Panel / Services program, select GoodTech Secure Server from the list of Services and press the Continue button. Go to the Command Shell Prompt and type "NET CONTINUE GSS". 

Top

The Log File

What is the Log File

The GoodTech Secure Server service uses one Log file gss3.0.log , to keep a record of everything it does. The log file is kept in the GoodTech Secure Server installation directory. 

Here is an example of the GSS log file content:


Screen Shot 6– GoodTech Secure Server, The Log File

Top

Resetting the Log File

Your log file can grow quite large and quite fast, especially if your host is getting a large number of requests per day. The size of the file can eat into your disk quota and tie up needed space. 

To reset your log file, simply delete the file when the Secure Server service is not running. Make sure that you don't try to delete your log files when it is actually being written to by the Secure Server. The next time the Secure Server will run, new log file will be created. 

Enabling Tracing

Top

Working with GoodTech Secure Network

Securing Any Standard TCP/IP Client/Server Application

Working with GoodTech Secure Network is very simple. GoodTech Secure Network support every standard TCP/IP application without changing or modifying your current application.

The best way to use our product is to follow these steps:

1. Install GoodTech Secure Client (GSC) on your Windows machine (98/Me/NT/2000) where your TCP/IP client application is running. (You can also install it on any machine on your local network where your machine is configured). For installation directions please refer to Installing GoodTech Secure Client.

2. Install GoodTech Secure Server (GSS) on your Windows machine (98/Me/NT/2000) where your TCP/IP server application is running. (You can also install it on any machine on your local network where your server application is running). For installation directions please refer to Installing GoodTech Secure Server.

3. Create a secure session. For directions please refer to Creating a secured session. If you want to secure one of the applications that have built-in support, i.e. Telnet and FTP, you can skip this step. If you want to change defaults for the applications that have built-in support, you should not skip this step.

4. Connect your client application to the port/host where the GSC is running.

5. Change your default password. For directions please refer to Changing the Password Key.

From now on new sessions are secured.

Creating a Secured Session

To create a new secured session for your TCP/IP application you need to run gt_create_session.exe, that comes with GoodTech Secure Client.

gt_create_session.exe parameters:

  • gsc host- Host name or IP address where the GoodTech Secure Client (GSC) is running.
  • gsc session port# - GSC listening port number for new secured session. If you did not chang it, the default is port 120.
  • listening session port# - The new listening port number that the client application will use to connect when using a secured session.
  • appl host - The host or IP address of the server application. When a secured session is initiated, GoodTech Secure Server will use this Host or IP to know where the user server application is running.
  • appl type# - The type of application that will use the secured session. Applications supported are: Telnet, Ftp, Oracle, and 3 predefined user applications. For Telnet use number 1, for Ftp use number 2, Oracle is number 6 and the 3 predefined user applications are 10, 11, 12.
  • allow all - This parameter enables (1) or disables (0) other users from other machines to use this new opened session to run their client applications. The default is 0, meaning that only the user that created the new session can use it when connecting with his client application.

For example, to create a new secured session issue the command:
gt_create_session.exe localhost 120 500 ApplicationHostName 10

To get the program usage, just run the program without any parameters.

Screen Shot 7 – Creating a new secured session (gt_create_session.exe)

Securing Telnet application

GoodTech Secure Network has a built-in support for Telnet application. The GoodTech Secure Client (GSC) uses port number 23 for telnet requests (can be changed). To secure your telnet session:

  • Install GoodTech Secure Client (GSC) on your local machine where your telnet client is configured.
  • Install GoodTech Secure Server on the machine running your telnet server application.
  • Connect your telnet client application to the port/host where your GSC is running: Telnet gschostname 23.

When the GSC gets a telnet request, it opens a new secured session and connects to the defined GSS application. From now on all the data is encrypted including user/password.

The screen shot below describes a new secured telnet session:


Screen Shot 8 – Secured Telnet Session

Securing Ftp Application

GoodTech Secure Network has a built-in support for Ftp application. The GoodTech Secure Client (GSC) uses port number 21 for ftp requests (can be changed). To secure your telnet session:

  • Install GoodTech Secure Client (GSC) on your local machine where your ftp client is configured.
  • Install GoodTech Secure Server on the machine running your ftp server application.
  • Connect your ftp client application to the port/host where your GSC is running: ftp gschostname 21

When the GSC gets a ftp request, it opens a new secured session and connects to the defined GSS application. From now on all the data is encrypted including user/password.

