<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: HPUX11i security with MCSG and ovo 7.1 in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/hpux11i-security-with-mcsg-and-ovo-7-1/m-p/3066781#M751389</link>
    <description>For MC/SG, use /etc/cmcluster/cmclnodelist instead of .rhosts&lt;BR /&gt;&lt;BR /&gt;Rgds...Geoff</description>
    <pubDate>Tue, 09 Sep 2003 15:58:41 GMT</pubDate>
    <dc:creator>Geoff Wild</dc:creator>
    <dc:date>2003-09-09T15:58:41Z</dc:date>
    <item>
      <title>HPUX11i security with MCSG and ovo 7.1</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hpux11i-security-with-mcsg-and-ovo-7-1/m-p/3066779#M751387</link>
      <description>Hi All,&lt;BR /&gt;&lt;BR /&gt;Does anyone have any sugestions on how to proceed and the best way to secure HPUX 11i and to make sure it doesn't effect OVO/ITO/MCSG.&lt;BR /&gt;&lt;BR /&gt;Thanks in advance&lt;BR /&gt;Dale</description>
      <pubDate>Tue, 09 Sep 2003 13:36:21 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hpux11i-security-with-mcsg-and-ovo-7-1/m-p/3066779#M751387</guid>
      <dc:creator>Dale Waines_1</dc:creator>
      <dc:date>2003-09-09T13:36:21Z</dc:date>
    </item>
    <item>
      <title>Re: HPUX11i security with MCSG and ovo 7.1</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hpux11i-security-with-mcsg-and-ovo-7-1/m-p/3066780#M751388</link>
      <description>Ok,&lt;BR /&gt;ITO uses rpc and securing rpc connections isn't an easy way,either its enabled in the source code or blocked (remember ms blaster?::).&lt;BR /&gt;&lt;BR /&gt;Here is a security product (extension) for ovo/ito. &lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.managementsoftware.hp.com/products/advsec/" target="_blank"&gt;http://www.managementsoftware.hp.com/products/advsec/&lt;/A&gt; &lt;BR /&gt;&lt;BR /&gt;For example I saw issues for ssh with java gui etc.&lt;BR /&gt;&lt;BR /&gt;Here's description of ITO processes security:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.managementsoftware.hp.com/sso/ecare/getsupportdoc?docid=B7491-90001_58-con" target="_blank"&gt;http://www.managementsoftware.hp.com/sso/ecare/getsupportdoc?docid=B7491-90001_58-con&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Zeev</description>
      <pubDate>Tue, 09 Sep 2003 14:51:31 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hpux11i-security-with-mcsg-and-ovo-7-1/m-p/3066780#M751388</guid>
      <dc:creator>Zeev Schultz</dc:creator>
      <dc:date>2003-09-09T14:51:31Z</dc:date>
    </item>
    <item>
      <title>Re: HPUX11i security with MCSG and ovo 7.1</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hpux11i-security-with-mcsg-and-ovo-7-1/m-p/3066781#M751389</link>
      <description>For MC/SG, use /etc/cmcluster/cmclnodelist instead of .rhosts&lt;BR /&gt;&lt;BR /&gt;Rgds...Geoff</description>
      <pubDate>Tue, 09 Sep 2003 15:58:41 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hpux11i-security-with-mcsg-and-ovo-7-1/m-p/3066781#M751389</guid>
      <dc:creator>Geoff Wild</dc:creator>
      <dc:date>2003-09-09T15:58:41Z</dc:date>
    </item>
    <item>
      <title>Re: HPUX11i security with MCSG and ovo 7.1</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hpux11i-security-with-mcsg-and-ovo-7-1/m-p/3066782#M751390</link>
      <description>The first step is to ensure that you have a physically secure and highly available heartbeat network (or crossover cables).&lt;BR /&gt;&lt;BR /&gt;The Bastille tool can be used to create a custom hardened HP-UX system.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=B6849AA" target="_blank"&gt;http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=B6849AA&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;If you use the ipfilter firewall setup, you'll need to configure custom rules to allow MCSG traffic over the heartbeat lan.  (allowing all traffic over this lan should be fine)&lt;BR /&gt;&lt;BR /&gt;You'll also need to have rules like this to allow Openview traffic in through the ipfilter firewall:&lt;BR /&gt;&lt;BR /&gt;pass in quick proto tcp from any to any port = 135 flags S keep state keep frags&lt;BR /&gt;&lt;BR /&gt;pass in quick proto tcp from any to any port 35000 &amp;gt;&amp;lt; 35004 flags S keep state keep frags&lt;BR /&gt;&lt;BR /&gt;The things you need to leave running depend on how you're using ITO.  For minimalist functionality, you can lock it down pretty tight.  It's pretty common to use snmp to manage devices and monitor services, so it depends on your threat environment whether or not you allow that (functionality vs security).&lt;BR /&gt;&lt;BR /&gt;That's pretty aggressive on the security side.  If this is in a production environment, you should go through the Bastille GUI for recommendations, but only make a few changes at a time.  If you have a test environment, then you can accept a lot more breakage risk and get there a lot faster.&lt;BR /&gt;&lt;BR /&gt;   -Keith&lt;BR /&gt;</description>
