Mac OS in a Lab 97
jmu1 wishes to get to the core of the following issue: "I run a medium sized lab of Mac OS 8.6/9.x machines. They all have (shudder) FoolProof as an attempt of keeping the systems usable. Unfortunatly, it is quite easy to bypass the software, or even to remove it using AppleScript, etc. What I want to know is, what is a usable solution for securing a lab of Macs?"
OS X (Score:3, Informative)
Re:OS X (Score:1)
Re:OS X (Score:2)
Re:OS X (Score:1)
I'm not sure how well it would work... but it's probably an option for you.
Re:OS X (Score:2)
Re:OS X (Score:3, Informative)
Re:OS X (Score:3, Informative)
Carbon Copy Cloner is pretty good for getting OS X onto a machine initially, but would be a pain for regular maintenance. I actually use ASR for initial install (macosxlabs.org talks about it here [macosxlabs.org]).
I use radmind [radmind.org] for regular maintenance of the machines in the the labs I run. It's a powerful unixy tool, a little tricky to get the hang of but it's well worth the effort.
Re:OS X (Score:1)
Re:OS X (Score:2)
Re:OS X (Score:1)
well, in the $150-$300 solution range, I think getting a FW drive would be a very good option...
Re:OS X (Score:1)
Re:OS X (Score:1)
Re:OS X (Score:1)
Install Mac OS X and all your programs on one. Then install Mac OS X on the other, boot from it and use its version of Disk Copy to make a image from device of the other partition.
The default Mac OS 9.2 version of Disk Copy can't handle images more then 2GB in size, the Mac OS X version of disk copy does not have this limitation.
Exactly. (Score:1)
To answer his question all you need is all the lab macs facing the same direction and have some huge woman wrestler stand at the back of the room with her arms crossed and an angry look on her face. Women don't screw around generally in computer labs, and the boys that do don't want their ass kicked by a big burly woman.
Problem solved, now where is that Patent form...
Re:OS X (Score:2)
And also you only have to install the applications once.
I've worked at a few places that did this, and also some that used FoolProof... God I hate that program!
Upgrade to OS X? (nt) (Score:2)
How Secure? (Score:1)
The question is how secure do you want your system to be?
Foolproof can actually lock a Mac down pretty tightly, and using their Disk Locking you can deter most Malicious Beings from messing around.
Of course, you reduce the flexibility of your system. The less options you turn on in Foolproof, the easier it is to defeat.
What do the users of your system need to accomplish on these machines? How Evil are they? I've also tried PowerOn's [poweronsoftware.com] On Guard, but didn't like it as much.
Re:How Secure? (Score:2)
Inhibit away... (Score:2, Interesting)
They have access to all the tools they need for classes and research, but most other things are locked. And everything that could make life miserable for the next person to use that machine is locked. Storage is available for each student on the server.
We occationally do games after school, and I unlock those programs at that time.
I inherited the FoolProof solution, and can't say anything about it's overall security, but we haven't had any troubles with it. I do think it's important to recruite any students that are showing enough interest in doing things that make your life tougher (might as well just put them to work).
It's also important for the students to know what type of things will get their computer access terminated.
Re:Inhibit away... (Score:2)
Firstly, it was way to easy to get around. Just boot off a DOS floppy and move foolproofs exexutable. Oops, "cannont find foolp.exe" (or whatever it was called). Secondly, it had this REALLY annoying bug, where you could move the taskbar out of the way, but you could not bring it back up, needless to say, the punk kids had a ball with this one...
NetBoot (Score:1)
=Brian
Re:NetBoot (Score:2)
Re:NetBoot (Score:3, Informative)
Let's see...The OS X Server Admin Guide [apple.com] is a very long document that should tell you anything you need to know about setting up the server. All of the rest of the information is at Apple's OS X Server Site [apple.com].
Net boot shouldn't need Jaguar Server. If you can get, or have, a copy of a later AppleShare server software, then you should be able to use the Macintosh Manager on that.
=Brian
Re:NetBoot (Score:2)
Re:NetBoot - useful info (Score:1, Informative)
Also there is a link to how to implement it under linux (read free, as in ninja-bonghits when I'm packing) which 100% works with OS9 clients if you read the explaination of how things work and try to implement it on your own.
Re:NetBoot (Score:1)
The secret to using Mac OS X Server is to do NOTHING on the computer, bu to do it all externally through the admin software and privileged users (though I'll admit the Web Based Macintosh Manager/Net info admin of server 1.2 sucked).
To update the images you needed to make and new copy of them, mount the copy on another computer with read-write access, modify them as desired, change the images to read only and then replace the Net Boot disk with the copies, on the next boot computers started using the new images.
