<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Securing a system without using 'trusted' in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/securing-a-system-without-using-trusted/m-p/2548581#M756705</link>
    <description>Also, lots of good info here:  &lt;A href="http://people.hp.se/stevesk/bastion11.html" target="_blank"&gt;http://people.hp.se/stevesk/bastion11.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;The document uses trusted host, but many of the suggestions there can be implemented on a non-trusted host.</description>
    <pubDate>Wed, 27 Feb 2002 16:19:34 GMT</pubDate>
    <dc:creator>Eric Ladner</dc:creator>
    <dc:date>2002-02-27T16:19:34Z</dc:date>
    <item>
      <title>Securing a system without using 'trusted'</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/securing-a-system-without-using-trusted/m-p/2548576#M756700</link>
      <description>I've been asked to look at securing our&lt;BR /&gt;systems far more than what they are now. &lt;BR /&gt;In doing so I've compiled a list of things&lt;BR /&gt;that need to be looked at. Unfortunately&lt;BR /&gt;our site cannot use 'trusted system' &lt;BR /&gt;because of a constraint with one of the&lt;BR /&gt;essential applications that we use.&lt;BR /&gt;&lt;BR /&gt;Here is what I've listed so far. I would&lt;BR /&gt;like feedback on what else I can do. &lt;BR /&gt;Remember I cannot use 'trusted system'&lt;BR /&gt;&lt;BR /&gt;Removing all instances of .rhosts and &lt;BR /&gt;/etc/hosts.equiv&lt;BR /&gt;Turning off unnecessary services such as&lt;BR /&gt;exec, comsat, talk, uucp, finger, echo, &lt;BR /&gt;discard, daytime, chargen, sadmind, &lt;BR /&gt;rpc.cmsd and rpc.ttdbserverd. &lt;BR /&gt;Beef up the permissions on the following &lt;BR /&gt;files:&lt;BR /&gt;&lt;BR /&gt;/etc/passwd 444 root:sys&lt;BR /&gt;/etc/group 444 root:sys&lt;BR /&gt;/etc/syslog.conf 444 bin:bin &lt;BR /&gt;/etc/resolv.conf 444 root:sys&lt;BR /&gt;/etc/nsswitch.conf 444 root:sys&lt;BR /&gt;/etc/mail/aliases 644 root:mail&lt;BR /&gt;/etc/mail/sendmail.cf 444 root:mail&lt;BR /&gt;/etc/mail/sendmail.cw 444 root:mail&lt;BR /&gt;/etc/fstab 444 root:sys&lt;BR /&gt;/etc/mnttab 444 root:sys&lt;BR /&gt;/etc/inittab 444 root:sys&lt;BR /&gt;/etc/inetd.conf 444 root:sys&lt;BR /&gt;/etc/lvmconf (directory) 755 root:root&lt;BR /&gt;/etc/lvmtab 600 root:sys&lt;BR /&gt;/etc/lvmrc 640 bin:bin&lt;BR /&gt;/etc/profile 444 bin:bin&lt;BR /&gt;/etc/exports 600 root:sys&lt;BR /&gt;/etc/hosts 444 root:sys&lt;BR /&gt;/etc/services 444 root:sys&lt;BR /&gt;/etc/shutdown.allow 640 bin:bin&lt;BR /&gt;/etc/SnmpAgent/snmpd.conf 644 root:root&lt;BR /&gt;/etc/utmp 644 root:root&lt;BR /&gt;/var/adm/btmp 600 root:root&lt;BR /&gt;/var/adm/sulog 600 root:root&lt;BR /&gt;/var/adm/wtmp 640 root:sys&lt;BR /&gt;/var/adm/cron/at.allow 444 bin:bin&lt;BR /&gt;/var/adm/cron/cron.allow 444 bin:bin&lt;BR /&gt;/var/spool/cron/crontabs/* 444 root:sys&lt;BR /&gt;&lt;BR /&gt;There are many more files that are suid and&lt;BR /&gt;sgid on these systems, but which&lt;BR /&gt;ones do I keep as suid and sgid??&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;BR /&gt;Michael</description>
      <pubDate>Wed, 04 Jul 2001 01:16:12 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/securing-a-system-without-using-trusted/m-p/2548576#M756700</guid>
      <dc:creator>Michael Tully</dc:creator>
      <dc:date>2001-07-04T01:16:12Z</dc:date>
    </item>
    <item>
      <title>Re: Securing a system without using 'trusted'</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/securing-a-system-without-using-trusted/m-p/2548577#M756701</link>
