<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: HPUX Securtity in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/hpux-securtity/m-p/2856814#M94941</link>
    <description>NIS means: unsecure passwords, that is, the encrypted password is broadcast across the network by the NIS server, which is in total opposition to the concept of a Trusted System (shadow password file). So changing to a Trusted system will completely disable NIS for that box.&lt;BR /&gt;&lt;BR /&gt;So you don't want NIS in any secure environment. (there is NIS+ which can coexist with Trusted Systems but it is a big pain to manage and every NIS client must support NIS+ as NIS clients are incompatible with NIS+).&lt;BR /&gt;&lt;BR /&gt;I know of no SAP requirement to have different user logins share a single UID. Must be an application problem. Any security specialist will tell you that duplicate logins for a single UID is bad.</description>
    <pubDate>Wed, 04 Dec 2002 03:07:25 GMT</pubDate>
    <dc:creator>Bill Hassell</dc:creator>
    <dc:date>2002-12-04T03:07:25Z</dc:date>
    <item>
      <title>HPUX Securtity</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hpux-securtity/m-p/2856806#M94933</link>
      <description>How do you secure your HPUX servers?  We have several HPUX servers (D-, K- and N-class servers).  &lt;BR /&gt;&lt;BR /&gt;We know about secure shell and trusted systems.  What third-party products are people using to secure HPUX?  We do a lot of file transfers to/from mainframe and NT platforms, as well as between our UNIX servers.&lt;BR /&gt;&lt;BR /&gt;Thanks for you help&lt;BR /&gt;jls</description>
      <pubDate>Tue, 03 Dec 2002 20:45:19 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hpux-securtity/m-p/2856806#M94933</guid>
      <dc:creator>Joel Shank</dc:creator>
      <dc:date>2002-12-03T20:45:19Z</dc:date>
    </item>
    <item>
      <title>Re: HPUX Securtity</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hpux-securtity/m-p/2856807#M94934</link>
      <description>&lt;BR /&gt;It depends upon how secure you have to make them. Are any of these servers internet facing? Are you using a "trusted" network?&lt;BR /&gt;&lt;BR /&gt;Some things come to mind:&lt;BR /&gt;&lt;BR /&gt;ldap/NIS+ for unix&lt;BR /&gt;ldap/ad for M$ stuff&lt;BR /&gt;&lt;BR /&gt;bastille hosts: &lt;A href="http://forums.itrc.hp.com/cm/QuestionAnswer/1,,0x4f9793e260b0d611abdb0090277a778c,00.html" target="_blank"&gt;http://forums.itrc.hp.com/cm/QuestionAnswer/1,,0x4f9793e260b0d611abdb0090277a778c,00.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;to secure NT's -&amp;gt; power them off :-))&lt;BR /&gt;&lt;BR /&gt;live free or die&lt;BR /&gt;harry&lt;BR /&gt;</description>
      <pubDate>Tue, 03 Dec 2002 20:56:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hpux-securtity/m-p/2856807#M94934</guid>
      <dc:creator>harry d brown jr</dc:creator>
      <dc:date>2002-12-03T20:56:15Z</dc:date>
    </item>
    <item>
      <title>Re: HPUX Securtity</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hpux-securtity/m-p/2856808#M94935</link>
      <description>Hello,&lt;BR /&gt;&lt;BR /&gt;Other than SSH and TCP wrappers, we do not use any other 3rd party products.  From our standpoint,increasing security is through reduction of permissions of files/directories and the turning off of certian services ( remote services, snmp, etc).  Also, keeping up to date with the various secrity patches also aids with this.  You may want to look into the security_patch_check utility:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=B6834AA" target="_blank"&gt;http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=B6834AA&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Hope this helps&lt;BR /&gt;&lt;BR /&gt;Chris</description>
      <pubDate>Tue, 03 Dec 2002 21:08:14 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hpux-securtity/m-p/2856808#M94935</guid>
      <dc:creator>Christopher McCray_1</dc:creator>
      <dc:date>2002-12-03T21:08:14Z</dc:date>
    </item>
    <item>
      <title>Re: HPUX Securtity</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hpux-securtity/m-p/2856809#M94936</link>