As for help with Mac OS X Server, best is through the Apple Mailing Lists at http://lists.apple.com/ [apple.com]. There are mailing lists here for Mac OS X Server, Macintosh manager and also Net Boot.
seal the doors (Score:1, Funny)
Re:seal the doors (Score:1)
Assimilator (Score:2)
Let Them Go Crazy (Score:2, Informative)
Let the kids do whatever they want. When a system becomes unusable delete the existing Applications and/or System Folder and copy a fresh one from you backup copy.
You can just copy the folders or use Disk Copy or Stuffit to create single files out of the folders. I have know users that have had great sucess using Disk Copy and System Restore to restore custom configurations.
This is one of the many reasons I love Mac's. I can restore an OS 9.2 or newer computer to a default configuration as fast as I can copy files off a CD or over the network.
Netboot (Score:5, Informative)
Netboot [apple.com] is some nice technology from Apple. It allows you to set up a default system on some server, then have the computers on your network boot from that server. When the computer reboots, it reloads the system from the image on the server, rather than from something on the hard disk. It is very difficult for a user to change the information on the server. It's not impossible, but we all know that undefeatable security doesn't exist.
But NetBoot was made for exactly this sort of situation, so it's definitely worth checking out.
=Brian
revrdist/Assimilator (Score:5, Informative)
revrdist [purdue.edu] is a free (public domain) program with the same basic function. Its setup is a bit more involved and it doesn't have all of Assimilator's features, but it's a well-tested program that definitely works. Use it if you can handle the extra administration and prefer a free solution. The reverdist home page also has links to other Mac administration programs.
Re:revrdist/Assimilator (Score:2)
Re:revrdist/Assimilator (Score:2)
We use a cron program to automatically run Assimilator at night plus an Empty Trash program which does what it says.
You don't have to put the perfect image on a a file server, it can be on any mountable volume. I've thought of making self-assimilating machines which would have a disk image containing the perfect image. The only time there would be network traffic generated is when lab staff had to replace the disk image file. However that makes the software deployment aspect less convenient.
We hope to switch to OS X in the lab this Spring but haven't really done much preparatory work yet. We'll probably use RsyncX, Mac Manager, and the built-in restrictions to keep those machines in shape.
Re:revrdist/Assimilator (Score:4, Informative)
It is tricky to set up (uses a weird flag-based config file), but once you've got it tweaked right, administration is a breeze. Just burn a CD with a bootable system folder and revrdist on it and you can boot a hosed machine off the cd, copy the sys folder over, reboot, and the machine will fix itself.
We looked into using a "lockdown" program to prevent abuse of the machines, but decided that people who want to get around it will. revrdist helps lower the blood pressure by ensuring that fixing any software problem takes 5 minutes of your time, at most. You stop caring if people hose the machines because it takes much longer for them to wreck 'em than it does for you to fix 'em.
As a bonus, installing new apps on the machines is easy -- just update the server, set the macs to reboot every morning at 4am (energy saver control panel), and you're good to go!
Re:revrdist/Assimilator (Score:2)
MacPrefect (Score:1)
Re:MacPrefect (Score:3, Informative)
My buddy and I run a network composed in part of around 100-110 Macs in a High School environment. We've had fairly good success with MacAdministrator, although using "Target Disk Mode" is a way to defeat it with a firewire cable and a handy student-supplied notebook. I assume the same applies to MacPrefect. Nonetheless, it keeps the kids from making stupid mistakes that would otherwise cost big support time.
It also has some neato features that log you in automagically to servers and puts an alias to a home folder on the user's desktop. You can also deploy software remotely, although we prefer Retrospect for workstation production. We use remote deployment when appropriate.
The guys at Hi Resolution are top-notch, IMO, and always provide sensible answers. The documentation leaves a lot to be desired because while every module is extensively and exhaustively documented, there are no solution-oriented/howto guides. Their tech support fills that gap pretty well.
High School students (Score:1, Informative)
Re:High School students (Score:1)
you sure about that? (Score:3, Informative)
For those who have never used it, it's a cheesy-looking program, but it's a great solution for computers that run MacOS 9 and below. You can set it so you can't get info, move files, and there is a list of allowed/disallowed programs. Bypassing by holding down shift at startup won't work, etc.
There's a whole lot of other stuff it can do. All in all, when set up correctly, there is one way to bypass it, and one way to mess up a system, which I will not go into detail about. Our setup apparently works well, because I haven't seen any students bypass it.
Seriously, anyone who's used it knows that you just click on a bunch of check boxes and maybe disallow a few programs. Changing the default password is a good idea also. This is not a difficult thing to do.