The screen shot below describes a new secured ftp session:


Screen Shot 9 – Secured Ftp Session

Please note that you need to enter the username with the host information. For example, if you want user "David" to connect to ftp server host "Host1", you should type when prompt for username: David&Host1

Securing Oracle

GoodTech Secure Network has a built-in support for Oracle. In order to enable a secured Oracle session you need to:

  • Install GoodTech Secure Client (GSC) on your local machine where your Oracle client is configured.
  • Install GoodTech Secure Server on the machine running your Oracle server application.
  • create an Oracle session using gt_create_session.exe program, installed with your GoodTech Secure Client product.

    For example: gt_create_session localhost 120 521 OracleHostName 6 1
    This will create a new secured Oracle session with GoodTech Secure Client and will use port 521 to accept Oracle client application requests. 

  • Connect your Oracle client application to the port/host where your GSC is running. Modify Oracle TNSNAMES.ORA in your Oracle installation to point to the new created session. The following is a modified TNSNAMES.ORA that correspond to the new session created:

 


Screen Shot 10 – Tnsnames.ora

  • Work securely with your Oracle client. For example:
    sqlplus user/password@secure.world

Please note that the session that was created will be deleted after the Oracle client exits. To ensure that the secure Oracle session remains open for new connections, you should add the line Connection_Lifetime=0 in the GoodTech Secure Client GSCONFIG.DAT file.

Changing the password key

GoodTech Secure Network implement private key cryptography to secure and distribute session keys. Those session keys are used with symetric algorithms to secure messge traffic. The session key is created when it is needed to encrypt communications and destroyed when it is no longer needed. This drastically reduces the risk of compromising the session key. The private key is at less risk because it is only used once per communication to encrypt a session key. The system is shipped with default private key. Your last step before the system is ready for secured connections is to change the default key. It is recommended to do it as the last step to eliminate key related problems during the installation of GoodTech Secure Network. It is also recommended to frequently change the key.

To change the key use the key utility gt_crypt_pass.exe program that comes with GSC and GSS products. To run the program just issue gt_crypt_pass.exe from a command prompt and give it a password. The password is also scrambled so you can not see it in the file (gt_pass.dat).

Any change to the password file should be done on both the client and the server sides. GoodTech Secure Client is using the password file as the key for encrypting and GoodTech Secure Server is using this password file as the key for decryption. If the password file is not the same on both sides the encryption/decryption will not work!

The following is a screen shot of the password utility program:


Screen Shot 11 – Password utility (gt_crypt_pass.exe)
 

Trouble Shooting

Handling Problems

It is not uncommon to encounter a problem while using the GoodTech Secure Network, especially if these are your first steps with the product. 

The best place to look for answers to questions/problems is this Help. You can also try the frequently asked questions list. If your question/problem was not answered/solved, you can try monitoring the log file. If you don't even get to the point that your Secure Network is up and running and the log file does not exist yet, try our error messages list. If your error is listed on that list, you'll find the corresponding recommended course of action. And of course, as your last resort, you can always contact our technical support experts. Don't hesitate to contact us, your questions are welcome. If you contact our technical support, please make sure you provide the following information:

  • Product Name
  • Version
  • Problem/question description
  • Error message or error number (if applicable)
  • Secure Client/Server log file (if applicable, attach the file to your email) 

Top

Monitoring the Log File

The GoodTech Secure Client/Server service uses Log file to keep a record of everything it does. Most of the entries you'll find in the log file are informational or success messages. However, error messages are also written to the log file, and these are the ones you are looking for when facing a problem. 

Whenever an error occurs, the Secure Client/Server writes the error number into the log file. You can get the error number by searching the string "error no" in your log file. In case this string is found more than once, the first error message is the error you want to solve. In most cases, other errors are a result of the first one.

In the log file, you will find only the error number, but you can easily translate the error number to its description by doing the following:

Go to a Command Shell Prompt and type "NET HELPMSG [error number]"

If the error description is too vague and you are not sure what should you do to overcome the problem, try to check out the error in our list of common errors for a recommended course of action.

Top

Common Error List

The error messages you encounter as you start using GoodTech Secure Client/Server are most likely common errors that others encountered as well. 

FAQ

Your initial questions are most likely FAQs and you could probably benefit from reading answers to questions that others have asked as well.

Top