<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Security holes? in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/security-holes/m-p/2925788#M110586</link>
    <description>Hi Tim,&lt;BR /&gt;&lt;BR /&gt;For starters, some of these vunerabilities can be removed by simply dening the service from inetd.&lt;BR /&gt;&lt;BR /&gt;vi /etc/inetd.conf&lt;BR /&gt;Place a comment in from of these services:&lt;BR /&gt;#bootps      dgram  udp wait   root /usr/lbin/bootpd   bootpd&lt;BR /&gt;#finger      stream tcp nowait bin  /usr/lbin/fingerd  fingerd&lt;BR /&gt;&lt;BR /&gt;#uucp        stream tcp nowait root /usr/sbin/uucpd    uucpd&lt;BR /&gt;#ntalk       dgram  udp wait   root /usr/lbin/ntalkd   ntalkd&lt;BR /&gt;&lt;BR /&gt;#daytime      stream tcp nowait root internal&lt;BR /&gt;#daytime      dgram  udp nowait root internal&lt;BR /&gt;#time         stream tcp nowait root internal&lt;BR /&gt;#time         dgram  udp nowait root internal&lt;BR /&gt;#echo         stream tcp nowait root internal&lt;BR /&gt;#echo         dgram  udp nowait root internal&lt;BR /&gt;#discard      stream tcp nowait root internal&lt;BR /&gt;#discard      dgram  udp nowait root internal&lt;BR /&gt;#chargen      stream tcp nowait root internal&lt;BR /&gt;#chargen      dgram  udp nowait root internal&lt;BR /&gt;&lt;BR /&gt;You could also comment out things like shell (remote remsh) and exec (rexecd) if they are not used.&lt;BR /&gt;Once the inetd file has been changed, you need to resubmit it.&lt;BR /&gt;# inetd -c&lt;BR /&gt;&lt;BR /&gt;Cheers&lt;BR /&gt;Michael</description>
    <pubDate>Thu, 13 Mar 2003 00:34:07 GMT</pubDate>
    <dc:creator>Michael Tully</dc:creator>
    <dc:date>2003-03-13T00:34:07Z</dc:date>
    <item>
      <title>Security holes?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-holes/m-p/2925787#M110585</link>
      <description>We were recently audited and one of the things they did was run a series of scripts on the network to expose weaknesses in our Unix security.&lt;BR /&gt;&lt;BR /&gt;All of our Unix servers are behind a firewall and accessed by internal customers only, so I haven't been overly concerned about locking things down.&lt;BR /&gt;&lt;BR /&gt;They identified the following ports as being vulnerable.  I don't even know what half of this stuff is or if I need it??  The Unix servers are used to run Oracle databases only.  There are no other applications on them.&lt;BR /&gt;&lt;BR /&gt;Pardon my networking ignormance, but is there a way to determine which of these are really in use and need to stay?&lt;BR /&gt;&lt;BR /&gt;Thanks, Tim&lt;BR /&gt;&lt;BR /&gt;echo (7/tcp) (Security warnings found) &lt;BR /&gt;discard (9/tcp) &lt;BR /&gt;daytime (13/tcp) (Security warnings found) &lt;BR /&gt;chargen (19/tcp) (Security warnings found) &lt;BR /&gt;ftp (21/tcp) (Security hole found) &lt;BR /&gt;telnet (23/tcp) (Security warnings found) &lt;BR /&gt;smtp (25/tcp) (Security hole found) &lt;BR /&gt;time (37/tcp) (Security notes found) &lt;BR /&gt;sunrpc (111/tcp) (Security notes found) &lt;BR /&gt;auth (113/tcp) (Security warnings found) &lt;BR /&gt;epmap (135/tcp) (Security warnings found) &lt;BR /&gt;hp-managed-node (382/tcp) &lt;BR /&gt;exec (512/tcp) (Security warnings found) &lt;BR /&gt;login (513/tcp) &lt;BR /&gt;shell (514/tcp) (Security warnings found) &lt;BR /&gt;printer (515/tcp) (Security notes found) &lt;BR /&gt;klogin (543/tcp) &lt;BR /&gt;kshell (544/tcp) &lt;BR /&gt;unknown (901/tcp) (Security notes found) &lt;BR /&gt;telnets (992/tcp) (Security notes found) &lt;BR /&gt;general/tcp (Security notes found) &lt;BR /&gt;unknown (49157/tcp) (Security hole found) &lt;BR /&gt;unknown (49153/udp) (Security hole found) &lt;BR /&gt;nfs (2049/tcp) (Security hole found) &lt;BR /&gt;sunrpc (111/udp) (Security notes found) &lt;BR /&gt;unknown (49152/tcp) (Security notes found) &lt;BR /&gt;unknown (49153/tcp) (Security notes found) &lt;BR /&gt;unknown (49156/udp) (Security notes found) &lt;BR /&gt;unknown (49154/tcp) (Security notes found) &lt;BR /&gt;unknown (49157/udp) (Security notes found) &lt;BR /&gt;unknown (49155/tcp) (Security notes found) &lt;BR /&gt;unknown (49158/udp) (Security warnings found) &lt;BR /&gt;lockd (4045/udp) (Security warnings found) &lt;BR /&gt;lockd (4045/tcp) (Security notes found) &lt;BR /&gt;unknown (49156/tcp) (Security notes found) &lt;BR /&gt;unknown (49167/udp) (Security hole found) &lt;BR /&gt;unknown (49729/udp) (Security notes found) &lt;BR /&gt;unknown (49272/tcp) (Security notes found) &lt;BR /&gt;nfsd (2049/udp) (Security hole found) &lt;BR /&gt;dtspc (6112/tcp) (Security hole found) &lt;BR /&gt;snmp (161/udp) (Security hole found) &lt;BR /&gt;xdmcp (177/udp) (Security warnings found) &lt;BR /&gt;unknown (32789/udp) (Security hole found) &lt;BR /&gt;epmap (135/udp) (Security notes found) &lt;BR /&gt;unknown (49190/udp) (Security notes found) &lt;BR /&gt;unknown (49159/tcp) (Security notes found) &lt;BR /&gt;unknown (49790/udp) (Security notes found) &lt;BR /&gt;unknown (49317/tcp) (Security notes found) &lt;BR /&gt;unknown (49793/udp) (Security notes found) &lt;BR /&gt;unknown (49319/tcp) (Security notes found) &lt;BR /&gt;echo (7/udp) (Security warnings found) &lt;BR /&gt;daytime (13/udp) (Security warnings found) &lt;BR /&gt;</description>
