RCS Upgrade Procedure Upgrade to 9.2.x Revision Author (s) Release Date 1.0 FAE Team 2014, March Contents 1 2 3 Objectives ................................................................................................................4 Upgrade to RCS 9.2.x ..............................................................................................5 2.1 Prerequisites .............................................................................................. 5 2.2 Must know about 9.2.x ............................................................................... 5 2.3 Upgrade Procedure .................................................................................... 8 2.4 Anonymizer uninstallation .......................................................................... 9 2.5 Anonymizer installation ............................................................................ 10 2.6 Anonymizer security checks .................................................................... 10 2.7 Collector security checks ......................................................................... 11 2.8 Master Node security checks ................................................................... 11 Appendix ................................................................................................................12 1 Objectives The purpose of this document is to describe the procedure to upgrade existing RCS installations with live agents to version 9.2.x. This procedure must be considered especially in case that on the existing system are present live agents or evidences that must be safeguarded. 2 Upgrade to RCS 9.2.x 2.1 Prerequisites The following prerequisites must be respected to perform a successful upgrade: Multi-Tier RCS Installation (if the system is an All-in-One configuration, stop the procedure and notify it); Supported Operating System Language (If the language of servers O.S. is different from all the following: english, italian, spanish, russian. Stop the procedure and notify it); Windows Updates: Check windows updates to the last update available on all RCS local servers (Master Node, Collectors, Shards); Compliancy with HT Technical Requirements: Verify to be totally compliant with the technical requirements (attached at the end of the document); New license file valid for version 9.2.x; Installer executables for version 9.2.0 and for the last 9.2.x; Two new Anonymizers (we recommend to rent them from different providers). 2.2 Must know about 9.2.x RCS 9.2.x introduce new features with several security enhancements. For this reason all existing agents (pre 9.2.x upgrade) that are used to communicate with a 9.1.x infrastructure are not allowed to be considered as part of new 9.2.x deployment. As consequence new agents must sync with at least 2 new anonymizers never used with 9.1.5 and existing agent will continue to sync only with existing anonymizers as represented on the following diagram: Anonymizers configuration after upgrade to 9.2.x Communication flows after upgrade to 9.2.x NOTE: For security reasons we recommend to keep no more than 2 of old Anons. For fallback purposes on existing anons, we recommend to configure 2 Anonymizers on existing agents configuration. To do this, (assuming as example you have 1 anon in China and 1 in Germany) you have to configure 2 sync sub-task inside of the “SYNC” action of your agents configuration. “SYNC” Action inside of agents configuration Configure the first sync sub-task for the first Anon (more far from your collector), with the “stop on success” flag enabled Configuration of the main anon Configure the second sync sub-task for the second Anon (near from your collector), with the “stop on success” flag disabled Configuration of the fallback anon Existing Agents Upgrade According to enhancements on security of 9.2.x platform, existing agents are allowed to send evidences to RCS 9.2.x installations but could not be upgraded to 9.2.x. This means that any Scout agent must be upgraded to Elite before the upgrade. To do this follow the following task list: Verify if any backdoor have to be upgraded from Scout to Elite; Check for valid targets; Upgrade this agents to Elite before 9.2 upgrade; Wait until every existing agent perform a synchronization to the server and becomes Elite. NOTE: No further changes will be possible to pre-9.2 agents/anons after upgrade to 9.2. Agents deployed before the upgrade will sync only to anons used before the upgrade and pre-9.2 backdoors will not be upgradable after 9.2 upgrade 2.3 Upgrade Procedure 1. Check that Windows Firewall is running on on all your