<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Host Names and Security in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/host-names-and-security/m-p/2421371#M596859</link>
    <description>If your network is Completely Closed, then names are irrelavent.  In todays inter/intranet hostnames, IP's, and more information than you can imagine floats out of boxes via web pages and simple network traffic.&lt;BR /&gt;Especially in a MS box!  You should see all the nice broadcast information NT sends out one day!  "Sniff your own network for a week!"&lt;BR /&gt;&lt;BR /&gt;Anyway, I agree that a host called "hammer" is much harder to guess the purpose.  Remember that names should not contain Underscores, commas, etc..but hyphens are Okay.&lt;BR /&gt;&lt;BR /&gt;Another thing that helps protect too is not to use standard IP's for hosts.  It is very common for a router to have a .1 or .254 for the IP, Mail server or DNS server to have .2, DNS or mail server to have .3.  If you fall into this category, then your just as vulverable as naming your hosts "mainserv", or "fileserv". :)&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Shannon</description>
    <pubDate>Mon, 12 Feb 2001 18:05:57 GMT</pubDate>
    <dc:creator>Shannon Petry</dc:creator>
    <dc:date>2001-02-12T18:05:57Z</dc:date>
    <item>
      <title>Host Names and Security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/host-names-and-security/m-p/2421368#M596856</link>
      <description>Within my IT department, we are currently debating whether host names have any &lt;BR /&gt;impact on security.  Position 1 says "Host names should neither indicate that &lt;BR /&gt;the host is a server (as in 'srv_main') nor its function (as in 'EXCHANGE').  &lt;BR /&gt;Position 2 says, "We have a firewall and good passwords, the server names are &lt;BR /&gt;irrelevant."&lt;BR /&gt;&lt;BR /&gt;How do other sites handle this?</description>
      <pubDate>Wed, 12 Apr 2000 08:52:01 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/host-names-and-security/m-p/2421368#M596856</guid>
      <dc:creator>Leo Sopicki_1</dc:creator>
      <dc:date>2000-04-12T08:52:01Z</dc:date>
    </item>
    <item>
      <title>Re: Host Names and Security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/host-names-and-security/m-p/2421369#M596857</link>
      <description>A hacker can easily identify a hostname "SRV-HPOV" is running OpenView and it &lt;BR /&gt;contains RW community string for all your critical routers. This server will &lt;BR /&gt;become the target of attack. But if you name your openview server as something &lt;BR /&gt;like "hammer", it's gonna be harder to guess the purpose of this machine. You &lt;BR /&gt;got it?</description>
      <pubDate>Wed, 12 Apr 2000 10:07:21 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/host-names-and-security/m-p/2421369#M596857</guid>
      <dc:creator>Jay Song_3</dc:creator>
      <dc:date>2000-04-12T10:07:21Z</dc:date>
    </item>
    <item>
      <title>Re: Host Names and Security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/host-names-and-security/m-p/2421370#M596858</link>
      <description>In Scientific American last year there was a hyperthetical case study of a hacker attack on a supposedly "secure" business.  This case study was based on the authors experience of a number of hack attacks.  It is worth reading.&lt;BR /&gt;&lt;BR /&gt;The conclusion is - never assume that you have a secure network.  Always assume that there is someone who is dedicated to hacking your network.&lt;BR /&gt;&lt;BR /&gt;I would choose non-descriptive names.&lt;BR /&gt;John</description>
      <pubDate>Thu, 11 May 2000 06:54:41 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/host-names-and-security/m-p/2421370#M596858</guid>
      <dc:creator>John_Hancock</dc:creator>
      <dc:date>2000-05-11T06:54:41Z</dc:date>
    </item>
    <item>
      <title>Re: Host Names and Security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/host-names-and-security/m-p/2421371#M596859</link>
      <description>If your network is Completely Closed, then names are irrelavent.  In todays inter/intranet hostnames, IP's, and more information than you can imagine floats out of boxes via web pages and simple network traffic.&lt;BR /&gt;Especially in a MS box!  You should see all the nice broadcast information NT sends out one day!  "Sniff your own network for a week!"&lt;BR /&gt;&lt;BR /&gt;Anyway, I agree that a host called "hammer" is much harder to guess the purpose.  Remember that names should not contain Underscores, commas, etc..but hyphens are Okay.&lt;BR /&gt;&lt;BR /&gt;Another thing that helps protect too is not to use standard IP's for hosts.  It is very common for a router to have a .1 or .254 for the IP, Mail server or DNS server to have .2, DNS or mail server to have .3.  If you fall into this category, then your just as vulverable as naming your hosts "mainserv", or "fileserv". :)&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Shannon</description>
