<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Hardening HPUX 11i and OS patches in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/hardening-hpux-11i-and-os-patches/m-p/4883079#M744512</link>
    <description>There really isn't anything dangerous in ../sw/save&lt;BR /&gt;&lt;BR /&gt;I would suggest:&lt;BR /&gt;&lt;BR /&gt;cleanup -c 1&lt;BR /&gt;&lt;BR /&gt;That will committ and clear out patches superseded once or more.&lt;BR /&gt;&lt;BR /&gt;Bastille, HIDS and good policy is how we handle it at my shop.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
    <pubDate>Tue, 01 Feb 2005 12:28:51 GMT</pubDate>
    <dc:creator>Steven E. Protter</dc:creator>
    <dc:date>2005-02-01T12:28:51Z</dc:date>
    <item>
      <title>Hardening HPUX 11i and OS patches</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hardening-hpux-11i-and-os-patches/m-p/4883072#M744505</link>
      <description>Hi,&lt;BR /&gt;One rule for hardening a HPUX 11i system is to change all files who meed the following user, group and rights:&lt;BR /&gt;- owner bin;&lt;BR /&gt;- World read access;&lt;BR /&gt;- No SETUID;&lt;BR /&gt;- No SETGID;&lt;BR /&gt;- No World write access;&lt;BR /&gt;- No GROUP write access;&lt;BR /&gt;- No symbolic links;&lt;BR /&gt;&lt;BR /&gt;find / ! -perm -4000 -a ! -perm -2000 -a ! -perm 0002 -a ! -perm -0020 -a -user bin -perm -0004 -a ! -type l -exec ls {} \;&lt;BR /&gt;&lt;BR /&gt;Change these files to:&lt;BR /&gt;- Owner root&lt;BR /&gt;&lt;BR /&gt;For so far al is oke.&lt;BR /&gt;&lt;BR /&gt;But when I install a HP PATCH this patch will change all rights back to the "wrong" one's.&lt;BR /&gt;Does any body have a "goodpractise" / rule how to handle this?&lt;BR /&gt;&lt;BR /&gt;1. Change after a PATCH installatie all files, including the ../sw/save/..?&lt;BR /&gt;&lt;BR /&gt;2. Change all file but exclude the "../sw/save/.." files?&lt;BR /&gt;&lt;BR /&gt;3. ??&lt;BR /&gt;&lt;BR /&gt;Rgrds CvB.</description>
      <pubDate>Mon, 31 Jan 2005 09:48:28 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hardening-hpux-11i-and-os-patches/m-p/4883072#M744505</guid>
      <dc:creator>Co van Berkel</dc:creator>
      <dc:date>2005-01-31T09:48:28Z</dc:date>
    </item>
    <item>
      <title>Re: Hardening HPUX 11i and OS patches</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hardening-hpux-11i-and-os-patches/m-p/4883073#M744506</link>
      <description>You need CFENGINE: &lt;A href="http://hpux.cs.utah.edu/hppd/hpux/Sysadmin/cfengine-2.1.13/" target="_blank"&gt;http://hpux.cs.utah.edu/hppd/hpux/Sysadmin/cfengine-2.1.13/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;It's a little complicated to get going, but once it's done, you're all set!&lt;BR /&gt;&lt;BR /&gt;live free or die&lt;BR /&gt;harry d brown jr</description>
      <pubDate>Mon, 31 Jan 2005 10:04:56 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hardening-hpux-11i-and-os-patches/m-p/4883073#M744506</guid>
      <dc:creator>harry d brown jr</dc:creator>
      <dc:date>2005-01-31T10:04:56Z</dc:date>
    </item>
    <item>
      <title>Re: Hardening HPUX 11i and OS patches</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hardening-hpux-11i-and-os-patches/m-p/4883074#M744507</link>
      <description>There are many OS patches out there for just about every type of platform and OS that have a nasty habit of setting things back to their "default" settings, and this can seriously compromise your system's security. I would recommend using Bastille for HP-UX to give you a good security baseline, and then invest in a product such as Tripwire or Vigilent or to track any changes made to your system.</description>
      <pubDate>Tue, 01 Feb 2005 03:10:05 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hardening-hpux-11i-and-os-patches/m-p/4883074#M744507</guid>
