<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic HPUX O/S hardening in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/hpux-o-s-hardening/m-p/2956940#M752671</link>
    <description>&lt;BR /&gt;I am recently doing some O/S hardening on HPUX, I have some question;&lt;BR /&gt;&lt;BR /&gt;1. How does having 'mesg n' provide a greater security?&lt;BR /&gt;&lt;BR /&gt;2. How does having global privileges such as &lt;BR /&gt;echo -n &amp;gt; /etc/privgroup with permission 400, if my global priv is chown provide a greater security.&lt;BR /&gt;&lt;BR /&gt;3. how does disabling finger, echo, and chargen provide a greater security?</description>
    <pubDate>Wed, 23 Apr 2003 00:52:06 GMT</pubDate>
    <dc:creator>YLTan</dc:creator>
    <dc:date>2003-04-23T00:52:06Z</dc:date>
    <item>
      <title>HPUX O/S hardening</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hpux-o-s-hardening/m-p/2956940#M752671</link>
      <description>&lt;BR /&gt;I am recently doing some O/S hardening on HPUX, I have some question;&lt;BR /&gt;&lt;BR /&gt;1. How does having 'mesg n' provide a greater security?&lt;BR /&gt;&lt;BR /&gt;2. How does having global privileges such as &lt;BR /&gt;echo -n &amp;gt; /etc/privgroup with permission 400, if my global priv is chown provide a greater security.&lt;BR /&gt;&lt;BR /&gt;3. how does disabling finger, echo, and chargen provide a greater security?</description>
      <pubDate>Wed, 23 Apr 2003 00:52:06 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hpux-o-s-hardening/m-p/2956940#M752671</guid>
      <dc:creator>YLTan</dc:creator>
      <dc:date>2003-04-23T00:52:06Z</dc:date>
    </item>
    <item>
      <title>Re: HPUX O/S hardening</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hpux-o-s-hardening/m-p/2956941#M752672</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;I'm not an expert, but here is my take on your questions:&lt;BR /&gt;&lt;BR /&gt;1. Turning off the mesg service probably helps prevent a denial of service attack, as well as preventing any possible bugs in the program that might cause trouble [the old buffer overflow problem].&lt;BR /&gt;&lt;BR /&gt;2. If I understand your question, you are asking why the /etc/privgroup can have just 400 permissions when you still have global chown privileges?  The /etc/privgroup file is read by the setprivgroup command, and also the file should be owned by root, which means that even if you have chown priviliges you should not be able to change the permissions on the file.&lt;BR /&gt;&lt;BR /&gt;3. Those services usually aren't needed, and can possibly be exploited for denial of service, bugs, or for getting information about the system and user accounts.&lt;BR /&gt;&lt;BR /&gt;JP&lt;BR /&gt;</description>
      <pubDate>Wed, 23 Apr 2003 01:37:34 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hpux-o-s-hardening/m-p/2956941#M752672</guid>
      <dc:creator>John Poff</dc:creator>
      <dc:date>2003-04-23T01:37:34Z</dc:date>
    </item>
    <item>
      <title>Re: HPUX O/S hardening</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hpux-o-s-hardening/m-p/2956942#M752673</link>
      <description>In addition to John's comments, you can also install HPUX Bastille that will assist you. You can get it from here:&lt;BR /&gt;&lt;A href="http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=B6849AA" target="_blank"&gt;http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=B6849AA&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;'chown/chmod/chgrp' should be allowed globally anyway. You still won't be able to change a file from 'root' or anyone else.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 23 Apr 2003 01:57:21 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hpux-o-s-hardening/m-p/2956942#M752673</guid>
      <dc:creator>Michael Tully</dc:creator>
      <dc:date>2003-04-23T01:57:21Z</dc:date>
    </item>
    <item>
      <title>Re: HPUX O/S hardening</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hpux-o-s-hardening/m-p/2956943#M752674</link>
      <description>You might also want to take a look at the document "Building a Bastion Host Using HP-UX 11" available from the TKB. The document is available from the ITRC TKB.  The doc id is USECKBAN00000800 and the URL is: &lt;A href="http://www2.itrc.hp.com/service/cki/docDisplay.do?docLocale=en_US&amp;amp;docId=200000066258828" target="_blank"&gt;http://www2.itrc.hp.com/service/cki/docDisplay.do?docLocale=en_US&amp;amp;docId=200000066258828&lt;/A&gt;</description>