      <description>None of these servers are internet facing.  We currently are not using trusted systems, but will probably implement that soon.  We are using Service Guard, and at one time you couldn't run SG with trusted systems.  Now I understand you can.&lt;BR /&gt;&lt;BR /&gt;We are also running SAP and I think I'll have trouble using NIS with SAP because SAP requires several different userids with the same UID (or that is what my BASIS folks tell me).&lt;BR /&gt;&lt;BR /&gt;I am not looking to hardening these servers.  Just keeping passwords from being sent over the network in clear text, and things like that.  I'm also looking for somethng that will be easy to implement and transparent to use (I hope).&lt;BR /&gt;&lt;BR /&gt;jls</description>
      <pubDate>Tue, 03 Dec 2002 21:13:26 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hpux-securtity/m-p/2856809#M94936</guid>
      <dc:creator>Joel Shank</dc:creator>
      <dc:date>2002-12-03T21:13:26Z</dc:date>
    </item>
    <item>
      <title>Re: HPUX Securtity</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hpux-securtity/m-p/2856810#M94937</link>
      <description>Hello,&lt;BR /&gt;&lt;BR /&gt;Yes, serviceGuard works very well with trusted systems:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://forums.itrc.hp.com/cm/QuestionAnswer/1,,0x25f2cdec06f1d61190050090279cd0f9,00.html" target="_blank"&gt;http://forums.itrc.hp.com/cm/QuestionAnswer/1,,0x25f2cdec06f1d61190050090279cd0f9,00.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Secure shell will relive you of your worries of passwds passed in clear text.  &lt;BR /&gt;&lt;BR /&gt;Remember, the security needs of your environment are determined by the applications you run and their ability to do so.  You don't want to secure yourself out of productivity.&lt;BR /&gt;&lt;BR /&gt;Chris</description>
      <pubDate>Tue, 03 Dec 2002 21:21:05 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hpux-securtity/m-p/2856810#M94937</guid>
      <dc:creator>Christopher McCray_1</dc:creator>
      <dc:date>2002-12-03T21:21:05Z</dc:date>
    </item>
    <item>
      <title>Re: HPUX Securtity</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hpux-securtity/m-p/2856811#M94938</link>
      <description>Something to look at is SSH to keep passwords from being clear text on the LAN. &lt;BR /&gt;&lt;BR /&gt;Other things like a /etc/securetty file to keep root from logging on except from the console, thereby forcing root users to loging as themselves and su to root. &lt;BR /&gt;&lt;BR /&gt;Enable trusted and enforce nontrivial passwords and expire them periodically, like every 60 days. &lt;BR /&gt;&lt;BR /&gt;Use /etc/ftpusers and put accounts like root bin sys adm www etc in there.&lt;BR /&gt;&lt;BR /&gt;We use SecurID here for passwords. That is a hardware software solution where every user gets a SecurID card and a pin number. The SecurID card has a random 6 digit number that changes every 60 seconds so the password would be the pin number followed by the SecurID number. Very secure as the passwords change every sixty seconds and it enforces single use on the password. So even if someone sniffed the password it will only work once.&lt;BR /&gt;&lt;BR /&gt;By far the easiest and cheapest solution is the trusted system approach with non trivial passwords that expire every 45 or 60 days. Other than that remember that the only really secure system is one that is powered off.&lt;BR /&gt;</description>
      <pubDate>Tue, 03 Dec 2002 21:43:26 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hpux-securtity/m-p/2856811#M94938</guid>
      <dc:creator>John Dvorchak</dc:creator>
      <dc:date>2002-12-03T21:43:26Z</dc:date>
    </item>
    <item>
      <title>Re: HPUX Securtity</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hpux-securtity/m-p/2856812#M94939</link>
      <description>Hi Joel,&lt;BR /&gt;&lt;BR /&gt;Other things to do are only allow RPC services that are required. Either limit access (inetd.sec) that are required to those users/hosts/subnets that need it or turn off (inetd.conf) services not required (nfs,tftp,finger,ntalk,ident,etc.)&lt;BR /&gt;&lt;BR /&gt;Also setup ftp, sendmail &amp;amp; telnet banners with legal notices to protect the company in the event of unauthorized access or attempt.&lt;BR /&gt;&lt;BR /&gt;Turn off anonymous ftp as well as turn on the novrfy &amp;amp; noexpn privacy options in sendmail.&lt;BR /&gt;&lt;BR /&gt;And most importantly stay current on security related patches.&lt;BR /&gt;&lt;BR /&gt;And it never hurts to run internal security checks against the server on a regular basis to verify just what is/isn't hardened.&lt;BR /&gt;&lt;BR /&gt;Rgds,&lt;BR /&gt;Jeff&lt;BR /&gt;</description>
      <pubDate>Tue, 03 Dec 2002 21:53:41 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hpux-securtity/m-p/2856812#M94939</guid>