      <pubDate>Wed, 10 Sep 2003 17:00:03 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hpux11i-security-with-mcsg-and-ovo-7-1/m-p/3066782#M751390</guid>
      <dc:creator>Keith Buck</dc:creator>
      <dc:date>2003-09-10T17:00:03Z</dc:date>
    </item>
    <item>
      <title>Re: HPUX11i security with MCSG and ovo 7.1</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hpux11i-security-with-mcsg-and-ovo-7-1/m-p/3066783#M751391</link>
      <description>Thanks for all the info.  &lt;BR /&gt;I've already used bastille to lock down some common holes.  Just wondering if anyone out there has done this exact configuration with OVO functionality.  I amd basically going to be monitoring Windows, Linux, Solaris boxes using OVO agents and SNMP for hardware traps.  Even after I used bastille to lock my secondary box (in the cluster) (Primary is being used) I ran a security scanner called cis-scan and my security rating is still pretty bad as in 4.66 out of 10.  I don't want to lock it down to much in case it starts messing up Xwindows/OVO or MCSG.  Any other recommendations?  Or am I just going nuts.&lt;BR /&gt;&lt;BR /&gt;Thanks again&lt;BR /&gt;Dale</description>
      <pubDate>Wed, 10 Sep 2003 17:10:18 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hpux11i-security-with-mcsg-and-ovo-7-1/m-p/3066783#M751391</guid>
      <dc:creator>Dale Waines_1</dc:creator>
      <dc:date>2003-09-10T17:10:18Z</dc:date>
    </item>
    <item>
      <title>Re: HPUX11i security with MCSG and ovo 7.1</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hpux11i-security-with-mcsg-and-ovo-7-1/m-p/3066784#M751392</link>
      <description>I have actually used this configuration with OVO and MCSG, but it was more of a single purpose configuration and didn't use all of the MCSG/OVO features.&lt;BR /&gt;&lt;BR /&gt;As far as the CIS tester, you really need to look at the detailed report rather than the high level score.  For example, it complains that you don't have tcpwrappers/inetd.sec setup even if you enable a more complete solution like a host-based firewall (ipfilter).  A second line of defense is nice and probably won't break anything, but it is additional work to maintain.  So you have to make a tradeoff for your environment.&lt;BR /&gt;&lt;BR /&gt;Also, note that there are a couple of bugs in the CIS scanner that would raise your score if they were fixed in the tester (e.g. the executable_stack kernel parameter test always returns 'insecure' despite the real state of the system, as does the complaint that you haven't patched in 30 days.  CIS has fixed these bugs but hasn't released the new version.)&lt;BR /&gt;&lt;BR /&gt;Then, there are several changes which CIS recommends which are not tested/supported by HP.  So, be careful there as it may break in unpredictable ways.&lt;BR /&gt;&lt;BR /&gt;Hope that helps.&lt;BR /&gt;&lt;BR /&gt;   -Keith</description>
      <pubDate>Thu, 11 Sep 2003 15:20:59 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hpux11i-security-with-mcsg-and-ovo-7-1/m-p/3066784#M751392</guid>
      <dc:creator>Keith Buck</dc:creator>
      <dc:date>2003-09-11T15:20:59Z</dc:date>
    </item>
    <item>
      <title>Re: HPUX11i security with MCSG and ovo 7.1</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hpux11i-security-with-mcsg-and-ovo-7-1/m-p/3066785#M751393</link>
      <description>And I'd also scan the traffic between the computers in your farm with some good sniffer&lt;BR /&gt;(like Ethereal) plus get open ports status with Nmap.What I really liked about m$ windows based firewalls/port protection tools I've used is its user interactive mode (means you build your own rules learning from access atempts made by your applications) so it lets you learn more about processes/ports and set 'em at the same time. Nothing is better than the real thing (and not to configure based on technical documentations only) :)</description>
      <pubDate>Mon, 15 Sep 2003 11:10:50 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hpux11i-security-with-mcsg-and-ovo-7-1/m-p/3066785#M751393</guid>
      <dc:creator>Zeev Schultz</dc:creator>
      <dc:date>2003-09-15T11:10:50Z</dc:date>
    </item>
  </channel>
</rss>

