- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- Re: How to secure servers from previous administra...
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
08-23-2006 05:40 AM
08-23-2006 05:40 AM
Are there any white papers that would help me effectively secure our systems? Do you have any utilities to examine our existing servers?
We want to make sure that any previous administrator doesn't have a back door into our systems. We want to make sure that we are the only ones that have root rights.
Any information would be helpful and appreciated. Thank You...
Solved! Go to Solution.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
08-23-2006 05:44 AM
08-23-2006 05:44 AM
SolutionGreat question.
1) Change the root password and make it complex
2) Check /etc/passwd for other accounts with user id 0 and get rid of them or change password
3) Scan your system for suid programs, especially shells. A shell in a user directory with suid permissions can give a regular user root permissions
4) Run Bastille on the system and close down vulnerabilities.
5) Look at logs for unusual events that only and admin can do.
6) Do a google search on this topic with the site:itrc.hp.com directive and read them carefully.
SEP
Owner of ISN Corporation
http://isnamerica.com
http://hpuxconsulting.com
Sponsor: http://hpux.ws
Twitter: http://twitter.com/hpuxlinux
Founder http://newdatacloud.com
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
08-23-2006 05:45 AM
08-23-2006 05:45 AM
Re: How to secure servers from previous administrators
Things I do if/when administrator leaves:
1) Change the root password
2) Expire or remove their personal ID
3) Verify access removed from sudoers
4) Verify remote access is removed
You might also want to see if they have anything like VNC running on the systems.
If you use SSH, you might want to change roots public/private key pair.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
08-23-2006 05:59 AM
08-23-2006 05:59 AM
Re: How to secure servers from previous administrators
I kinda suspected that about the back door question. I will check these things.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
08-23-2006 06:50 AM
08-23-2006 06:50 AM
Re: How to secure servers from previous administrators
Further advice if applicable. Assuming the admin wasn't fired, it pays to maintain contact in some way with the admin.
Many of us are proud types and when we get talking tend to brag about our abilities and what we've done. Sometimes beer loosens the proud admin's tongue.
I don't do back doors. Console access is a good enough back door to get me into any system that I can boot into single user mode.
In the short run, if there is console access you might wish to password protect the single user mode if the person might have access to the console.
How much work you do here depends on the circumstances under which the guy left and the level of trust.
If the person did and internal transfer and you are concerned the person might undermine you or make you look bad, make your system a fortress and make sure access to any master password documents is revoked.
I live in the middle east. You can't be too paranoid here.
SEP
Owner of ISN Corporation
http://isnamerica.com
http://hpuxconsulting.com
Sponsor: http://hpux.ws
Twitter: http://twitter.com/hpuxlinux
Founder http://newdatacloud.com
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
08-23-2006 08:15 AM
08-23-2006 08:15 AM
Re: How to secure servers from previous administrators
The way that you protect against this sort of thing is have a database that stores the cksum, timestamps, and length(s) of known good versions and compares with the current version. That's difficult to do after the fact and it's one reason well-written backdoors are so hard to find.
You aren't going to like my answer but the safest approach if this is a real concern is to load the box from scratch but even that is not foolproof because your normal restores could easily restore the backdoor'ed versions.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
08-23-2006 08:28 AM
08-23-2006 08:28 AM
Re: How to secure servers from previous administrators
I really can't imagine a more difficult situation than trying to prove than a machine once administered by a knowledgeable but suspect person is actually "clean". That's why building from scratch is really the way to go -- if this is a truly significant concern.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
08-23-2006 08:40 AM
08-23-2006 08:40 AM
Re: How to secure servers from previous administrators
A simple backdoor is any to look for duplicate user IDs. Run this command:
logins -d
Any duplicates for root should be viewed as an active attack on your system--remove that userID immediately and check the user's HOME directory for suspicious files. NOTE: some admins (wrongfully) assume that having another root user is a good thing so it may be an innocent user ID, but it is one of the first areas that a hacker will try to accomplish.
There is no single set of tests or tools that will answer the question...perhaps the machines were very poorly secured before the outsourcing, and if so, I would download Bastille from the HP software.hp.com website and use that to secure your systems. One of the great features of Unix is flexibility but it is also one of the difficulties in securing these systems. You'll need to spend a lot of time in the Security book. You'll also need to assess the impact of higher security on the system. Sometimes, the changes may disable an application or make the user interface more difficult to use.
Bill Hassell, sysadmin
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
08-23-2006 11:16 PM
08-23-2006 11:16 PM
Re: How to secure servers from previous administrators
Nice and important question.
i am not that much good to answer but i can give some suggestions..
1. As SEP told, maintain a GOOD contact with him. Some good help u can get from him.
2. regarding setuid root program.
3. and configure the ftp logging, and always analyse the log files...
Hope this gave u some idea.
Sekar
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
08-24-2006 02:02 AM
08-24-2006 02:02 AM
Re: How to secure servers from previous administrators
A couple of additional suggestions
Check for world writable files. If a file is world writable anyone can modify it to do interesting things when executed.
If you are paranoid - force all of the users to change their passwords - the previous admins may have knowledge of users password - because of password reser requests (or passwords that were never changed from the defaults)
If you are using sudo (or a similar program) examine it's configuration for who is allowed root access.