servers (Master Node, Collectors, Shards); 2. Check windows updates to the last update available on all your servers (Master Node, Collectors, Shards); 3. Upgrade Master Node, Shards and Collectors as usual to 9.2.0 using the new license file; 4. Check that the Master Node folder C:\RCS\DB\cores is empty and no zipfile is there; 5. Check in RCS Console / Monitor that following Versions are reported: Core Version Console Android BlackBerry Linux iOS OSX Symbian Windows WinMo WinPhone 2014022401 2014022401 2013103101 2014022401 2014012001 2014022401 2013103101 2014022401 2012092801 2014022401 6. For each anonymizer already configured in the system, follow the steps in 2.4 Anonymizer uninstallation 7. If the anonymizer can be removed from the system (no agent synchronizes on it), delete it; 8. If hostnames are used instead of IP addresses for anonymizers configuration, drop the existing domains and use new ones; 9. Create the entities for the new anonymizers to be added (check that they're from different providers); 10. Create the chain; 11. Click on Apply configuration (this time the procedure will fail); 12. For each anonymizer in the system, follow the steps in 2.4 Anonymizer uninstallation; 13. Check that everything is working flawlessly; 14. Upgrade to the last 9.2.x on both all your servers (Master Node, Collectos, Shards); 15. For each anonymizer in the system, follow the steps in 2.6 Anonymizer security checks; 16. Follow the steps in 0 17. Collector security checks; 18. Follow the steps in 2.8 Master Node security checks; 19. Create a new agent, infect a test target and check that the synchronization occurs flawlessly; 20. Remember that all the new agents should have the main synchronization action on the first anon, and the fallback on the second as described in 2.2 Must know about 9.2.x; 2.4 Anonymizer uninstallation NOTE: DO NOT DELETE THE ANONYMIZER FROM THE CONSOLE 1. Login via ssh to the vps 2. Execute: /etc/init.d/rcsanon stop 3. Execute: /etc/init.d/bbproxy stop 4. Execute: chkconfig --del rcsanon 5. Execute: chkconfig --del bbproxy 6. Execute: rm -rf /opt/bbproxy /opt/rcsanon /etc/init.d/bbproxy /etc/init.d/rcsanon 2.5 Anonymizer installation NOTE: THE INSTALLATION PACKAGE IS SPECIFIC FOR EACH ANONYMIZER, DO NOT REUSE IT 1. Login to the console; 2. Go to System / Frontend; 3. Select the anonymizer; 4. Click on Download Installer (different for each anonymizer); 5. Copy via scp/sftp the anon_install.zip to the vps; 6. Login via ssh to the vps; 7. Execute: Unzip anon_install.zip 8. If you want to monitor the anonymizer, execute: sh install <public ip of network controller> 9. If you don’t want to monitor the anonymizer, execute: sh install none 10. Reboot the vps. 2.6 Anonymizer security checks 1. Login via ssh to the vps 2. Change password if not strong (min. 8 char, 1 symbol, 1 number, mixed case letters) with the command passwd 3. Check that bbproxy is running executing: ps axu | grep bbproxy 4. Check firewall rules executing: iptables -L 5. Connect from an external machine to vps IP on port 80 (http) with a browser, it must report an error (connection reset - no data); 6. Connect from an external machine to vps IP on port 443 (https) with a browser, it must report an error (connection failed - timeout); 7. If you specified the network controller IP during the installation, check the monitor status in the console; NOTE: be used Firefox Browser error messages are self-explaining and could be much more comfortable to 2.7 Collector security checks 1. Check that boarder firewall (network device) rules allow only incoming connections on port 80 from IP addresses of anonymizers in the chain, DROP EVERYTHING ELSE; 2. Scan Collector public IP with nmap for TCP/UDP, expect no reply (ports: 135/tcp, 442/tcp, 443/tcp, 444/tcp, 445/tcp, 1947/tcp, 49154/tcp must report as "filtered"); 3. Connect from an external machine (from the Internet) to Collector on port 80 (http) with a browser, it must report an error (connection failed - timeout); 4. Connect from an external machine (from the Internet) to Collector on port 443 (https) with a browser, it must report an error (connection failed - timeout); 5. Check that there are no other public services (webservers, databases, remote desktops, etc...) in the same network block. 2.8 Master Node security checks 1. Check that all the application users (or at least ADMIN, SYSADMIN and TECH users) have a strong password; 2. Check log files (C:\RCS\DB\logs\err\*) for 'controller' and 'console' suspicious entries. 3 Appendix RCS Technical Requirements v.2.3.1 Adobe Acrobat Document
© Copyright 2026 Paperzz