<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Securing NFS beyond /etc/exports in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/securing-nfs-beyond-etc-exports/m-p/3172581#M748414</link>
    <description>As far as I am aware Sun produced what it calls a secure RPC, which means that Portmapper does not behave in the same way as the standard version used by the rest of the world.&lt;BR /&gt;&lt;BR /&gt;Portmappers main weakness is that it does not validate connections and will therefore respond to any request.&lt;BR /&gt;&lt;BR /&gt;Here are some docs regarding the Secure version&lt;BR /&gt;&lt;A href="http://csrc.nist.gov/publications/nistpubs/800-7/node184.html" target="_blank"&gt;http://csrc.nist.gov/publications/nistpubs/800-7/node184.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
    <pubDate>Mon, 26 Jan 2004 09:27:33 GMT</pubDate>
    <dc:creator>Andrew Cowan</dc:creator>
    <dc:date>2004-01-26T09:27:33Z</dc:date>
    <item>
      <title>Securing NFS beyond /etc/exports</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/securing-nfs-beyond-etc-exports/m-p/3172576#M748409</link>
      <description>Almost everything that relates to NFS Security goes in much detail explaining how to add flags in /etc/exports. However, following a security audit I've had, I've been asked the following questions.&lt;BR /&gt;&lt;BR /&gt;1. How can I prevent someone from easily guessing the NFS file handles? ... as fsirand doesn't work on vxfs filesystems.&lt;BR /&gt;&lt;BR /&gt;2. How can I prevent someone from remotely disabling an rpc service?&lt;BR /&gt;&lt;BR /&gt;3. How can I prevent the NFS server from accepting requests coming from an unpriviledged port?&lt;BR /&gt;&lt;BR /&gt;Solaris seems to have tweaks to cover this, but I spend lots of time searching the ITRC and HP does not have many suggestions except putting rpc.mountd in inetd.sec which does not cover the cases above.&lt;BR /&gt;&lt;BR /&gt;Any suggestions?&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 23 Jan 2004 14:02:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/securing-nfs-beyond-etc-exports/m-p/3172576#M748409</guid>
      <dc:creator>Olivier Masse</dc:creator>
      <dc:date>2004-01-23T14:02:42Z</dc:date>
    </item>
    <item>
      <title>Re: Securing NFS beyond /etc/exports</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/securing-nfs-beyond-etc-exports/m-p/3172577#M748410</link>
      <description>3) I am pretty sure NFS has to allow for listening to open ports. What are you calling unpriveleged ports?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;You can add some other security to your box via /etc/hosts.allow; /etc/hosts.deny.&lt;BR /&gt;&lt;BR /&gt;Use these files to deny and then grant access for certain daemons which use tcp protocols...&lt;BR /&gt;&lt;BR /&gt;This will help you tighten your security.&lt;BR /&gt;&lt;BR /&gt;Here is a sample of my actual /etc/hosts.allow and deny files. You may want to remove and add items to the hosts.allow if you dont have some of these items like SSH.&lt;BR /&gt;&lt;BR /&gt;BTW, SSH might not be a bad idea either...&lt;BR /&gt;&lt;BR /&gt;----------------------------------------------&lt;BR /&gt;# cat /etc/hosts.deny &lt;BR /&gt;# Deny all hosts&lt;BR /&gt;ALL : ALL&lt;BR /&gt;&lt;BR /&gt;----------------------------------------------&lt;BR /&gt;# cat /etc/hosts.allow &lt;BR /&gt;#all : all : banners=/usr/localcw/opt/sysguard/banners : allow&lt;BR /&gt;ftpd : all : banners=/usr/localcw/opt/sysguard/banners : allow&lt;BR /&gt;telnetd : all : banners=/usr/localcw/opt/sysguard/banners : allow&lt;BR /&gt;tftpd : all : banners=/usr/localcw/opt/sysguard/banners : allow&lt;BR /&gt;logind : all : banners=/usr/localcw/opt/sysguard/banners : allow&lt;BR /&gt;rlogind : all : banners=/usr/localcw/opt/sysguard/banners : allow&lt;BR /&gt;remshd: all : banners=/usr/localcw/opt/sysguard/banners : allow&lt;BR /&gt;sidftpd : all : banners=/usr/localcw/opt/sysguard/banners : allow&lt;BR /&gt;rexecd : all : banners=/usr/localcw/opt/sysguard/banners : allow&lt;BR /&gt;sshd : all : banners=/usr/localcw/opt/sysguard/banners : allow</description>
      <pubDate>Fri, 23 Jan 2004 14:24:01 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/securing-nfs-beyond-etc-exports/m-p/3172577#M748410</guid>
