- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- system log files permission
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Discussions
Discussions
Forums
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО05-29-2002 05:52 AM
тАО05-29-2002 05:52 AM
system log files permission
I am writing a security set up doc...and thinking if I should disenable "other" group to read system log files, such as
/etc/rc.log
/etc/shutdownlog
/var/adm/syslog/syslog.log
/var/adm/btmp
/etc/utmp
/var/adm/wtmp
....
Fromm the security's perspective, hackers can get much useful info from those log files.
Give me your ideas? If this action is made, will it affect the system or user's activities?
Tx, Crystal
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО05-29-2002 05:57 AM
тАО05-29-2002 05:57 AM
Re: system log files permission
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО05-29-2002 06:03 AM
тАО05-29-2002 06:03 AM
Re: system log files permission
Logs like /etc/utmp are used by commands like 'who', so be careful there. I suppose you could remove the read privilege from the others without great loss.
If you are really serious about tightening the security of your server, start by looking at this classic document:
http://www.kbeta.com/SecurityTips/Checklists/HPUX_11_Bastion_Guide.htm
Regards!
...JRF...
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО05-29-2002 06:04 AM
тАО05-29-2002 06:04 AM
Re: system log files permission
You should not modify the default rights and setting of these files , if a hacker can access /etc and /var then there is more damage he can do to the system . It is better to use the standard tools of security , the latest one was posted in the link below .
http://forums.itrc.hp.com/cm/QuestionAnswer/1,,0xc2d291ccb36bd611abdb0090277a778c,00.html
Manoj Srivastava
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО05-29-2002 05:45 PM
тАО05-29-2002 05:45 PM
Re: system log files permission
I suggest that you do not modify the default permissions.
Refer also to Center for Information Security (CIS) security benchmark for HP-UX 10.20, 11.00 and 11i. Included is a set of rules to achieve level 1 security benchmark:
http://www.cisecurity.org/bench_HPUX.html
There is also a scoring tool which provides a "quick and easy way to evaluate your HP-UX system and compare their level of security against the CIS minimum due care security Benchmark. Tool reports guide system administrators to harden both new installations and active production systems. The tool is also effective for monitoring systems to assure that security settings continuously conform with the Benchmark."
Hope this helps. Regards.
Steven Sim Kok Leong