      <pubDate>Wed, 12 Mar 2003 23:50:58 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-holes/m-p/2925787#M110585</guid>
      <dc:creator>Tim Medford</dc:creator>
      <dc:date>2003-03-12T23:50:58Z</dc:date>
    </item>
    <item>
      <title>Re: Security holes?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-holes/m-p/2925788#M110586</link>
      <description>Hi Tim,&lt;BR /&gt;&lt;BR /&gt;For starters, some of these vunerabilities can be removed by simply dening the service from inetd.&lt;BR /&gt;&lt;BR /&gt;vi /etc/inetd.conf&lt;BR /&gt;Place a comment in from of these services:&lt;BR /&gt;#bootps      dgram  udp wait   root /usr/lbin/bootpd   bootpd&lt;BR /&gt;#finger      stream tcp nowait bin  /usr/lbin/fingerd  fingerd&lt;BR /&gt;&lt;BR /&gt;#uucp        stream tcp nowait root /usr/sbin/uucpd    uucpd&lt;BR /&gt;#ntalk       dgram  udp wait   root /usr/lbin/ntalkd   ntalkd&lt;BR /&gt;&lt;BR /&gt;#daytime      stream tcp nowait root internal&lt;BR /&gt;#daytime      dgram  udp nowait root internal&lt;BR /&gt;#time         stream tcp nowait root internal&lt;BR /&gt;#time         dgram  udp nowait root internal&lt;BR /&gt;#echo         stream tcp nowait root internal&lt;BR /&gt;#echo         dgram  udp nowait root internal&lt;BR /&gt;#discard      stream tcp nowait root internal&lt;BR /&gt;#discard      dgram  udp nowait root internal&lt;BR /&gt;#chargen      stream tcp nowait root internal&lt;BR /&gt;#chargen      dgram  udp nowait root internal&lt;BR /&gt;&lt;BR /&gt;You could also comment out things like shell (remote remsh) and exec (rexecd) if they are not used.&lt;BR /&gt;Once the inetd file has been changed, you need to resubmit it.&lt;BR /&gt;# inetd -c&lt;BR /&gt;&lt;BR /&gt;Cheers&lt;BR /&gt;Michael</description>
      <pubDate>Thu, 13 Mar 2003 00:34:07 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-holes/m-p/2925788#M110586</guid>
      <dc:creator>Michael Tully</dc:creator>
      <dc:date>2003-03-13T00:34:07Z</dc:date>
    </item>
    <item>
      <title>Re: Security holes?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-holes/m-p/2925789#M110587</link>
      <description>Tim,&lt;BR /&gt;&lt;BR /&gt;Here is a good discussion on a similar item.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://forums.itrc.hp.com/cm/QuestionAnswer/1,,0xb7aae7613948d5118fef0090279cd0f9,00.html" target="_blank"&gt;http://forums.itrc.hp.com/cm/QuestionAnswer/1,,0xb7aae7613948d5118fef0090279cd0f9,00.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Cheers&lt;BR /&gt;Michael</description>
      <pubDate>Thu, 13 Mar 2003 00:40:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-holes/m-p/2925789#M110587</guid>
      <dc:creator>Michael Tully</dc:creator>
      <dc:date>2003-03-13T00:40:15Z</dc:date>
    </item>
    <item>
      <title>Re: Security holes?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-holes/m-p/2925790#M110588</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;If you aren't sure what process is using some of those higher numbered ports [49152..], you can use lsof to see which processes have them open.  You can get a copy of lsof from here:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="ftp://vic.cc.purdue.edu/pub/tools/unix/lsof/" target="_blank"&gt;ftp://vic.cc.purdue.edu/pub/tools/unix/lsof/&lt;/A&gt; &lt;BR /&gt;&lt;BR /&gt;As for the rest of them, you have to balance your security needs against your functionality.  For example, it might be a problem to have the port open for telnet, but if you need telnet you have to use it.  Michael gave a good list of some ports that really aren't used and can be disabled.&lt;BR /&gt;&lt;BR /&gt;JP&lt;BR /&gt;</description>
      <pubDate>Thu, 13 Mar 2003 00:43:54 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-holes/m-p/2925790#M110588</guid>
      <dc:creator>John Poff</dc:creator>
      <dc:date>2003-03-13T00:43:54Z</dc:date>
    </item>
  </channel>
</rss>