      <description>Hi Michael:&lt;BR /&gt;&lt;BR /&gt;Be very careful about altering set-user and set-group bits on executables provided as a part of the CORE OS (principally files in /usr and /sbin).&lt;BR /&gt;&lt;BR /&gt;Some excellent guidelines to tightening general security were recently offered and summarized by Bill Hassell in this post:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://forums.itrc.hp.com/cm/QuestionAnswer/1,1150,0x4499e7e60861d511abcd0090277a778c,00.html" target="_blank"&gt;http://forums.itrc.hp.com/cm/QuestionAnswer/1,1150,0x4499e7e60861d511abcd0090277a778c,00.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Regards!&lt;BR /&gt;&lt;BR /&gt;...JRF...</description>
      <pubDate>Wed, 04 Jul 2001 01:35:02 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/securing-a-system-without-using-trusted/m-p/2548577#M756701</guid>
      <dc:creator>James R. Ferguson</dc:creator>
      <dc:date>2001-07-04T01:35:02Z</dc:date>
    </item>
    <item>
      <title>Re: Securing a system without using 'trusted'</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/securing-a-system-without-using-trusted/m-p/2548578#M756702</link>
      <description>Many Thanks Jim, that what exactly what I was after. &lt;BR /&gt;&lt;BR /&gt;BTW Do you ever sleep??&lt;BR /&gt;&lt;BR /&gt;Thanks again!&lt;BR /&gt;Michael</description>
      <pubDate>Wed, 04 Jul 2001 02:08:36 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/securing-a-system-without-using-trusted/m-p/2548578#M756702</guid>
      <dc:creator>Michael Tully</dc:creator>
      <dc:date>2001-07-04T02:08:36Z</dc:date>
    </item>
    <item>
      <title>Re: Securing a system without using 'trusted'</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/securing-a-system-without-using-trusted/m-p/2548579#M756703</link>
      <description>If using hpterm's, ensure root users have messages turned off.  Non root users can execute commands as root by passing commands to root terminals.</description>
      <pubDate>Wed, 27 Feb 2002 15:56:31 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/securing-a-system-without-using-trusted/m-p/2548579#M756703</guid>
      <dc:creator>Will_11</dc:creator>
      <dc:date>2002-02-27T15:56:31Z</dc:date>
    </item>
    <item>
      <title>Re: Securing a system without using 'trusted'</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/securing-a-system-without-using-trusted/m-p/2548580#M756704</link>
      <description>Will,&lt;BR /&gt;&lt;BR /&gt;Is this using talk, or wall too?&lt;BR /&gt;&lt;BR /&gt;thanks,&lt;BR /&gt;mark</description>
      <pubDate>Wed, 27 Feb 2002 16:02:40 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/securing-a-system-without-using-trusted/m-p/2548580#M756704</guid>
      <dc:creator>Mark Greene_1</dc:creator>
      <dc:date>2002-02-27T16:02:40Z</dc:date>
    </item>
    <item>
      <title>Re: Securing a system without using 'trusted'</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/securing-a-system-without-using-trusted/m-p/2548581#M756705</link>
      <description>Also, lots of good info here:  &lt;A href="http://people.hp.se/stevesk/bastion11.html" target="_blank"&gt;http://people.hp.se/stevesk/bastion11.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;The document uses trusted host, but many of the suggestions there can be implemented on a non-trusted host.</description>
      <pubDate>Wed, 27 Feb 2002 16:19:34 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/securing-a-system-without-using-trusted/m-p/2548581#M756705</guid>
      <dc:creator>Eric Ladner</dc:creator>
      <dc:date>2002-02-27T16:19:34Z</dc:date>
    </item>
    <item>
      <title>Re: Securing a system without using 'trusted'</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/securing-a-system-without-using-trusted/m-p/2548582#M756706</link>
      <description>Hi michael&lt;BR /&gt;&lt;BR /&gt;what i miss in your list is to close the system also from the network side.&lt;BR /&gt;check /var/adm/inetd.sec how access from network is configured.&lt;BR /&gt;&lt;BR /&gt;cheers reinhard</description>
      <pubDate>Wed, 27 Feb 2002 16:24:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/securing-a-system-without-using-trusted/m-p/2548582#M756706</guid>