      <dc:creator>Andrew Cowan</dc:creator>
      <dc:date>2005-02-01T03:10:05Z</dc:date>
    </item>
    <item>
      <title>Re: Hardening HPUX 11i and OS patches</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hardening-hpux-11i-and-os-patches/m-p/4883075#M744508</link>
      <description>Go to&lt;BR /&gt;&lt;A href="http://www.cisecurity.org/" target="_blank"&gt;http://www.cisecurity.org/&lt;/A&gt;&lt;BR /&gt;and download their HP-UX Benchmark document.&lt;BR /&gt;It gives several recommendations for security-hardening HP-UX systems. It comes with a "scoring tool" that you can run before and after to get an idea how much your security has/could still be improved, and also comes with a permissions checking &amp;amp; fixing tool.</description>
      <pubDate>Tue, 01 Feb 2005 05:27:48 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hardening-hpux-11i-and-os-patches/m-p/4883075#M744508</guid>
      <dc:creator>Gordon  Morrison_1</dc:creator>
      <dc:date>2005-02-01T05:27:48Z</dc:date>
    </item>
    <item>
      <title>Re: Hardening HPUX 11i and OS patches</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hardening-hpux-11i-and-os-patches/m-p/4883076#M744509</link>
      <description>Hi,&lt;BR /&gt;What I want to know is of we change the changed/patched files and also the patch history files (../sw/save/...)?&lt;BR /&gt;&lt;BR /&gt;When we don't change the (../sw/save/..) files but only change the patched files then the script "check_patches" says that there are differences!&lt;BR /&gt;&lt;BR /&gt;What is the way to act?&lt;BR /&gt;&lt;BR /&gt;Whe use the producte ESM of symantic to check oure systems.&lt;BR /&gt;&lt;BR /&gt;RgRds CvB</description>
      <pubDate>Tue, 01 Feb 2005 05:48:36 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hardening-hpux-11i-and-os-patches/m-p/4883076#M744509</guid>
      <dc:creator>Co van Berkel</dc:creator>
      <dc:date>2005-02-01T05:48:36Z</dc:date>
    </item>
    <item>
      <title>Re: Hardening HPUX 11i and OS patches</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hardening-hpux-11i-and-os-patches/m-p/4883077#M744510</link>
      <description>Tools such as ESM are designed to be very generic and thus tend to use a kind of a scatter-gun approach, thus they need a lot of work on the policy before they become effective.&lt;BR /&gt;You will find that ESM misses quite a lot of the security features of HP-UX.&lt;BR /&gt;</description>
      <pubDate>Tue, 01 Feb 2005 06:05:56 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hardening-hpux-11i-and-os-patches/m-p/4883077#M744510</guid>
      <dc:creator>Andrew Cowan</dc:creator>
      <dc:date>2005-02-01T06:05:56Z</dc:date>
    </item>
    <item>
      <title>Re: Hardening HPUX 11i and OS patches</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hardening-hpux-11i-and-os-patches/m-p/4883078#M744511</link>
      <description>&lt;BR /&gt;Between running security_patch_check tool to analyze your level of patches and the bastille supported product which will set a overall security policy and take care of the details mentioned in many of the replies you should be ok.  That is the purpose of bastille and security patch check to give you a framework and proactive method of checking and applying your security policy consistently across multiple systems.</description>
      <pubDate>Tue, 01 Feb 2005 11:48:04 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hardening-hpux-11i-and-os-patches/m-p/4883078#M744511</guid>
      <dc:creator>Emil Velez</dc:creator>
      <dc:date>2005-02-01T11:48:04Z</dc:date>
    </item>
    <item>
      <title>Re: Hardening HPUX 11i and OS patches</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hardening-hpux-11i-and-os-patches/m-p/4883079#M744512</link>
