<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: security in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/3097296#M146145</link>
    <description>My standard pitch on security for hp-ux&lt;BR /&gt;&lt;BR /&gt;Here is how we keep up on these security issues. &lt;BR /&gt;&lt;BR /&gt;Fist we subscribe to itrc security bulletins, which you apparently already do. &lt;BR /&gt;&lt;BR /&gt;Next we use the following tools to harden security on our system and notify us of security patches. &lt;BR /&gt;&lt;BR /&gt;Bastille Security hardening &lt;BR /&gt;&lt;A href="http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=B6849AA" target="_blank"&gt;http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=B6849AA&lt;/A&gt; &lt;BR /&gt;&lt;BR /&gt;Perl which the above needs. &lt;BR /&gt;&lt;A href="http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=PERL" target="_blank"&gt;http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=PERL&lt;/A&gt; &lt;BR /&gt;&lt;BR /&gt;Security Patch Check &lt;BR /&gt;&lt;A href="http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=B6834AA" target="_blank"&gt;http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=B6834AA&lt;/A&gt; &lt;BR /&gt;&lt;BR /&gt;TCP Wrappers &lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=TCPWRAP" target="_blank"&gt;http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=TCPWRAP&lt;/A&gt; &lt;BR /&gt;&lt;BR /&gt;IDS/9000 (Intrusion Detection Sytstem) &lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=J5083AA" target="_blank"&gt;http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=J5083AA&lt;/A&gt; &lt;BR /&gt;&lt;BR /&gt;Get all these products working you'll be quite secure.&lt;BR /&gt;&lt;BR /&gt;Secure shell&lt;BR /&gt;&lt;A href="http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=T1471AA" target="_blank"&gt;http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=T1471AA&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;SEP</description>
    <pubDate>Mon, 20 Oct 2003 08:57:13 GMT</pubDate>
    <dc:creator>Steven E. Protter</dc:creator>
    <dc:date>2003-10-20T08:57:13Z</dc:date>
    <item>
      <title>security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/3097292#M146141</link>
      <description>Could someone suggest some tools/places I &lt;BR /&gt;can go to to get security tools that I can&lt;BR /&gt;use to monitor who is doing what as root&lt;BR /&gt;on a server. Just looking at roots history&lt;BR /&gt;file is not enough. I could install TCPwrappers&lt;BR /&gt;that I believe has some logging. I have tripwire and cops installed but none of these&lt;BR /&gt;really tell who or what. I use to use logshell&lt;BR /&gt;at another company and was wondering if something similar exists. /.rhosts has to go also. I need to know who/what is using it.&lt;BR /&gt;</description>
      <pubDate>Mon, 20 Oct 2003 08:28:19 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/3097292#M146141</guid>
      <dc:creator>jerry1</dc:creator>
      <dc:date>2003-10-20T08:28:19Z</dc:date>
    </item>
    <item>
      <title>Re: security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/3097293#M146142</link>
      <description>I worked in a bank for a while, where use used UPM:&lt;BR /&gt;&lt;A href="http://www.passgo.com/datasheets/upm.pdf" target="_blank"&gt;http://www.passgo.com/datasheets/upm.pdf&lt;/A&gt;&lt;BR /&gt;Does what you want and loads more.&lt;BR /&gt;-- Graham</description>
      <pubDate>Mon, 20 Oct 2003 08:36:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/3097293#M146142</guid>
      <dc:creator>Graham Cameron_1</dc:creator>
      <dc:date>2003-10-20T08:36:42Z</dc:date>
    </item>
    <item>
      <title>Re: security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/3097294#M146143</link>
      <description>&lt;BR /&gt;The best solution is to change the password to root and remove any files that can be executed up to root, then have people submit their requests to you for root command executions. &lt;BR /&gt;&lt;BR /&gt;Let's say you allow someone to have root priv's and they go into vi or simply "more" a file and then bang (!) out and start another shell or simply execute a command, which won't be logged.&lt;BR /&gt;&lt;BR /&gt;live free or die&lt;BR /&gt;harry</description>
      <pubDate>Mon, 20 Oct 2003 08:38:31 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/3097294#M146143</guid>
      <dc:creator>harry d brown jr</dc:creator>
      <dc:date>2003-10-20T08:38:31Z</dc:date>
    </item>
    <item>
      <title>Re: security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/3097295#M146144</link>
      <description>You can convert to a trusted system and then enable auditing for the root user. This will track just about any move made by root. Just make sure you have plenty of disk space for the logs. Use sam to do both of these.&lt;BR /&gt;&lt;BR /&gt;HTH.</description>