      <dc:creator>Todd McDaniel_1</dc:creator>
      <dc:date>2004-01-23T14:24:01Z</dc:date>
    </item>
    <item>
      <title>Re: Securing NFS beyond /etc/exports</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/securing-nfs-beyond-etc-exports/m-p/3172578#M748411</link>
      <description>Okay, on #2 I need a bit of background...&lt;BR /&gt;&lt;BR /&gt;a) is rpc in jeopardy by other user's with root access killing the rpc daemons or is this a malicious attack?&lt;BR /&gt;&lt;BR /&gt;b) When you say remotely... are you saying they disable the rpcd on the remote box or login remotely to YOUR master and kill rpcdaemons?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;NFS by its nature is meant to be used by trusted systems, just my opinion. &lt;BR /&gt;&lt;BR /&gt;IF you have serious security problems, I would suggest not using NFS and only use SSH logins on those boxes and secureFTP to transfer data back and forth.</description>
      <pubDate>Fri, 23 Jan 2004 14:49:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/securing-nfs-beyond-etc-exports/m-p/3172578#M748411</guid>
      <dc:creator>Todd McDaniel_1</dc:creator>
      <dc:date>2004-01-23T14:49:53Z</dc:date>
    </item>
    <item>
      <title>Re: Securing NFS beyond /etc/exports</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/securing-nfs-beyond-etc-exports/m-p/3172579#M748412</link>
      <description>Firstly ensure that you never export any filesystem to "everyone", limit the hosts that have access, and where possible, export as read-only, and with nosuid.&lt;BR /&gt;&lt;BR /&gt;If you really want to secure NFS and a lot of other protocols, install IP-SEC, and run tunelled communications between all your most vital hosts.&lt;BR /&gt;&lt;BR /&gt;Another simpler to limit exposure is to setup a switched-network and to install multiple firewalls.&lt;BR /&gt;&lt;BR /&gt;BTW. I think that you'll only have /etc/hosts.allow|deny when you install TCP-Wrappers. The default security file in HP-UX is /etc/inetd.sec, and neither of these will protect the portmapper.</description>
      <pubDate>Sat, 24 Jan 2004 05:11:06 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/securing-nfs-beyond-etc-exports/m-p/3172579#M748412</guid>
      <dc:creator>Andrew Cowan</dc:creator>
      <dc:date>2004-01-24T05:11:06Z</dc:date>
    </item>
    <item>
      <title>Re: Securing NFS beyond /etc/exports</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/securing-nfs-beyond-etc-exports/m-p/3172580#M748413</link>
      <description>I'm mostly challenged by people who recently secured Solaris systems, and it seems that Sun did some tweaks to increase the security of their NFS services somewhat over the years, especially the portmapper. There is not any documentation of Sun vs. HP's NFS security features.&lt;BR /&gt;&lt;BR /&gt;rpc.mountd can be protected with inetd.sec, but rpcbind is still vulnerable.&lt;BR /&gt;&lt;BR /&gt;NFS is required, I can't just remove (reason #1: 2 terabytes of data).&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 26 Jan 2004 09:20:12 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/securing-nfs-beyond-etc-exports/m-p/3172580#M748413</guid>
      <dc:creator>Olivier Masse</dc:creator>
      <dc:date>2004-01-26T09:20:12Z</dc:date>
    </item>
    <item>
      <title>Re: Securing NFS beyond /etc/exports</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/securing-nfs-beyond-etc-exports/m-p/3172581#M748414</link>
      <description>As far as I am aware Sun produced what it calls a secure RPC, which means that Portmapper does not behave in the same way as the standard version used by the rest of the world.&lt;BR /&gt;&lt;BR /&gt;Portmappers main weakness is that it does not validate connections and will therefore respond to any request.&lt;BR /&gt;&lt;BR /&gt;Here are some docs regarding the Secure version&lt;BR /&gt;&lt;A href="http://csrc.nist.gov/publications/nistpubs/800-7/node184.html" target="_blank"&gt;http://csrc.nist.gov/publications/nistpubs/800-7/node184.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 26 Jan 2004 09:27:33 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/securing-nfs-beyond-etc-exports/m-p/3172581#M748414</guid>
      <dc:creator>Andrew Cowan</dc:creator>
      <dc:date>2004-01-26T09:27:33Z</dc:date>
    </item>
  </channel>
</rss>