      <description>There really isn't anything dangerous in ../sw/save&lt;BR /&gt;&lt;BR /&gt;I would suggest:&lt;BR /&gt;&lt;BR /&gt;cleanup -c 1&lt;BR /&gt;&lt;BR /&gt;That will committ and clear out patches superseded once or more.&lt;BR /&gt;&lt;BR /&gt;Bastille, HIDS and good policy is how we handle it at my shop.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Tue, 01 Feb 2005 12:28:51 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hardening-hpux-11i-and-os-patches/m-p/4883079#M744512</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2005-02-01T12:28:51Z</dc:date>
    </item>
    <item>
      <title>Re: Hardening HPUX 11i and OS patches</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hardening-hpux-11i-and-os-patches/m-p/4883080#M744513</link>
      <description>CvB,&lt;BR /&gt;&lt;BR /&gt;   While most of the items you mention are good things to look at when securing a system, applying the changes across the board is a very dangerous thing to do.  Each change you make from the supported HP-UX configuration from installed media should be carefully considered.&lt;BR /&gt;&lt;BR /&gt;In some cases, you can actually degrade the security posture of your system by these changes or worse yet, make the system completely unusable.  Many of these situations are very subtle.&lt;BR /&gt;&lt;BR /&gt;As a best practice, if you are not using software that is on your system, you should not install it (hence, you won't have to change ownership/permissions, and you won't have to patch it).  Of course, this only covers some of the software that you are worried about, because some of it is part of the core operating system and cannot be removed.&lt;BR /&gt;&lt;BR /&gt;Next, you should go ahead and use HP-UX Bastille as some have suggested.  All of the changes it makes (except where clearly indicated) are supported and have gone through full release-level testing by HP to ensure that any breakages are well characterized.&lt;BR /&gt;&lt;BR /&gt;At that point, you should look at the threats you are trying to address in your environment and decide on specific actions to take that address those threats.  For example, I'm not sure what threat you are trying to address by removing symlinks...you might have a valid reason but I sure don't know what it is.  A symbolic link has nothing to do with the permissions of the underlying data and rarely changes the security posture of the system.&lt;BR /&gt;&lt;BR /&gt;After deciding to make any unsupported changes, put those changes into a script, and test your applications carefully to make sure they continue to function (remember that HP has not tested this configuration at all).  You'll need to rerun the script after installing patches if you want the changes to remain in effect.  The correct behavior for a patch is to restore permissions to their original (supported) configuration, but to leave user-configurable files (such as inetd.conf) alone.&lt;BR /&gt;&lt;BR /&gt;Hope that helps.&lt;BR /&gt;&lt;BR /&gt;-Keith</description>
      <pubDate>Tue, 01 Feb 2005 13:27:14 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hardening-hpux-11i-and-os-patches/m-p/4883080#M744513</guid>
      <dc:creator>Keith Buck</dc:creator>
      <dc:date>2005-02-01T13:27:14Z</dc:date>
    </item>
    <item>
      <title>Re: Hardening HPUX 11i and OS patches</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hardening-hpux-11i-and-os-patches/m-p/4883081#M744514</link>