      <pubDate>Mon, 12 Feb 2001 18:05:57 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/host-names-and-security/m-p/2421371#M596859</guid>
      <dc:creator>Shannon Petry</dc:creator>
      <dc:date>2001-02-12T18:05:57Z</dc:date>
    </item>
    <item>
      <title>Re: Host Names and Security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/host-names-and-security/m-p/2421372#M596860</link>
      <description>If your network is Completely Closed, then names are irrelavent.  In todays inter/intranet hostnames, IP's, and more information than you can imagine floats out of boxes via web pages and simple network traffic.&lt;BR /&gt;Especially in a MS box!  You should see all the nice broadcast information NT sends out one day!  "Sniff your own network for a week!"&lt;BR /&gt;&lt;BR /&gt;Anyway, I agree that a host called "hammer" is much harder to guess the purpose.  Remember that names should not contain Underscores, commas, etc..but hyphens are Okay.&lt;BR /&gt;&lt;BR /&gt;Another thing that helps protect too is not to use standard IP's for hosts.  It is very common for a router to have a .1 or .254 for the IP, Mail server or DNS server to have .2, DNS or mail server to have .3.  If you fall into this category, then your just as vulverable as naming your hosts "mainserv", or "fileserv". :)&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Shannon</description>
      <pubDate>Mon, 12 Feb 2001 18:05:58 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/host-names-and-security/m-p/2421372#M596860</guid>
      <dc:creator>Shannon Petry</dc:creator>
      <dc:date>2001-02-12T18:05:58Z</dc:date>
    </item>
    <item>
      <title>Re: Host Names and Security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/host-names-and-security/m-p/2421373#M596861</link>
      <description>In the past I have seen shops that have used names of fish, birds, Flinstone characters, etc.  These days it seems that many shops have moved more toward a naming convention that is related to the function and location of the server.  I must say that it's certainly easier recognize say 'DC-DNS1' than say 'robin' when you are staring at your pager at 2am.  Firewalls have reduced the need for unassociated names; anyone who does not have a firewall is begging for trouble and an odd naming convention will be of little help.  The fact of the matter is that a hacker can get a good idea of what a machine is all about by seeing what ports will open.</description>
      <pubDate>Tue, 13 Feb 2001 05:34:28 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/host-names-and-security/m-p/2421373#M596861</guid>
      <dc:creator>Tim Malnati</dc:creator>
      <dc:date>2001-02-13T05:34:28Z</dc:date>
    </item>
    <item>
      <title>Re: Host Names and Security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/host-names-and-security/m-p/2421374#M596862</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;From my firewall logs, I can tell you that portscans are not selective on whether your hostname is indicative of the functionality of your server, for efficiency reasons. Portscans or individual probes can be broken up into two major categories:&lt;BR /&gt;&lt;BR /&gt;1) dns-based portscans&lt;BR /&gt;&lt;BR /&gt;If your hostname is registered in the DNS, then you are vulnerable to such attacks. Your hostname does not matter.&lt;BR /&gt;&lt;BR /&gt;2) brute-force portscans&lt;BR /&gt;&lt;BR /&gt;It does not matter whether or not your hostname is registered in the DNS, every single IP right from the network address to the broadcast address is scanned. Your hostname does not matter.&lt;BR /&gt;&lt;BR /&gt;Internally, I do not rely on the DNS, for fear that the DNS gets compromised. I use /etc/hosts for my ring of trusted hosts to communicate with one another.&lt;BR /&gt;&lt;BR /&gt;Hope this helps. Regards.&lt;BR /&gt;&lt;BR /&gt;Steven Sim Kok Leong&lt;BR /&gt;Brainbench MVP for Unix Admin&lt;BR /&gt;&lt;A href="http://www.brainbench.com" target="_blank"&gt;http://www.brainbench.com&lt;/A&gt;</description>
      <pubDate>Tue, 13 Feb 2001 07:46:17 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/host-names-and-security/m-p/2421374#M596862</guid>
      <dc:creator>Steven Sim Kok Leong</dc:creator>
      <dc:date>2001-02-13T07:46:17Z</dc:date>
    </item>
  </channel>
</rss>

