<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Security Best Practices in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/security-best-practices/m-p/2519890#M758530</link>
    <description>Hi&lt;BR /&gt;&lt;BR /&gt;With multiple root users a way to track what they are doings is by putting an entry into roots .profile as such:-&lt;BR /&gt;&lt;BR /&gt;# Who logged in (From where)              &lt;BR /&gt;        date &amp;gt;&amp;gt; ~/.sh_history             &lt;BR /&gt;        who -u|grep root &amp;gt;&amp;gt; ~/.sh_history&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Which will put time, date and from the who command will identify the ip address of their login.&lt;BR /&gt;&lt;BR /&gt;To look at what was done vi .sh_history and search for date:-&lt;BR /&gt;&lt;BR /&gt;/May  1&lt;BR /&gt;&lt;BR /&gt;Tue May  1 00:06:20 BST 2001                                    &lt;BR /&gt;root-gdr   pts/tr       May  1 00:06   .     7269  172.20.1.138 &lt;BR /&gt;crontab -e                                                      &lt;BR /&gt;&lt;BR /&gt;Shows that root user GDR loggied it at 00:06 hours from an in house ip address and could have edited the crontab.&lt;BR /&gt;&lt;BR /&gt;DO NOT save the .sh_history on exit as current entries will be lost.&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;&lt;BR /&gt;Paula&lt;BR /&gt;</description>
    <pubDate>Tue, 01 May 2001 09:45:18 GMT</pubDate>
    <dc:creator>Paula J Frazer-Campbell</dc:creator>
    <dc:date>2001-05-01T09:45:18Z</dc:date>
    <item>
      <title>Security Best Practices</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-best-practices/m-p/2519881#M758521</link>
      <description>We are involved in a security review, in particular the use of root and other super user access to the systems.  Does anyone know of any whitepapers, etc. that has information of best practices.&lt;BR /&gt;&lt;BR /&gt;I have seen numerous articles on other aspects of security, but not this.&lt;BR /&gt;&lt;BR /&gt;Your advice will be appreciated.&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;&lt;BR /&gt;Jo</description>
      <pubDate>Mon, 23 Apr 2001 00:03:45 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-best-practices/m-p/2519881#M758521</guid>
      <dc:creator>Joanne Keegan</dc:creator>
      <dc:date>2001-04-23T00:03:45Z</dc:date>
    </item>
    <item>
      <title>Re: Security Best Practices</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-best-practices/m-p/2519882#M758522</link>
      <description>Some of my ideas to share with you.&lt;BR /&gt;&lt;BR /&gt;- root needs to be accountable, this mean only ONE person will know its password and who is responsible for it.&lt;BR /&gt;&lt;BR /&gt;- seal the root password onto an envelop and give it to your boss for emergency situations which the root user cannot be reached, this envelop should be updated every time the root password being changed.&lt;BR /&gt;&lt;BR /&gt;- establish a policy to change root password periodically, say, every 3 months.&lt;BR /&gt;&lt;BR /&gt;- if other people needed to run root specific commands, setup sudo for this and grant only minimum authority.&lt;BR /&gt;&lt;BR /&gt;- disallow straight login to root by setting up /etc/securetty with single test line "console".&lt;BR /&gt;&lt;BR /&gt;Rgds,&lt;BR /&gt;Philip</description>
      <pubDate>Mon, 23 Apr 2001 00:38:59 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-best-practices/m-p/2519882#M758522</guid>
      <dc:creator>Philip Chan_1</dc:creator>
      <dc:date>2001-04-23T00:38:59Z</dc:date>
    </item>
    <item>
      <title>Re: Security Best Practices</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-best-practices/m-p/2519883#M758523</link>
      <description>Jo,&lt;BR /&gt;&lt;BR /&gt;have a look at the following link. It is for HP-UX Online Internet Training in a virtual classroom. HP-UX Security Course is near the bottom. Cost is low ($129 US) relative to OpenView in New Orleans, but don't let the boss know! I have tested the virtual classroom and it works on my laptop (You may have to get some security turned off on the firewall to use this on JetStream).&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://education.itresourcecenter.hp.com/Trainer/education/productlist.asp?comm=7" target="_blank"&gt;http://education.itresourcecenter.hp.com/Trainer/education/productlist.asp?comm=7&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;I could have turned around and talked to you about this, but this is heaps more fun. FRED</description>
      <pubDate>Mon, 23 Apr 2001 02:52:54 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-best-practices/m-p/2519883#M758523</guid>
      <dc:creator>FRED Dennison</dc:creator>
      <dc:date>2001-04-23T02:52:54Z</dc:date>
    </item>
    <item>
      <title>Re: Security Best Practices</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-best-practices/m-p/2519884#M758524</link>