      <description>Hi to all,&lt;BR /&gt;&lt;BR /&gt;I don't think my question is clear.&lt;BR /&gt;Sorry for my bad english...&lt;BR /&gt;&lt;BR /&gt;We hardend oure systems after recomedations made in the "HP/UX Security Checklist".&lt;BR /&gt;&lt;BR /&gt;One of the actions stated in this document&lt;BR /&gt;"move all ownership from bin to root" ...&lt;BR /&gt;- Command to use:&lt;BR /&gt;  "find / ! -perm -4000 -a ! -perm -2000 -a ! -perm -0002 -a ! -perm -0020 -a -user bin -a -perm -0004 -exec chown root {} \;"&lt;BR /&gt;&lt;BR /&gt;My question is now of this apply's for all filesystems or NOT.&lt;BR /&gt;&lt;BR /&gt;Situation:&lt;BR /&gt;1. move all ownership from bin to root;&lt;BR /&gt;2. In time we apply one or more security patch(es);&lt;BR /&gt;3. After apply of security patch(es) we run the "move all ownership from bin to root" on ALL filesystems;&lt;BR /&gt;&lt;BR /&gt;Question's:&lt;BR /&gt;- From that moment "check_pathes" will give a lot of error messages saying that file rights of the security patch(es) are out of sync/changed (../sw/save/...)?;&lt;BR /&gt;- What happens when we want to a undo one of more security patches?;&lt;BR /&gt;&lt;BR /&gt;Rgrds CvB.</description>
      <pubDate>Wed, 02 Feb 2005 03:05:36 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hardening-hpux-11i-and-os-patches/m-p/4883081#M744514</guid>
      <dc:creator>Co van Berkel</dc:creator>
      <dc:date>2005-02-02T03:05:36Z</dc:date>
    </item>
    <item>
      <title>Re: Hardening HPUX 11i and OS patches</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hardening-hpux-11i-and-os-patches/m-p/4883082#M744515</link>
      <description>I don't understand why you want to change the ownership in the first place? This will not enhance your security in any way since one of the greatest weaknesses of HP-UX is that it only checks the security entitlement of the user once the application is run. One example of this is "su". In Linux, AIX, and many others you can setup a wheel group and users cannot "su" to root without being in that group. In HP-UX this is not possible since the OS is based on SVR4 code, and this is the same reason why changing from "bin" to root will not help.&lt;BR /&gt;You are far better off making sure that bin has /bin/false as a shell and the login for the account is locked. You should also ensure that nobody is a member of group "bin" or "system" since these users effectively own the OS executables.&lt;BR /&gt;</description>
      <pubDate>Wed, 02 Feb 2005 03:35:47 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hardening-hpux-11i-and-os-patches/m-p/4883082#M744515</guid>
      <dc:creator>Andrew Cowan</dc:creator>
      <dc:date>2005-02-02T03:35:47Z</dc:date>
    </item>
    <item>
      <title>Re: Hardening HPUX 11i and OS patches</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hardening-hpux-11i-and-os-patches/m-p/4883083#M744516</link>
      <description>Hi Andrew Cowan,&lt;BR /&gt;Can you tell me what you meen?&lt;BR /&gt;I don't understand what you meen.&lt;BR /&gt;&lt;BR /&gt;Do you say that HP-UX at first let everybody run every script/executable/.. and after it is started than the system? checkes of this is allowed or not?&lt;BR /&gt;What security implementation can this give?&lt;BR /&gt;&lt;BR /&gt;R.E.&lt;BR /&gt;- User bin is, as all system-users, disabled and have a shell of /usr/bin/false.&lt;BR /&gt;- Only user root and bin are memebr of group bin;&lt;BR /&gt;&lt;BR /&gt;Rgrds CvB.</description>
      <pubDate>Wed, 02 Feb 2005 03:52:00 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hardening-hpux-11i-and-os-patches/m-p/4883083#M744516</guid>
      <dc:creator>Co van Berkel</dc:creator>
      <dc:date>2005-02-02T03:52:00Z</dc:date>
    </item>
    <item>
      <title>Re: Hardening HPUX 11i and OS patches</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hardening-hpux-11i-and-os-patches/m-p/4883084#M744517</link>
