<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Is The Server Secured? in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/is-the-server-secured/m-p/3410064#M202437</link>
    <description>I would add:&lt;BR /&gt;Give a try to &lt;A href="http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=J5083AA" target="_blank"&gt;http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=J5083AA&lt;/A&gt;&lt;BR /&gt;If you are under HPUX11i&lt;BR /&gt;&lt;BR /&gt;If you can filter ping...&lt;BR /&gt;Use ssh but dont allow root to use it, this means of course be sure installed and configured sudo &lt;BR /&gt;&lt;BR /&gt;All the best&lt;BR /&gt;Victor</description>
    <pubDate>Thu, 28 Oct 2004 11:14:46 GMT</pubDate>
    <dc:creator>Victor BERRIDGE</dc:creator>
    <dc:date>2004-10-28T11:14:46Z</dc:date>
    <item>
      <title>Is The Server Secured?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/is-the-server-secured/m-p/3410060#M202433</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;I recently put a server with Oracle Db behind a FW.   NAT is used for LAN users to get services from the server, while its ip is in different subnet with LAN.   Ports opened are only limited to ftp, telnet, oracle, ping.&lt;BR /&gt;&lt;BR /&gt;I am still challenged by some top gun with question of "can this server be seen while someone hack into LAN".&lt;BR /&gt;&lt;BR /&gt;I believed it is secured:&lt;BR /&gt;1) it uses different subnet and uses NAT&lt;BR /&gt;2) its services are limited and only those ports are open&lt;BR /&gt;3) user accounts are already there.&lt;BR /&gt;&lt;BR /&gt;I really want to hear all different views to help me sort things out.&lt;BR /&gt;&lt;BR /&gt;VERY Appreciated!&lt;BR /&gt;&lt;BR /&gt;Steven&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 28 Oct 2004 10:43:06 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/is-the-server-secured/m-p/3410060#M202433</guid>
      <dc:creator>Steven Chen_1</dc:creator>
      <dc:date>2004-10-28T10:43:06Z</dc:date>
    </item>
    <item>
      <title>Re: Is The Server Secured?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/is-the-server-secured/m-p/3410061#M202434</link>
      <description>One thing I would do is get rid of telnet &amp;amp; ftp - use the SSH suite instead. This will encrypt the login info, passwds, etc. There are multiple other services you can turn off as they are not needed for all tasks. &lt;BR /&gt;&lt;BR /&gt;Also look into getting the secure_patch_check. You can find numerous posts regarding this.&lt;BR /&gt;&lt;BR /&gt;Other things you might want to look at are bastion hosts, installing Bastille, etc.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 28 Oct 2004 10:48:20 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/is-the-server-secured/m-p/3410061#M202434</guid>
      <dc:creator>Rick Garland</dc:creator>
      <dc:date>2004-10-28T10:48:20Z</dc:date>
    </item>
    <item>
      <title>Re: Is The Server Secured?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/is-the-server-secured/m-p/3410062#M202435</link>
      <description>With putting it behind a firewall and having opened only the required ports is a lot that you have done.&lt;BR /&gt;&lt;BR /&gt;You further secure it in different ways.&lt;BR /&gt;&lt;BR /&gt;1. convert it to trusted mode.&lt;BR /&gt;2. secure it further by running baston ot and oding a study what further could be done&lt;BR /&gt;2. have password policies in place - such as password life, password life time etc. (this is very much possible system intrsuted mode.&lt;BR /&gt;3. you may also want to run SHC (system health check), CPM (custom patch manager)&lt;BR /&gt;3. Run the security audit for it.&lt;BR /&gt;&lt;BR /&gt;Anil</description>
      <pubDate>Thu, 28 Oct 2004 10:49:02 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/is-the-server-secured/m-p/3410062#M202435</guid>
      <dc:creator>RAC_1</dc:creator>
      <dc:date>2004-10-28T10:49:02Z</dc:date>
    </item>
    <item>
      <title>Re: Is The Server Secured?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/is-the-server-secured/m-p/3410063#M202436</link>
      <description>Are you running sendmail or other mail agent? Are you using the HP JetAdmin software to admin printers?  Those use well known tcp ports with well know exploits, and you'll want to consider disabling them.&lt;BR /&gt;&lt;BR /&gt;Also, are you all patched up to date with the OS?  There are a few other tcp-based exploits you'll want to protect yourself from with the current patches.&lt;BR /&gt;&lt;BR /&gt;Are you using any of the web services with Oracle; e.g., java and &amp;amp; web client?  You'll need to make sure you have all the current Oracle patches too.&lt;BR /&gt;&lt;BR /&gt;mark</description>