      <description>Hi&lt;BR /&gt;&lt;BR /&gt;This white paper will help:-&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://people.hp.se/stevesk/bastion11.html" target="_blank"&gt;http://people.hp.se/stevesk/bastion11.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Paula</description>
      <pubDate>Mon, 23 Apr 2001 06:43:43 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-best-practices/m-p/2519884#M758524</guid>
      <dc:creator>Paula J Frazer-Campbell</dc:creator>
      <dc:date>2001-04-23T06:43:43Z</dc:date>
    </item>
    <item>
      <title>Re: Security Best Practices</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-best-practices/m-p/2519885#M758525</link>
      <description>Also keep in mind that network services can (and should) be run as non-root users where possible. Best examples are:&lt;BR /&gt;&lt;BR /&gt;* BIND (runs as root per default, but can run chrooted as non-privileged user)&lt;BR /&gt;&lt;BR /&gt;* sendmail (runs as root -- but can be replaced by Postfix, which doesn't run as root and which can run chrooted)&lt;BR /&gt;</description>
      <pubDate>Mon, 23 Apr 2001 08:48:46 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-best-practices/m-p/2519885#M758525</guid>
      <dc:creator>Ralf Hildebrandt</dc:creator>
      <dc:date>2001-04-23T08:48:46Z</dc:date>
    </item>
    <item>
      <title>Re: Security Best Practices</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-best-practices/m-p/2519886#M758526</link>
      <description>See &lt;A href="http://docs.hp.com/cgi-bin/fsearch/framedisplay?top=/hpux/onlinedocs/B2355-90701/B2355-90701_top.html&amp;amp;con=/hpux/onlinedocs/B2355-90701/00/00/60-con.html&amp;amp;toc=/hpux/onlinedocs/B2355-90701/00/00/60-toc.html&amp;amp;searchterms=security&amp;amp;queryid=20010423-033035" target="_blank"&gt;http://docs.hp.com/cgi-bin/fsearch/framedisplay?top=/hpux/onlinedocs/B2355-90701/B2355-90701_top.html&amp;amp;con=/hpux/onlinedocs/B2355-90701/00/00/60-con.html&amp;amp;toc=/hpux/onlinedocs/B2355-90701/00/00/60-toc.html&amp;amp;searchterms=security&amp;amp;queryid=20010423-033035&lt;/A&gt;</description>
      <pubDate>Mon, 23 Apr 2001 09:30:22 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-best-practices/m-p/2519886#M758526</guid>
      <dc:creator>Vincenzo Restuccia</dc:creator>
      <dc:date>2001-04-23T09:30:22Z</dc:date>
    </item>
    <item>
      <title>Re: Security Best Practices</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-best-practices/m-p/2519887#M758527</link>
      <description>Thank-you for the responses so far.  I will award points in the next couple of days.&lt;BR /&gt;&lt;BR /&gt;Paula, thanks for the whitepaper.  I will have a close look at it.&lt;BR /&gt;&lt;BR /&gt;We run a large site with several sys admins which makes it hard to restrict the use of root especially when we take turns at callout.  I was wondering if there is someone in a similiar situation and what steps they may have taken to tighten up security.&lt;BR /&gt;&lt;BR /&gt;I'm looking for ways to improve what we already have in place.  (I'm relatively new to this site - and of course take security quite seriously).&lt;BR /&gt;&lt;BR /&gt;Thanks everybody who have responded so far to this question.&lt;BR /&gt;&lt;BR /&gt;Jo</description>
      <pubDate>Mon, 23 Apr 2001 20:47:16 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-best-practices/m-p/2519887#M758527</guid>
      <dc:creator>Joanne Keegan</dc:creator>
      <dc:date>2001-04-23T20:47:16Z</dc:date>
    </item>
    <item>
      <title>Re: Security Best Practices</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-best-practices/m-p/2519888#M758528</link>
      <description>Hi&lt;BR /&gt;&lt;BR /&gt;We used the bastion11 checklist as the foundation for tightening up a system.  For root, I asked the same question on how to restrict - here is the thread:&lt;BR /&gt;&lt;A href="http://forums.itrc.hp.com/cm/QuestionAnswer/1,1150,0xaf7e37f45ef7d4118fef0090279cd0f9,00.html" target="_blank"&gt;http://forums.itrc.hp.com/cm/QuestionAnswer/1,1150,0xaf7e37f45ef7d4118fef0090279cd0f9,00.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Here are the excerpts from that thread that might help...&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;There is now way that I know of to restrict the su capability that is native to HP-UX. The easiest thing that comes to mind is just not giving out the password. If you don't want them to do a 'su -' then why give them the password? &lt;BR /&gt;&lt;BR /&gt;Another option you have though is to use the product called 'sudo'. You can get it from the HP-UX Porting center. Here is a link to it: &lt;BR /&gt;&lt;A href="http://www.courtesan.com/sudo" target="_blank"&gt;http://www.courtesan.com/sudo&lt;/A&gt; &lt;BR /&gt;&lt;BR /&gt;Sudo allows you to set people up with the capability to run things with root capability without having to give out the root password or give out full 'su -' access. &lt;BR /&gt;&lt;BR /&gt;sudo is a way to limit who has root access. In the sudoers file you can have something like the line below to prevent root access; &lt;BR /&gt;&lt;BR /&gt;Cmnd_Alias SU=/usr/bin/su, !/usr/bin/su *root*, !/usr/bin/su "",!/usr/bin/su - &lt;BR /&gt;&lt;BR /&gt;Also, I have put in something for rlogin as well. If you are root one one system and do rlogin to another system, you are root on the other system as well. &lt;BR /&gt;&lt;BR /&gt;The above Cmnd_Alias will prevent specified users from becoming UID=0 unless they are in the sudoers file as having the rights to UID=0. &lt;BR /&gt;&lt;BR /&gt;regards,&lt;BR /&gt;~pf&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 23 Apr 2001 22:49:55 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-best-practices/m-p/2519888#M758528</guid>
