- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- How to secure HP-UX 11.0 to prevent people from ge...
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-24-2003 06:33 AM
10-24-2003 06:33 AM
However, once on the server, they can easily telnet off of it and communicate with other servers they are not supposed to have access to. How do I prevent this?
The contractors will be administering the Oracle instance. The Oracle binaries and data are located off of root (/), so a chroot environment will not work unless I move all the Oracle files. And Im not sure that would work anyway. As DBAs they need considerable access to the box.
I thought of locally restricting /usr/bin/telnet, /usr/bin/ftp, etc., using file level permissions. But I cannot restrict ftpd, as the contractor will need to ftp files TO the server, and it is trivial for them to ftp up their own copy of telnet.
any suggestions?
Solved! Go to Solution.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-24-2003 06:38 AM
10-24-2003 06:38 AM
SolutionI'm attaching mine. This will require your contractors to first log into your network to connect, preventing the idle internet predator.
See attached example.
SEP
Owner of ISN Corporation
http://isnamerica.com
http://hpuxconsulting.com
Sponsor: http://hpux.ws
Twitter: http://twitter.com/hpuxlinux
Founder http://newdatacloud.com
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-24-2003 06:41 AM
10-24-2003 06:41 AM
Re: How to secure HP-UX 11.0 to prevent people from getting off of it?
Hopefully someone has a quick solution to your current problem.
--Jim
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-24-2003 08:36 AM
10-24-2003 08:36 AM
Re: How to secure HP-UX 11.0 to prevent people from getting off of it?
The other issue is that if any of the data is sensative, you'll not want to use ftp, as that is all tranmitted in the clear. Have you considered OpenSSH?
HTH
mark
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-25-2003 09:17 AM
10-25-2003 09:17 AM
Re: How to secure HP-UX 11.0 to prevent people from getting off of it?
if I understand you correctly, then the oracle codefiles are located in your root-FS.
Well, then a "chroot(1M)" jail is even easier to build, as you can hard-link all "they" need into their jail. Omtting "telnet", "ssh" and such, of course...
FWIW,
Wodisch
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-27-2003 05:03 AM
10-27-2003 05:03 AM
Re: How to secure HP-UX 11.0 to prevent people from getting off of it?
This assumes:
1. the contractors do not have root access to the box
2. none of the outbound protocols required by your application allow access to unauthorized internal data/systems. You shouldn't have to allow ftp/telnet, etc.
You could also spring for a hardware firewall and put this box in a DMZ/isolated network segment. It's the same basic idea, just a cost vs. risk tradeoff.
I also recommend switching to ssh/scp over telnet/ftp, but I'm not sure if it solves your current problem.
Hope that helps
-Keith
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-29-2003 02:49 PM
10-29-2003 02:49 PM
Re: How to secure HP-UX 11.0 to prevent people from getting off of it?
> You mentioned:
> However, once on the server, they can easily telnet off of it and communicate with other servers they are not supposed to have access to. How do I prevent this?
Since these contractors are not authorized for access on other servers, then don't create accounts for them on these servers.
Unless you are providing them with the Oracle user account which has the same userid/password authentication credentials across all your other servers, restricting access should be as straightforward as simply NOT having any account rights provided to them. A chroot cage is an overkill and not cost-effective in my opinion.
You will need to restrict access at the database level as well if Oracle client access exists. Otherwise, they can still sqlplus to the other servers and run shell commands.
Hope this helps. Regards.
Steven Sim Kok Leong
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-29-2003 06:34 PM
10-29-2003 06:34 PM
Re: How to secure HP-UX 11.0 to prevent people from getting off of it?
It will mean you have to remember passwords are different on that server, but at least you keep them off your other servers.
Also using auditing and monitoring the shell history on the system could help you track down malicious use of their rights, so you can take repercusions if they do things they are not allowed to do.