Sten
Re:you sure about that? (Score:1)
Sten is exactly right... as far as ways to lock down OS 8/9 go, Foolproof is pretty darn good. I'd look over the manual again, as there's plenty of ways to lock down a system using it.
~jeff
Re:you sure about that? (Score:1)
-sonic
What did they need to do? (Score:1)
I'm probably missing something, but I can't see what people want to let students do that they aren't able to do. Lots of phrases like "crippled" and "lack of functionality" are floating around without alot of definition.
Re:What did they need to do? (Score:1)
Re:you sure about that? (Score:1)
One of the most important things to remember about configuring FoolProof is to NOT allow the execution of applications on remote volumes. That way, you couldn't use an external AppleScript, or a remote application, or (my favorite) an installer on a floppy that overwrote the FoolProof files with a copy that had a password that *you* knew (which I acquired from a machine that hadn't been locked down properly).
I would highly recommend taking another look at the manual and playing with the software some more before dismissing it.
Re:you sure about that? (Score:2)
not all that hard (Score:2)
You sort of have to know how macs use hard drives, but beyond that, if the user has physical access to the boot drive there's not much you can do.
The Netboot suggestion is a good one.
FoolProof had some vulnerabilities. (Score:2)
In fact, in the cases of applications where FP was defeatable, only certain parts of that application might bypass FoolProof.
Specifically, back in high school about 6 years ago, I took a BASIC course (easy A
Well, FP worked to block file access for TB's normal file open/close functions. (Specifically, the editor open/close)
But anything that you compiled would access files like FoolProof wasn't there.
3 lines of code replaced the FoolProof program with a 0-byte text file.
Ah the Memories (Score:1, Funny)
I also remember fool proof didn't recognize ftp access to a system. I could access files quite easily through that.
Oh don't even ask what I did with ResEdit.
Re:Ah the Memories (Score:3, Funny)
If that was your English teacher, I doubt that's the only thing that drove her crazy.
Proof that the poster is Ralph Wiggum (Score:2, Funny)
Me fail English? That's unpossible!
Re:OnGuard (Score:2, Informative)
Re:OnGuard (Score:1)
Really can't do it. (Score:4, Informative)
Unless you remove or disable the floppy, CD-ROM drive, and external SCSI connector you have little chance of truely securing a Mac lab. There will always be some way for a malcontent to get control, rather easily in fact.
I recall some stuff like DiskVault, I think, that would alter the directory layout or something so that unless you booted to the drive that was protected, you couldn't use the protected volumes. Of course, installing the software on a bootable CDR would get you around this, as would booting to an external drive that the hacker controlled and had installed the software on.
Personally, I have never encountered a disk/system lockdown utility on older Macs that I couldn't bypass with an alternate boot disk and, at most, a few hours of tinkering. The most you could ask for is that wandering lab monitors might find people hacking the thing before it goes too far. Anectodally, at one place I worked they installed GraceLAN to keep track of app lauches, prevent software installs, force LAN-wide software installs, etc. I used ResEdit and a disk editor on a floppy to locate the admin password. I then installed the admin program on my own system and force installed the old "Energizer Bunny" init on all 120 systems in the office. Of course I renamed it to something like "Apple SoundManager Tuner". THAT was a blast!
If it's just simple protection to keep the honest people honest: use SimpleFinder or AtEase that each limit what users can do. For all its problems, AtEast is a nice little application/Finder replacement for labs. It allows you to create a tab for each type of application, or on a per-course basis.
Re:Really can't do it. (Score:2)
Actually, all PCI Macs have OpenFirmware. You just don't know it because older ones are normally configured to talk through the serial ports. XPostFacto will let you change this to keyboard/video.
MacManager (Score:2, Informative)
Assimilator sucked hard in it's early days (circa 1998.) It was pretty easy to bypass. I'm not sure how it is now.
YMMV
Now I work on a corporate network with Win2k. PCs may be "real computers" in the eyes of most geeks, but being the admin for a Mac network is a hell of a lot more fun.
Not OnGuard (Score:3, Informative)
You can try it, download the demo, but try and get past it and you you'll see how easy it is. Or not. At my school, the security is a joke. So test it, if you like it, use it, but I reccomend against it.
More info here: http://poweronsoftware.com/products/onGuard/ [poweronsoftware.com].
Orange
I know a way... (Score:2, Funny)
Well... (Score:1)
That said:
1.) Educate your users and let them know your expectations.
2.) Learn how to lock down a drive and system folder.
3.) Learn how to hide various folders and how to track changes
4.) Create and deploy an easy to use and reliable backup program.
5.) Inventory your hardware and software.