      <dc:creator>Peggy Fong</dc:creator>
      <dc:date>2001-04-23T22:49:55Z</dc:date>
    </item>
    <item>
      <title>Re: Security Best Practices</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-best-practices/m-p/2519889#M758529</link>
      <description>Thanks to all that have replied so far.  The information has been invaluable.  I will finish assigning points in a couple of days (Paula &amp;amp; Peggy).&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;&lt;BR /&gt;Jo</description>
      <pubDate>Tue, 24 Apr 2001 03:22:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-best-practices/m-p/2519889#M758529</guid>
      <dc:creator>Joanne Keegan</dc:creator>
      <dc:date>2001-04-24T03:22:30Z</dc:date>
    </item>
    <item>
      <title>Re: Security Best Practices</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-best-practices/m-p/2519890#M758530</link>
      <description>Hi&lt;BR /&gt;&lt;BR /&gt;With multiple root users a way to track what they are doings is by putting an entry into roots .profile as such:-&lt;BR /&gt;&lt;BR /&gt;# Who logged in (From where)              &lt;BR /&gt;        date &amp;gt;&amp;gt; ~/.sh_history             &lt;BR /&gt;        who -u|grep root &amp;gt;&amp;gt; ~/.sh_history&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Which will put time, date and from the who command will identify the ip address of their login.&lt;BR /&gt;&lt;BR /&gt;To look at what was done vi .sh_history and search for date:-&lt;BR /&gt;&lt;BR /&gt;/May  1&lt;BR /&gt;&lt;BR /&gt;Tue May  1 00:06:20 BST 2001                                    &lt;BR /&gt;root-gdr   pts/tr       May  1 00:06   .     7269  172.20.1.138 &lt;BR /&gt;crontab -e                                                      &lt;BR /&gt;&lt;BR /&gt;Shows that root user GDR loggied it at 00:06 hours from an in house ip address and could have edited the crontab.&lt;BR /&gt;&lt;BR /&gt;DO NOT save the .sh_history on exit as current entries will be lost.&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;&lt;BR /&gt;Paula&lt;BR /&gt;</description>
      <pubDate>Tue, 01 May 2001 09:45:18 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-best-practices/m-p/2519890#M758530</guid>
      <dc:creator>Paula J Frazer-Campbell</dc:creator>
      <dc:date>2001-05-01T09:45:18Z</dc:date>
    </item>
    <item>
      <title>Re: Security Best Practices</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-best-practices/m-p/2519891#M758531</link>
      <description>Paula,&lt;BR /&gt;&lt;BR /&gt;Thanks for that.  Your suggestion is a good idea.&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;&lt;BR /&gt;Jo</description>
      <pubDate>Tue, 01 May 2001 22:34:52 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-best-practices/m-p/2519891#M758531</guid>
      <dc:creator>Joanne Keegan</dc:creator>
      <dc:date>2001-05-01T22:34:52Z</dc:date>
    </item>
    <item>
      <title>Re: Security Best Practices</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-best-practices/m-p/2519892#M758532</link>
      <description>Hi Joanne&lt;BR /&gt;&lt;BR /&gt;You are most welcome, and BTW welcome to the forum.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;;-)   Paula</description>
      <pubDate>Sun, 06 May 2001 12:00:55 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-best-practices/m-p/2519892#M758532</guid>
      <dc:creator>Paula J Frazer-Campbell</dc:creator>
      <dc:date>2001-05-06T12:00:55Z</dc:date>
    </item>
    <item>
      <title>Re: Security Best Practices</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-best-practices/m-p/2519893#M758533</link>
      <description>hi,&lt;BR /&gt;just want to add that we use a history file per tty logged on ($HOME/.sh_history_xx).  So if more than one root is logged on, their commands don't get mixed up in the history file.&lt;BR /&gt;If you want to use the history file for security check you might want to apply this too; otherwise if more than one root is logged on, you won't know who did what.&lt;BR /&gt;regards,&lt;BR /&gt;Thierry.</description>
      <pubDate>Sun, 06 May 2001 15:35:05 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-best-practices/m-p/2519893#M758533</guid>
      <dc:creator>Thierry Poels_1</dc:creator>
      <dc:date>2001-05-06T15:35:05Z</dc:date>
    </item>
  </channel>
</rss>

