Checkpoint® - User Guide

Checkpoint Applications

Author: Will Dickson, CCS
Version: 1.0.1
Date: 06 July 2007

Checkpoint Applications

As well as Checkpoint Commander (Plus) and the Checkpoint Command Centre, there are various other applications which use the Checkpoint Architecture.

Chainmail, the Checkpoint mail service

Summary

Chainmail is a complete Mail Transport Agent (MTA, or "Mail Server") solution featuring integrated spam and malware (malicious software - viruses etc.) filtering. It's specifically designed to be easy to install and configure, even by an inexperienced system administrator. It's targeted towards smaller organisations and individuals who nevertheless need a full-strength solution.

Features and highlights

  • Chainmail uses standard protocols (SMTP, POP3) and is therefore compatible with all Mail User Agent (MUA - "mail client" or just "mail program") applications which use these standard protocols, which is most of them. This includes Outlook Express (we do not recommend this product), Eudora, Opera, Mozilla Thunderbird and many others.
  • Chainmail can be deployed in several different configurations, ranging from a full SME or departmental mail service to a filtering local POP3 proxy for home users.
  • Chainmail provides a webmail service for users who are temporarily off-site, or who don't have a desktop computer of their own.
  • Chainmail offers a "one-stop shop" which replaces any OS-specific MTA / malware scanner / spam-filter combination. This is much easier to configure than the traditional "glued-together modules" approach seen in unix mail systems.
  • Chainmail filters spam using (inter alia) a configurable set of publicly-available databases, which stay up to date without local tuning. Tyipcally these block about 90% of incoming spam. (We recommend MUA-based bayesian filtering to ditch the final 10%.) Blocked spam never even enters the system, reducing bandwidth costs. Chainmail supports RFC-2505 conformant (and legal!) DoS counterattacking against confirmed spammers (this works by clogging the spammers' MTAs with undeliverable mail).
  • Chainmail's malware filtering is a "behaviour blocker". This does not require "signature file" updates, and is effective even against completely new malware that has never been seen before - modern email worms often spread extremely quickly, so this is important.
  • Chainmail is written in Java, and is therefore inherently immune to the predominant category of security flaws (buffer overruns). This also allows it to sit on top of most operating systems equally, including Linux and Windows. (Solaris and OS X are not yet supported, but we intend to fix this as soon as resources permit.)
  • Although Chainmail is not formally "fault-tolerant" - such systems are usually highly expensive and generally only needed in safety-critical applications - its database engine is optimised for robustness rather than ultimate performance. When combined with a modern, journalling filesystem such as ReiserFS, ext3, or NTFS (we recommend such a combination) messages should not be lost even if power fails during a transaction.

Chameleon, the Checkpoint collaboration system

Summary

Chameleon started life as our in-house issue (ie. bug report or feature request) tracking system - Checkpoint Reporting and Issue Tracking System, or CRAITS. From the very first, it was used to manage its own development, and was so much better than our previous system (based on private newsgroups) that it rapidly took over managing the rest of our development as well.

It has subsequently shown itself to be highly flexible, and is now used for applications which are a long way from its origins.

Applications of Chameleon

Chameleon is customisable enough to be used for a range of applications, such as:

  • Managing software development. The original use, and still indispensable in-house! We've been using it for this purpose internally for over five years now; it's stable.
  • Developing documents. Similar beneath the skin, but this isn't always recognised.
  • Discussion server. A more structured alternative to newsgroups, email lists or web fora. Keeps the discussion on-track and makes it easier to search.
  • Secure web-server. If you just want controlled access to some resources, using the Chameleon filestore (and ignoring the actual issues) may be easier to set up and manage than setting up security on a conventional webserver such as Apache.
  • Cataloguing resources. Chameleon can store externally-sourced documents and / or multimedia objects such that, with some input from you, you may be able to find them again.

Features and Highlights

  • Uses standard web protocols and features: works with any standards-compliant browser.
  • Designed to be easy to install and configure, even by an inexperienced system administrator.
  • Integrated system. Chameleon is installed from the Checkpoint Command Centre and is configured from within itself. [OK, nearly: there's a separate tool to create the first user, otherwise you can't get in.] No separate database back-end to configure.
  • Integrated user authentication. Chameleon uses Checkpoint's user authentication repository.
  • Built-in user access-control. Each Chameleon has its own set of users, each of which may be assigned different capabilities / privileges.
  • Email updates. Users can set themselves to be notified when issues they care about are updated. [Chameleon has been carefully designed so that it cannot be subverted for mailbombing or other network abuse.]
  • User digests. Each user can maintain their own "clipboard" of issues they're interested in.
  • Automatic notification of new issues. Users can set themselves to be notified whenever a new issue comes in on a subject they're interested in.
  • Remote filestore upload. Any user (who has been given the privilege) can upload arbitrary folder structures to the Chameleon filestore in a single operation.
  • Optional TLS support. [Recent versions only.]
  • Issue import / export coming soon.

Dumper

Summary

Dumper is Checkpoint's automated backup system. It's still in beta, but has been in use internally for some time.

Features and highlights

  • Dumps files or CDBs.
  • Application-aware locking. Checkpoint application databases can safely be dumped while the application is running, even if the application is heavily loaded. No risk of deadlock.
  • Scripting support allows use of near-line backup devices. The backup device can be automatically mounted and unmounted as required.
  • Networked backup coming soon.

COBRA

Summary

COBRA (Certificate Origination for Back-office Registration Authorities) is Checkpoint's X.509 certificate signing tool.

Features and highlights

  • Integrates with Checkpoint's built-in X.509 management facilities.
  • Easy to use with minimal training. Designed for use by local, devolved registration authorities within organisations (eg. departmental secretaries), not by centralised specialists.
  • Uses standard formats. Interoperates with any X.509 certificate management solution which uses the same formats, not just with other Checkpoint installations.
  • Requests and responses are signed and tamper-evident. No secure channels needed.
  • Loose coupling works easily with existing email or other messaging systems.
 
Authored in CXD using Checkpoint Information Engineering Workbench   Copyright © Caversham Computer Services Ltd.