      <dc:creator>Reinhard Burger</dc:creator>
      <dc:date>2002-02-27T16:24:37Z</dc:date>
    </item>
    <item>
      <title>Re: Securing a system without using 'trusted'</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/securing-a-system-without-using-trusted/m-p/2548583#M756707</link>
      <description>I dont' know if talk or wall are affected, but these are the results when this root user had his messages turned on   "mesg y"&lt;BR /&gt;&lt;BR /&gt;user1@ServerName [/home/user1]&lt;BR /&gt;$ echo "\r shutdown -ry 0 \r\033d" &amp;gt; /dev/pts/0&lt;BR /&gt;&lt;BR /&gt;user1@ServerName [/home/user1]&lt;BR /&gt;$&lt;BR /&gt;Broadcast Message from ROOTUSER (pts/0) Fri Feb 22 12:23:28...&lt;BR /&gt;PLEASE LOG OFF NOW ! ! !&lt;BR /&gt;        System maintenance about to begin.&lt;BR /&gt;All processes will be terminated in 0 seconds.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Broadcast Message from ROOTUSER (pts/0) Fri Feb 22 12:23:28...&lt;BR /&gt;SYSTEM BEING BROUGHT DOWN NOW ! ! !&lt;BR /&gt;&lt;BR /&gt;Disconnected; connection lost (Connection closed.).&lt;BR /&gt;Connection to SERVERNAME closed.</description>
      <pubDate>Wed, 27 Feb 2002 16:27:44 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/securing-a-system-without-using-trusted/m-p/2548583#M756707</guid>
      <dc:creator>Will_11</dc:creator>
      <dc:date>2002-02-27T16:27:44Z</dc:date>
    </item>
    <item>
      <title>Re: Securing a system without using 'trusted'</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/securing-a-system-without-using-trusted/m-p/2548584#M756708</link>
      <description>Michael&lt;BR /&gt;&lt;BR /&gt;You might want to also use of the ???find??? command to search for world writeable files and directories;&lt;BR /&gt;&lt;BR /&gt;find / -perm 0007 -type d 2&amp;gt; /dev/null&lt;BR /&gt;find / -perm 0007 ???type f 2&amp;gt; /dev/null&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 27 Feb 2002 16:32:23 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/securing-a-system-without-using-trusted/m-p/2548584#M756708</guid>
      <dc:creator>Will_11</dc:creator>
      <dc:date>2002-02-27T16:32:23Z</dc:date>
    </item>
    <item>
      <title>Re: Securing a system without using 'trusted'</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/securing-a-system-without-using-trusted/m-p/2548585#M756709</link>
      <description>Michael&lt;BR /&gt;&lt;BR /&gt;Also have at look at the allow files (cron at etc) and shut them down.&lt;BR /&gt;&lt;BR /&gt;Write a small script to do an ls -l grepping from root dir and push the output to a file with 400 permissions. &lt;BR /&gt;&lt;BR /&gt;This is your baseline system file permissions/size/time file.&lt;BR /&gt;&lt;BR /&gt;Each morning (wee small hours) do the ls -l again and compare selected files for things like - new root level files, root level files wich have changed permissions / size, time stamps on system files (commands). I am sure you get my track on this.&lt;BR /&gt;&lt;BR /&gt;Mail out the results and then reset the baseline file ready for the next day, so you then have a rolling security check.&lt;BR /&gt;&lt;BR /&gt;This can then be added to by doing things like lastb root, looking at sulog.&lt;BR /&gt;&lt;BR /&gt;Paula</description>
      <pubDate>Wed, 27 Feb 2002 18:26:50 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/securing-a-system-without-using-trusted/m-p/2548585#M756709</guid>
      <dc:creator>Paula J Frazer-Campbell</dc:creator>
      <dc:date>2002-02-27T18:26:50Z</dc:date>
    </item>
    <item>
      <title>Re: Securing a system without using 'trusted'</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/securing-a-system-without-using-trusted/m-p/2548586#M756710</link>