      <pubDate>Mon, 20 Oct 2003 08:53:59 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/3097295#M146144</guid>
      <dc:creator>Brian Bergstrand</dc:creator>
      <dc:date>2003-10-20T08:53:59Z</dc:date>
    </item>
    <item>
      <title>Re: security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/3097296#M146145</link>
      <description>My standard pitch on security for hp-ux&lt;BR /&gt;&lt;BR /&gt;Here is how we keep up on these security issues. &lt;BR /&gt;&lt;BR /&gt;Fist we subscribe to itrc security bulletins, which you apparently already do. &lt;BR /&gt;&lt;BR /&gt;Next we use the following tools to harden security on our system and notify us of security patches. &lt;BR /&gt;&lt;BR /&gt;Bastille Security hardening &lt;BR /&gt;&lt;A href="http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=B6849AA" target="_blank"&gt;http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=B6849AA&lt;/A&gt; &lt;BR /&gt;&lt;BR /&gt;Perl which the above needs. &lt;BR /&gt;&lt;A href="http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=PERL" target="_blank"&gt;http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=PERL&lt;/A&gt; &lt;BR /&gt;&lt;BR /&gt;Security Patch Check &lt;BR /&gt;&lt;A href="http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=B6834AA" target="_blank"&gt;http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=B6834AA&lt;/A&gt; &lt;BR /&gt;&lt;BR /&gt;TCP Wrappers &lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=TCPWRAP" target="_blank"&gt;http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=TCPWRAP&lt;/A&gt; &lt;BR /&gt;&lt;BR /&gt;IDS/9000 (Intrusion Detection Sytstem) &lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=J5083AA" target="_blank"&gt;http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=J5083AA&lt;/A&gt; &lt;BR /&gt;&lt;BR /&gt;Get all these products working you'll be quite secure.&lt;BR /&gt;&lt;BR /&gt;Secure shell&lt;BR /&gt;&lt;A href="http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=T1471AA" target="_blank"&gt;http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=T1471AA&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Mon, 20 Oct 2003 08:57:13 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/3097296#M146145</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2003-10-20T08:57:13Z</dc:date>
    </item>
    <item>
      <title>Re: security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/3097297#M146146</link>
      <description>with slight modification of what Harry defined&lt;BR /&gt;as "ask other users to submit what they would like to run with root to yourself" aka being a lazy sysadmin once :) - use sudo. Define what people do what.Consequently restrict root logins to console only,</description>
      <pubDate>Mon, 20 Oct 2003 09:46:51 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/3097297#M146146</guid>
      <dc:creator>Zeev Schultz</dc:creator>
      <dc:date>2003-10-20T09:46:51Z</dc:date>
    </item>
    <item>
      <title>Re: security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/3097298#M146147</link>
      <description>Agree with the all above.&lt;BR /&gt;&lt;BR /&gt;If you need info now.&lt;BR /&gt;/usr/sam/bin/samlog_viewer might help.&lt;BR /&gt;&lt;BR /&gt;If root is using a history file&lt;BR /&gt;strings .history might help.&lt;BR /&gt;&lt;BR /&gt;If users are loging in as root you can find who they are and make them stop. (I think everyone should use sudo)  &lt;BR /&gt; who -a /etc/wtmp |grep root&lt;BR /&gt;root       pts/tb       Oct 21 17:05   .     7731  bozo.thecompany.com&lt;BR /&gt;root       pts/tb       Oct 21 17:05   .     7731  id=  tb term=0   exit=0  &lt;BR /&gt;root       pts/tb       Oct 21 17:05   .     7731  id=  tb term=0   exit=0  &lt;BR /&gt;root       pts/tb       Oct 21 17:06   .     7818  bozo.thecompany.com&lt;BR /&gt;root       pts/tb       Oct 21 17:06   .     7818  id=  tb term=0   exit=0  &lt;BR /&gt;root       pts/tb       Oct 21 17:06   .     7818  id=  tb term=0   exit=0  &lt;BR /&gt;&lt;BR /&gt;if users are using su to become root&lt;BR /&gt;you can get times and term id and who from /var/adm/sulog&lt;BR /&gt;&lt;BR /&gt;If you have accounting you can use&lt;BR /&gt;/usr/sbin/acctcom to find commands executed&lt;BR /&gt;and from what terminal&lt;BR /&gt;if you have multiple acctoing files &lt;BR /&gt;pacct pacct1 pacct2 etc you need&lt;BR /&gt;to run &lt;BR /&gt;acctcom pacct?   corresponding to your time period.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Rory</description>
      <pubDate>Tue, 21 Oct 2003 17:13:20 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/3097298#M146147</guid>
      <dc:creator>Rory R Hammond</dc:creator>
      <dc:date>2003-10-21T17:13:20Z</dc:date>
    </item>
  </channel>
</rss>

