- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- Re: HPUX O/S hardening
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-22-2003 05:52 PM
04-22-2003 05:52 PM
I am recently doing some O/S hardening on HPUX, I have some question;
1. How does having 'mesg n' provide a greater security?
2. How does having global privileges such as
echo -n > /etc/privgroup with permission 400, if my global priv is chown provide a greater security.
3. how does disabling finger, echo, and chargen provide a greater security?
Solved! Go to Solution.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-22-2003 06:37 PM
04-22-2003 06:37 PM
Re: HPUX O/S hardening
I'm not an expert, but here is my take on your questions:
1. Turning off the mesg service probably helps prevent a denial of service attack, as well as preventing any possible bugs in the program that might cause trouble [the old buffer overflow problem].
2. If I understand your question, you are asking why the /etc/privgroup can have just 400 permissions when you still have global chown privileges? The /etc/privgroup file is read by the setprivgroup command, and also the file should be owned by root, which means that even if you have chown priviliges you should not be able to change the permissions on the file.
3. Those services usually aren't needed, and can possibly be exploited for denial of service, bugs, or for getting information about the system and user accounts.
JP
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-22-2003 06:57 PM
04-22-2003 06:57 PM
Re: HPUX O/S hardening
http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=B6849AA
'chown/chmod/chgrp' should be allowed globally anyway. You still won't be able to change a file from 'root' or anyone else.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-22-2003 07:49 PM
04-22-2003 07:49 PM
Re: HPUX O/S hardening
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-22-2003 09:00 PM
04-22-2003 09:00 PM
Solution- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-22-2003 09:50 PM
04-22-2003 09:50 PM
Re: HPUX O/S hardening
http://people.hp.se/stevesk/bastion11.html
Thanks, Andrey
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-23-2003 09:13 AM
04-23-2003 09:13 AM
Re: HPUX O/S hardening
2. On some Unixes, chown can only be run by root. /etc/privgroup gives you the ability to have that behavior on HP-UX (as well as a few other privileges). By default, any user has the ability to chown to another user.
This is convenient in some environments, but in a high threat environment, limiting any privilege to the least necessary can be helpful.
3. Bastille 2.1 explains these services and some reasons for turning them off. Basically, any service that listens on the network increases your risk of having a future vulnerability which affects your system. Also, finger can be used as part of the "information gathering phase" of an attack.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-23-2003 09:51 AM
04-23-2003 09:51 AM
Re: HPUX O/S hardening
But when you ask the question about security, there are dozens of other areas such as cleartext passwords over the network (ie, telnet), security patch management, plaintext data exchange (ftp) and so on that need to be addressed.
As mentioned, download a copy of Bastille and the security patch checker from software.hp.com and also look at the IDS/9000 (Intruder Detection System),Secure Shell (OpenSSH) and perhaps TCPwrappers, also available from software.hp.com (and don't forget to buy the book: HP-UX 11i Security by Chris Wong)
Bill Hassell, sysadmin