      <description>Hi Co,&lt;BR /&gt;&lt;BR /&gt;You are correct that only "root" and "bin" should be members of group "bin". A common trick when compromising a system is to add a user to a privileged group such as "bin", "adm", "system", "root", etc, and then make use use of group privileges, which in some cases are set to be as strong as those of the owners.&lt;BR /&gt;&lt;BR /&gt;In the case of "su" on HP-UX the default owner and group is "bin", and the permissions are set to world-executable. This means that any user who knows the password can become root. On an OS that was based upon the BSD kernel "su" checks to see if the user is in the "wheel" group, and if not will deny them access even if they know the root password. The only way to overcome this is to disable "su" by creating a new group (e.g. "wheel") and then set the permissions for "su" so that only members of this group can execute it. The only problem with this approach is that if you apply any OS patches they will either fail or reset the permissions of "su".</description>
      <pubDate>Wed, 02 Feb 2005 04:10:00 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hardening-hpux-11i-and-os-patches/m-p/4883084#M744517</guid>
      <dc:creator>Andrew Cowan</dc:creator>
      <dc:date>2005-02-02T04:10:00Z</dc:date>
    </item>
    <item>
      <title>Re: Hardening HPUX 11i and OS patches</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hardening-hpux-11i-and-os-patches/m-p/4883085#M744518</link>
      <description>HP-UX has an option similar to a "wheel group":&lt;BR /&gt;In /etc/default/security:&lt;BR /&gt;SU_ROOT_GROUP=root&lt;BR /&gt;&lt;BR /&gt;This prevents any user that is NOT a member of group "root" from using su to become user root.&lt;BR /&gt;A user can belong to several groups - the SU_ROOT_GROUP doesn't have to be their primary group.</description>
      <pubDate>Wed, 02 Feb 2005 04:42:07 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hardening-hpux-11i-and-os-patches/m-p/4883085#M744518</guid>
      <dc:creator>Gordon  Morrison_1</dc:creator>
      <dc:date>2005-02-02T04:42:07Z</dc:date>
    </item>
    <item>
      <title>Re: Hardening HPUX 11i and OS patches</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hardening-hpux-11i-and-os-patches/m-p/4883086#M744519</link>
      <description>Hi Gordon,&lt;BR /&gt;&lt;BR /&gt;Is that a new feature of 11i as when I spoke to HP about this a while ago, I was told there was no way to do this?&lt;BR /&gt;&lt;BR /&gt;Cheers,&lt;BR /&gt;Andrew</description>
      <pubDate>Wed, 02 Feb 2005 05:01:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hardening-hpux-11i-and-os-patches/m-p/4883086#M744519</guid>
      <dc:creator>Andrew Cowan</dc:creator>
      <dc:date>2005-02-02T05:01:30Z</dc:date>
    </item>
    <item>
      <title>Re: Hardening HPUX 11i and OS patches</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hardening-hpux-11i-and-os-patches/m-p/4883087#M744520</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;I nice to hear a lot of things have been pointed out esp things about /etc/default security file, well since the patches installed are in SD format and swinstall command is used, swinstall has a option&lt;BR /&gt; &lt;BR /&gt;Note: this is a rip off from man page&lt;BR /&gt;&lt;BR /&gt;-x  fix_explicit_directories=false&lt;BR /&gt;&lt;BR /&gt;Controls the swinstall response to explicitly packaged software (software packaged with explicit file          specifications). The default value of false causes swinstall to set permissions (as specified in the product specification file) on new directories but never on pre-existing directories. When set to true, swinstall also sets the permissions on pre-existing directories.&lt;BR /&gt;&lt;BR /&gt;I have been using this option and seems to work quite well for me.&lt;BR /&gt;give it a try.&lt;BR /&gt;&lt;BR /&gt;Cheers&lt;BR /&gt;Shantaram</description>
      <pubDate>Wed, 02 Feb 2005 05:24:18 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hardening-hpux-11i-and-os-patches/m-p/4883087#M744520</guid>