      <description>Hi Michael,&lt;BR /&gt;&lt;BR /&gt;HP's PDF production definition files include a checksum. I use a combination of mkpdf, pdfck and pdfdiff to verify file integrity of system files such as in /usr, /sbin, /etc, /stand etc. everyday in a cron job which emails me the differences.&lt;BR /&gt;&lt;BR /&gt;Hope this helps. Regards.&lt;BR /&gt;&lt;BR /&gt;Steven Sim Kok Leong</description>
      <pubDate>Thu, 28 Feb 2002 07:34:18 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/securing-a-system-without-using-trusted/m-p/2548586#M756710</guid>
      <dc:creator>Steven Sim Kok Leong</dc:creator>
      <dc:date>2002-02-28T07:34:18Z</dc:date>
    </item>
    <item>
      <title>Re: Securing a system without using 'trusted'</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/securing-a-system-without-using-trusted/m-p/2548587#M756711</link>
      <description>Hello, I tried to access the Link which James pointed. But I'm getting Page not found error. Why is that..?&lt;BR /&gt;&lt;BR /&gt;-USA&lt;BR /&gt;</description>
      <pubDate>Thu, 28 Feb 2002 20:18:35 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/securing-a-system-without-using-trusted/m-p/2548587#M756711</guid>
      <dc:creator>Uday_S_Ankolekar</dc:creator>
      <dc:date>2002-02-28T20:18:35Z</dc:date>
    </item>
    <item>
      <title>Re: Securing a system without using 'trusted'</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/securing-a-system-without-using-trusted/m-p/2548588#M756712</link>
      <description>Here is a listing of the suid/sgid after a cold install:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://newfdog.hpwebhost.com/uptodatelistings/" target="_blank"&gt;http://newfdog.hpwebhost.com/uptodatelistings/&lt;/A&gt;</description>
      <pubDate>Thu, 28 Feb 2002 22:00:48 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/securing-a-system-without-using-trusted/m-p/2548588#M756712</guid>
      <dc:creator>Chris Wong</dc:creator>
      <dc:date>2002-02-28T22:00:48Z</dc:date>
    </item>
    <item>
      <title>Re: Securing a system without using 'trusted'</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/securing-a-system-without-using-trusted/m-p/2548589#M756713</link>
      <description>I also am getting a 404 on JRF's URL.&lt;BR /&gt;&lt;BR /&gt;Jeff</description>
      <pubDate>Thu, 28 Feb 2002 22:18:32 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/securing-a-system-without-using-trusted/m-p/2548589#M756713</guid>
      <dc:creator>Jeff Schussele</dc:creator>
      <dc:date>2002-02-28T22:18:32Z</dc:date>
    </item>
    <item>
      <title>Re: Securing a system without using 'trusted'</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/securing-a-system-without-using-trusted/m-p/2548590#M756714</link>
      <description>Thanks to all who have replied and kept replying. This post has been dead and buried for some time. No more posts please.&lt;BR /&gt;&lt;BR /&gt;Thanks</description>
      <pubDate>Fri, 01 Mar 2002 04:19:31 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/securing-a-system-without-using-trusted/m-p/2548590#M756714</guid>
      <dc:creator>Michael Tully</dc:creator>
      <dc:date>2002-03-01T04:19:31Z</dc:date>
    </item>
    <item>
      <title>Re: Securing a system without using 'trusted'</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/securing-a-system-without-using-trusted/m-p/2548591#M756715</link>
      <description>A great document this checklist is used by auditing software, such as PentaSafe, and by auditors.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.auscert.org.au/Information/Auscert_info/Papers/usc20.html" target="_blank"&gt;http://www.auscert.org.au/Information/Auscert_info/Papers/usc20.html&lt;/A&gt;</description>
      <pubDate>Fri, 01 Mar 2002 10:34:55 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/securing-a-system-without-using-trusted/m-p/2548591#M756715</guid>
      <dc:creator>Alan Casey</dc:creator>
      <dc:date>2002-03-01T10:34:55Z</dc:date>
    </item>
  </channel>
</rss>

