- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- Re: Auditing on HP-UX 11.0
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-28-2001 01:39 PM
03-28-2001 01:39 PM
Auditing on HP-UX 11.0
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-28-2001 02:10 PM
03-28-2001 02:10 PM
Re: Auditing on HP-UX 11.0
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-28-2001 11:20 PM
03-28-2001 11:20 PM
Re: Auditing on HP-UX 11.0
I'd say revoke root privileges and ONLY allow specific users to perform duties requiring root privileges using "sudo".
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-29-2001 12:22 AM
03-29-2001 12:22 AM
Re: Auditing on HP-UX 11.0
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-30-2001 09:15 AM
03-30-2001 09:15 AM
Re: Auditing on HP-UX 11.0
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-30-2001 01:32 PM
03-30-2001 01:32 PM
Re: Auditing on HP-UX 11.0
Here are some sitres on RCS:
http://www.gnu.org/directory/rcs.html
http://www.gnu.org/directory/cvs.html
Here is an article from SysAdmin Magazine on setting up Web/RCS to work with Oracle. It should still be informative for you, even if you aren't running Oracle.
http://www.sysadminmag.com/articles/2000/0002/0002a/0002a.htm
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-04-2001 06:26 AM
04-04-2001 06:26 AM
Re: Auditing on HP-UX 11.0
I would recommend two things:
1) disable remote root commands
2) use sudo for all root access. It's available at a number of places, but you should start by going to:
http://www.courtesan.com/sudo/index.html
and reading up on it.
To elaborate a bit. Regarding remote root commands, unless the remote system (and it's administrative staff) is *completely trusted*. This is a very risky thing to do. I assume you allow this using the "R" commands (rsh, rlogin, rexec, etc.). These do no authentication at all other than that the request came from root on some remote system. You can restrict this a bit using /var/adm/inetd.sec to control (any) services that are run from /etc/inetd.conf (similar to tcp_wrapper which is available for all UNIX systems and is also another *essential* security tool) but it is still very risky.
As to "sudo", it allows very fine grained control over which user can run what command(s) on which system(s) as which user. Really, do check it out. It might address a lot of your issues with both logging *and* remote comands as well if it were used on the remote systems too. Command logging is done via syslog (using local2 by default) and thus can be forwarded to a central loghost if you run it on a number of systems.
CAVEATS:
Do not give any root sudo privs to someone you would not trust with root. Period.
Do not assume there are no other ways of running root commands (especially since syslog can be stopped/restarted pretty easily to hide the audit trail)
Do not attempt to ram this one down your administrators throats. Introduce it slowly and gain some strong converts in the admin staff before rolling it out fully. Ask the best admin to help you set it up and "try" using it for a week or so (while still allowing root login or "su"). Once you have some strong allies (and have worked out your local site specific gotchas) then you can restrict who has the root password/can "su".
GOTCHAS
sudo command - runs "command as root
sudo command > file - writes to "file" as you (not root)
sudo command1 | command2 - runs command1 as root and command2 as you. If you need to pipe commands together do:
sudo command1 | sudo command2
Good Luck!!
Jim