- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- how to chk HP unix svr
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-17-2004 02:27 PM
02-17-2004 02:27 PM
how to chk HP unix svr
I have an external vendor bringing in their pre-configure HP server for proof of concept testing. How do I screen their server for any possible security issues that might compromise our network and system, e.g. viruses, snooping, software scanning of network/system ports or protocol. The external vendor is a new vendor for our company
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-17-2004 02:46 PM
02-17-2004 02:46 PM
Re: how to chk HP unix svr
There are open source versions, here is a corporate web site.
I use the free version to test security on my 9000 servers.
http://www.saintcorporation.com/products/saint_engine.html
Also, from HP:
Bastille:
http://software.hp.com/portal/swdepot/displayProductInfo.do?productNumber=B6849AA
You install it, run it in X and it checks and improves security on the fly. If it finds too much the setup wasn't too secure.
It also includes the product Security Patch Check which also includes basic security probing.
http://software.hp.com/portal/swdepot/displayProductInfo.do?productNumber=B6834AA
SEP
Owner of ISN Corporation
http://isnamerica.com
http://hpuxconsulting.com
Sponsor: http://hpux.ws
Twitter: http://twitter.com/hpuxlinux
Founder http://newdatacloud.com
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-17-2004 04:09 PM
02-17-2004 04:09 PM
Re: how to chk HP unix svr
Viruses are ruled out in Unix environment,
check for SNMP,samba and apache (must be disabled)
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-17-2004 06:08 PM
02-17-2004 06:08 PM
Re: how to chk HP unix svr
Viruses No way in Unix systems.
use HP Bastille other issues.
Sunil
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-17-2004 06:15 PM
02-17-2004 06:15 PM
Re: how to chk HP unix svr
My intention is to determine if the svr brought in by external vendor pose any security risk to our network and system e.g. probing s/w running in their svr, packet spraying, etc..etc.
Any guide lines on what cfg files to chk, type of processes to look out for, etc....
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-17-2004 08:01 PM
02-17-2004 08:01 PM
Re: how to chk HP unix svr
To scan for unwanted software on the system that sniff's etc.. can be a hard job.
What you can do is first check swlist (but you will not find all software installed if it's hacking stuff)
Check also all the processes running on theis system (ps -ef | more) and see if unclear binaries are running on this system.
Check netstat -an for unwanted connections etc...
Their will lots more to check but this is a start.
HTH,
Peter
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-18-2004 01:28 AM
02-18-2004 01:28 AM
Re: how to chk HP unix svr
Some tools you might want to use:
1) Nessus
- at http://www.nessus.org
- by far the best opensource network vulnerability scanner I know
2) CIS security benchmark tools
- at http://www.cisecurity.org
- comprehensive
Hope this helps. Regards.
Steven Sim Kok Leong
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-18-2004 12:36 PM
02-18-2004 12:36 PM
Re: how to chk HP unix svr
I'd keep them off of your network if at all possible, as tracking snooping is extremely difficult absent a sniffer or putting them behind a firewall.
You might want to check thier /var/adm/inetd.sec file to see how they'e set-up security on their system. Also, see what services they've enabled - do both tasks prior to connecting them to your network.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-19-2004 04:11 AM
02-19-2004 04:11 AM
Re: how to chk HP unix svr
A cheaper alternative is to install ipfilter and log and/or block all outgoing connections except the ones explicitly needed. This doesn't stop someone from hacking the kernel (the previous option could) but it may be helpful and easier to deploy.
A few other things you can do as sanity tests:
swverify can do a basic check to tell you if the IPD matches installed software, including timestamps.
Stretching here...don't know if this would actually work but it would be thorough:
Configure a system with the same OE/patches/software the vendor chose. Then mount up their disk on that box (so you're running a trusted kernel) and do a dircmp between the two. This will probably generate lots of noise, but if you can explain all the differences, then you can be pretty confident.
Ideally, over time you'll build enough trust in this vendor that you don't have to go through this kind of work.
hope that helps.
-Keith