      <pubDate>Wed, 23 Apr 2003 02:49:52 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hpux-o-s-hardening/m-p/2956943#M752674</guid>
      <dc:creator>Patrick Wallek</dc:creator>
      <dc:date>2003-04-23T02:49:52Z</dc:date>
    </item>
    <item>
      <title>Re: HPUX O/S hardening</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hpux-o-s-hardening/m-p/2956944#M752675</link>
      <description>If you turn mesg off, you're basically saying you do not want to accept any broadcast message that is sent to your console or shell for that matter hence making it difficult for hackers to write to user's terminal. As for the services like finger, echo and chargen, they can be used for a DOS attack. Typically they are not needed and you can disable them in /etc/inetd.con especially the UDP ones.</description>
      <pubDate>Wed, 23 Apr 2003 04:00:12 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hpux-o-s-hardening/m-p/2956944#M752675</guid>
      <dc:creator>S.K. Chan</dc:creator>
      <dc:date>2003-04-23T04:00:12Z</dc:date>
    </item>
    <item>
      <title>Re: HPUX O/S hardening</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hpux-o-s-hardening/m-p/2956945#M752676</link>
      <description>You probably know this useful link:Building a Bastion Host Using HP-UX 11: by Kevin Steves.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://people.hp.se/stevesk/bastion11.html" target="_blank"&gt;http://people.hp.se/stevesk/bastion11.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Thanks, Andrey</description>
      <pubDate>Wed, 23 Apr 2003 04:50:11 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hpux-o-s-hardening/m-p/2956945#M752676</guid>
      <dc:creator>kuksaa_1</dc:creator>
      <dc:date>2003-04-23T04:50:11Z</dc:date>
    </item>
    <item>
      <title>Re: HPUX O/S hardening</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hpux-o-s-hardening/m-p/2956946#M752677</link>
      <description>1. S.K. Chan explained mesg n.  I won't repeat.&lt;BR /&gt;&lt;BR /&gt;2. On some Unixes, chown can only be run by root.  /etc/privgroup gives you the ability to have that behavior on HP-UX (as well as a few other privileges).  By default, any user has the ability to chown to another user.&lt;BR /&gt;This is convenient in some environments, but in a high threat environment, limiting any privilege to the least necessary can be helpful.&lt;BR /&gt;&lt;BR /&gt;3. Bastille 2.1 explains these services and some reasons for turning them off.  Basically, any service that listens on the network increases your risk of having a future vulnerability which affects your system.  Also, finger can be used as part of the "information gathering phase" of an attack.&lt;BR /&gt;</description>
      <pubDate>Wed, 23 Apr 2003 16:13:59 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hpux-o-s-hardening/m-p/2956946#M752677</guid>
      <dc:creator>Keith Buck</dc:creator>
      <dc:date>2003-04-23T16:13:59Z</dc:date>
    </item>
    <item>
      <title>Re: HPUX O/S hardening</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hpux-o-s-hardening/m-p/2956947#M752678</link>
      <description>Hardening Unix does require an extensive knowledge of all the services that it can provide and turn off any that are not needed. This is not a trivial task. There are a LOT more services besides chargen,finger,echo, etc that should be disabled. Bascially, you want nothing to respond unless it is a required service.&lt;BR /&gt;&lt;BR /&gt;But when you ask the question about security, there are dozens of other areas such as cleartext passwords over the network (ie, telnet), security patch management, plaintext data exchange (ftp) and so on that need to be addressed. &lt;BR /&gt;&lt;BR /&gt;As mentioned, download a copy of Bastille and the security patch checker from software.hp.com and also look at the IDS/9000 (Intruder Detection System),Secure Shell (OpenSSH) and perhaps TCPwrappers, also available from software.hp.com (and don't forget to buy the book: HP-UX 11i Security by Chris Wong)</description>
      <pubDate>Wed, 23 Apr 2003 16:51:28 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hpux-o-s-hardening/m-p/2956947#M752678</guid>
      <dc:creator>Bill Hassell</dc:creator>
      <dc:date>2003-04-23T16:51:28Z</dc:date>
    </item>
  </channel>
</rss>