Don't bother locking them down (Score:1)
MacAdministrator (Score:1)
We use MacAdministrator from Hi-Resolution to administer about 300 macs in several labs on a large college campus. If you can afford it, I highly recommend this product. It's highly customizable, and straightforward to learn. It allows you to lock down the hard drive on a folder-by-folder basis, handles software distribution, print quotas, and controls access to the chooser and control panels (again on an individual basis). You'll need a server running Appleshare IP 6.3 I believe, although they are supposed to have an OS X server available soon.
Overall, there is nothing I have wanted to accomplish in my labs that MacAdmin has not allowed me to do. I have not tried Assimilator because, frankly, MacAdmin + Apple Software Restore do every thing I need.
I'm looking into the same problem (Score:1)
Yuppy pants (Score:3, Insightful)
You make the systems secure so no one can easily screw them up preventing other students from using them. There's a lot of jackasses that love to break systems or "customize" them preventing anyone else from getting any use out of them at all. There's also the people who feel that because a school has a particular amount of bandwidth, they ought to be able to monopolize it to download ripped DVDs and MP3s. You secure your systems and your network so everyone can use it because it is a shared resource. You aren't supposed to leave systems wide open for them to be abused.
Let people do what they need to do with as little hassle as possible. Don't allow people to abuse your systems though. I've managed a Mac lab before and the previous admin decided not to lock down any of the systems. The computers crashed constantly and hardly anyone could get on the web. I spent weeks getting Carracho servers, SETI@Home clients, and copies of Starcraft off all the systems. After the systems were locked down we didn't have any problems. If people want to play Starcraft or run a Carracho server (which was probably used to ship off copies of software we had) they can do it at home. They don't need to use your lab for it unless you specifically allow them to.
Re:Yuppy pants (Score:1)
The problem with encumbering students is not that you make them feel 'icky' but that they cannot do what they need to do. No, the lab computers are not their personal computers, but they are there for student use.
If you think of your users as jackasses, you are setting up an adversarial relationship that will just make your job harder.
Nothing. (Score:1)
Is there any reason you have to set up any such system? I'm a student myself, and I've found in my experience (doing innocent things like coding) that any "idiot-proofing" system tends to make the computers much harder to use for legitimate purposes.
Much better than a program to prevent people from doing certain things would be teaching the people to just not do those things. Worried about people saving things on specific hard drives? Tell them to not do it! Worried about people installing unauthorized software? Tell them to not do it! (And take off the programs that they invariably will install.)
Re:Nothing. (Score:1)
Re:Nothing. (Score:1)
rev r disk (Score:2)
mac os x server is the way to go (Score:1)
Would this work? (Score:1)
Couple thoughts... (Score:1)
As for alternatives, if your not completely tied to using the Mac OS, install your favorite flavor of Linux and use those lock down tools (which are more plentiful and complete than the existing Mac ones). Then there is the option (depending on how old the systems are) of using the original Lock Down directly from Apple, AtEase. This software is great for foiling a would be hacker since once the machine is booted, you have to have administrator access to shut it down again. It also came with some developer stuff (of course I have no idea how your going to get your hands on this stuff now) that enabled the boot password and other fun hardware hacks.
Whee!!!!
Hooray for the old skool software that still sucks.
Managed Clients for X and Macintosh Manager 2.2.1 (Score:1)
Apple bundles these managed client apps with it's server license.
It allows centralized preference and application management, workgroup shared folders, etc.
MCX is is totally sweet (a stripped down version can be found in in the Accounts prefpane of every Jaguar install (that has a non-admin user), but the industrial strength version is included with OS X Server.
Macintosh Manager is pretty good, but with Apple's focus *away* from classic OSes, it won't get any better. It'll just fade away.
Macintosh Manager and/or NetBoot (Score:1)
Macintosh Manager (now also called Workgroup Manager which controls OS X machines) can lock down machines to where the users can only run what you allow them to run. It can also control preferences (like forcing the homepage for Internet Explorer). It is easy to bypass if you have a boot disk, but you could setup open firmware to not allow booting from an external device. This is more of a user issue, just put in your AUP that they cannot manipulate the boot process.
NetBoot puts your disk image on the network which all the machines then use to boot and run applications from. To set up a new machine in this scenerio, you pull it out of the box, plug it in, and hold down the N key as it's turned on.
You can also use Apple Software Restore in conjuctions with a NetBoot server. The machines normally boot off of their hard drive, but if you need to re-image, you hold down the N key and have a set of AppleScripts on the netbooted image that restores the machine and sets it to boot off of the hard drive. For OS X machines you need to contact your Apple SE to get a copy of ASR that works with OS X.
Believe me, Macintosh Manager is a life saver, once it is set up (and be sure your network can handle it) and it's free (with OS X Server)!
Need help locking out foolproof (Score:1)
Re:Need help locking out foolproof (Score:1)