      <dc:creator>Jeff Schussele</dc:creator>
      <dc:date>2002-12-03T21:53:41Z</dc:date>
    </item>
    <item>
      <title>Re: HPUX Securtity</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hpux-securtity/m-p/2856813#M94940</link>
      <description>If you are looking for 3rd party products, Computer Associates has a security suite called eTrust.  &lt;BR /&gt;&lt;BR /&gt;I am not sure about the price, but most of what they have there can be done through non-cost products, if you have the time and do not care about nells and whistles.&lt;BR /&gt;&lt;BR /&gt;Hope it helps&lt;BR /&gt;&lt;BR /&gt;John</description>
      <pubDate>Tue, 03 Dec 2002 22:09:33 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hpux-securtity/m-p/2856813#M94940</guid>
      <dc:creator>John Payne_2</dc:creator>
      <dc:date>2002-12-03T22:09:33Z</dc:date>
    </item>
    <item>
      <title>Re: HPUX Securtity</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hpux-securtity/m-p/2856814#M94941</link>
      <description>NIS means: unsecure passwords, that is, the encrypted password is broadcast across the network by the NIS server, which is in total opposition to the concept of a Trusted System (shadow password file). So changing to a Trusted system will completely disable NIS for that box.&lt;BR /&gt;&lt;BR /&gt;So you don't want NIS in any secure environment. (there is NIS+ which can coexist with Trusted Systems but it is a big pain to manage and every NIS client must support NIS+ as NIS clients are incompatible with NIS+).&lt;BR /&gt;&lt;BR /&gt;I know of no SAP requirement to have different user logins share a single UID. Must be an application problem. Any security specialist will tell you that duplicate logins for a single UID is bad.</description>
      <pubDate>Wed, 04 Dec 2002 03:07:25 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hpux-securtity/m-p/2856814#M94941</guid>
      <dc:creator>Bill Hassell</dc:creator>
      <dc:date>2002-12-04T03:07:25Z</dc:date>
    </item>
    <item>
      <title>Re: HPUX Securtity</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hpux-securtity/m-p/2856815#M94942</link>
      <description>A few ideas:&lt;BR /&gt;&lt;BR /&gt;You can employ sudo to allow people to have limited access to commands.&lt;BR /&gt;&lt;BR /&gt;Another favourite of mine is to use aliases to redefine some commands - for example to prevent certain users from accessing commands that you don't want them to, set up aliases in their .profile (or whatever file is relevant) so that the commands actually just run /bin/true &lt;BR /&gt;&lt;BR /&gt;The best way I've found to implement this is to define &lt;BR /&gt;ENV=$HOME/.kshrc in /etc/profile, then to add in the aliases in their .kshrc file so that the aliases apply even if they run a shell from within another command (eg. from vi).&lt;BR /&gt;&lt;BR /&gt;It's often stated that most security breaches come from inside your own organisation (apart from anything else, the people there will probably have some access to your systems anyway, and in some cases they will have a reasonable grasp of IT).  If you can, lock your users into a menu system, rather than giving them command line access.  &lt;BR /&gt;&lt;BR /&gt;For accounts that only need FTP access, set their shell to /bin/false so that they can't get command line access.&lt;BR /&gt;&lt;BR /&gt;Use the restricted shells to allow limited access to the systems, rather than full shells.&lt;BR /&gt;&lt;BR /&gt;Carry our regular audits of sulog, last and lastb output etc.  You can't easily prevent things if you don't know they're going on.</description>
      <pubDate>Wed, 04 Dec 2002 09:56:02 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hpux-securtity/m-p/2856815#M94942</guid>
      <dc:creator>Chris Wilshaw</dc:creator>
      <dc:date>2002-12-04T09:56:02Z</dc:date>
    </item>
    <item>
      <title>Re: HPUX Securtity</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hpux-securtity/m-p/2856816#M94943</link>
      <description>Hi jls,&lt;BR /&gt;&lt;BR /&gt;how about using "IPFilter/9000" to block off all unwanted access from the network (or even TO the network), including portscans?&lt;BR /&gt;&lt;BR /&gt;FWIW,&lt;BR /&gt;Wodisch&lt;BR /&gt;</description>
      <pubDate>Wed, 04 Dec 2002 18:19:12 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hpux-securtity/m-p/2856816#M94943</guid>
      <dc:creator>Wodisch</dc:creator>
      <dc:date>2002-12-04T18:19:12Z</dc:date>
    </item>
  </channel>
</rss>