      <dc:creator>Shantaram Sahyadri</dc:creator>
      <dc:date>2005-02-02T05:24:18Z</dc:date>
    </item>
    <item>
      <title>Re: Hardening HPUX 11i and OS patches</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hardening-hpux-11i-and-os-patches/m-p/4883088#M744521</link>
      <description>Hi Andrew,&lt;BR /&gt;As far as I know, it's a standard feature of HP-UX 11.xx (I don't know about previous versions)&lt;BR /&gt;But...&lt;BR /&gt;It is not turned on by default, and there seems to be no man page (man security) prior to 11i&lt;BR /&gt;&lt;BR /&gt;Apologies to CvB and the Forum Moderators.&lt;BR /&gt;I know this isn't really the place to discuss side issues, but I don't know where else to post this, as a new thread might not be noticed by Andrew.&lt;BR /&gt;(Perhaps this is one of the things they'll address in the maintenance slot this weekend;o)</description>
      <pubDate>Wed, 02 Feb 2005 06:56:06 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hardening-hpux-11i-and-os-patches/m-p/4883088#M744521</guid>
      <dc:creator>Gordon  Morrison_1</dc:creator>
      <dc:date>2005-02-02T06:56:06Z</dc:date>
    </item>
    <item>
      <title>Re: Hardening HPUX 11i and OS patches</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hardening-hpux-11i-and-os-patches/m-p/4883089#M744522</link>
      <description>Hi Shantaram,&lt;BR /&gt;The defualt setting is:&lt;BR /&gt;"-x fix_explicit_directories=false"&lt;BR /&gt;&lt;BR /&gt;On our HP-UX 11.0 systems we changed/hardend selected owner" bin files.&lt;BR /&gt;But after installation of an (security-) patch the file permissions of the files altered by the patch were changed back to owner bin!&lt;BR /&gt;&lt;BR /&gt;How does this work then?&lt;BR /&gt;&lt;BR /&gt;Rgrds CvB/</description>
      <pubDate>Wed, 02 Feb 2005 07:21:56 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hardening-hpux-11i-and-os-patches/m-p/4883089#M744522</guid>
      <dc:creator>Co van Berkel</dc:creator>
      <dc:date>2005-02-02T07:21:56Z</dc:date>
    </item>
    <item>
      <title>Re: Hardening HPUX 11i and OS patches</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hardening-hpux-11i-and-os-patches/m-p/4883090#M744523</link>
      <description>CvB,&lt;BR /&gt;&lt;BR /&gt;   Can you give a URL to your "HP/UX Security Checklist"?  It seems that some of the security recommendations you are following are questionable...maybe if we could read the original source it would clear things up.  There are many such checklists out there (CIS, HP-UX Bastille, the old Bastion Host Whitepaper, etc.) and I'm not sure which one you are referring to.&lt;BR /&gt;&lt;BR /&gt;Maybe that will help others help you.&lt;BR /&gt;&lt;BR /&gt;(also, don't forget to assign points to those who have helped)&lt;BR /&gt;&lt;BR /&gt;-Keith</description>
      <pubDate>Wed, 02 Feb 2005 13:18:54 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hardening-hpux-11i-and-os-patches/m-p/4883090#M744523</guid>
      <dc:creator>Keith Buck</dc:creator>
      <dc:date>2005-02-02T13:18:54Z</dc:date>
    </item>
    <item>
      <title>Re: Hardening HPUX 11i and OS patches</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hardening-hpux-11i-and-os-patches/m-p/4883091#M744524</link>
      <description>Hi Kieth,&lt;BR /&gt;I got it from HP and it is only on paper.&lt;BR /&gt;&lt;BR /&gt;We had two years ago a security scan done by HP and out of that this report is gome up.&lt;BR /&gt;&lt;BR /&gt;Rgrds CvB.&lt;BR /&gt;</description>
      <pubDate>Thu, 03 Feb 2005 03:52:11 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hardening-hpux-11i-and-os-patches/m-p/4883091#M744524</guid>
      <dc:creator>Co van Berkel</dc:creator>
      <dc:date>2005-02-03T03:52:11Z</dc:date>
    </item>
  </channel>
</rss>