      <pubDate>Thu, 28 Oct 2004 11:03:56 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/is-the-server-secured/m-p/3410063#M202436</guid>
      <dc:creator>Mark Greene_1</dc:creator>
      <dc:date>2004-10-28T11:03:56Z</dc:date>
    </item>
    <item>
      <title>Re: Is The Server Secured?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/is-the-server-secured/m-p/3410064#M202437</link>
      <description>I would add:&lt;BR /&gt;Give a try to &lt;A href="http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=J5083AA" target="_blank"&gt;http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=J5083AA&lt;/A&gt;&lt;BR /&gt;If you are under HPUX11i&lt;BR /&gt;&lt;BR /&gt;If you can filter ping...&lt;BR /&gt;Use ssh but dont allow root to use it, this means of course be sure installed and configured sudo &lt;BR /&gt;&lt;BR /&gt;All the best&lt;BR /&gt;Victor</description>
      <pubDate>Thu, 28 Oct 2004 11:14:46 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/is-the-server-secured/m-p/3410064#M202437</guid>
      <dc:creator>Victor BERRIDGE</dc:creator>
      <dc:date>2004-10-28T11:14:46Z</dc:date>
    </item>
    <item>
      <title>Re: Is The Server Secured?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/is-the-server-secured/m-p/3410065#M202438</link>
      <description>If the server is on a network its never totally secure. Thats a fact we must live with.&lt;BR /&gt;&lt;BR /&gt;Reasons for vulnerabilities:&lt;BR /&gt;1) Defects in the daemons that you allow to run.&lt;BR /&gt;2) Oracle defects&lt;BR /&gt;3) OS flaws.&lt;BR /&gt;&lt;BR /&gt;However:&lt;BR /&gt;&lt;BR /&gt;You've made a good start and I recommend Bastille and Security Patch check.&lt;BR /&gt;&lt;BR /&gt;Here is a link:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://software.hp.com/portal/swdepot/displayProductInfo.do?productNumber=B6849AA" target="_blank"&gt;http://software.hp.com/portal/swdepot/displayProductInfo.do?productNumber=B6849AA&lt;/A&gt;&lt;BR /&gt;Required for BAstille:&lt;BR /&gt;&lt;A href="http://software.hp.com/portal/swdepot/displayProductInfo.do?productNumber=PERL" target="_blank"&gt;http://software.hp.com/portal/swdepot/displayProductInfo.do?productNumber=PERL&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;For the trully paranoid:&lt;BR /&gt;&lt;A href="http://software.hp.com/portal/swdepot/displayProductInfo.do?productNumber=J5083AA" target="_blank"&gt;http://software.hp.com/portal/swdepot/displayProductInfo.do?productNumber=J5083AA&lt;/A&gt;&lt;BR /&gt;Replace telent with secure shell/openssh&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://software.hp.com/portal/swdepot/displayProductInfo.do?productNumber=T1471AA" target="_blank"&gt;http://software.hp.com/portal/swdepot/displayProductInfo.do?productNumber=T1471AA&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://software.hp.com/portal/swdepot/displayProductInfo.do?productNumber=TCPWRAP" target="_blank"&gt;http://software.hp.com/portal/swdepot/displayProductInfo.do?productNumber=TCPWRAP&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;There are some good analysis tools in here:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://software.hp.com/portal/swdepot/displayProductInfo.do?productNumber=HPUXIEXP1111" target="_blank"&gt;http://software.hp.com/portal/swdepot/displayProductInfo.do?productNumber=HPUXIEXP1111&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;You can always do more.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Thu, 28 Oct 2004 11:31:01 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/is-the-server-secured/m-p/3410065#M202438</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2004-10-28T11:31:01Z</dc:date>
    </item>
    <item>
      <title>Re: Is The Server Secured?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/is-the-server-secured/m-p/3410066#M202439</link>
      <description>I appreciate all suggestions that help pointing to right directions.&lt;BR /&gt;&lt;BR /&gt;Yet I am still thinking what wouldb be the appropriate answer to the top gun's question: "can someone see the server (even when it is behind FW now)".  &lt;BR /&gt;&lt;BR /&gt;I forget the background explaination: the server is only connected to outside world with oracle sqlnet, and all ftp and telnet services are for LAN users only.   Of cource, VPN users is included.&lt;BR /&gt;&lt;BR /&gt;Then how to re-challenge back?   NAT hides server identity, then what else?&lt;BR /&gt;&lt;BR /&gt;Thanks</description>
      <pubDate>Thu, 28 Oct 2004 12:55:10 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/is-the-server-secured/m-p/3410066#M202439</guid>
      <dc:creator>Steven Chen_1</dc:creator>
      <dc:date>2004-10-28T12:55:10Z</dc:date>
    </item>
  </channel>
</rss>

