- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- Re: HPUX Securtity
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
12-03-2002 12:45 PM
12-03-2002 12:45 PM
We know about secure shell and trusted systems. What third-party products are people using to secure HPUX? We do a lot of file transfers to/from mainframe and NT platforms, as well as between our UNIX servers.
Thanks for you help
jls
Solved! Go to Solution.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
12-03-2002 12:56 PM
12-03-2002 12:56 PM
Re: HPUX Securtity
It depends upon how secure you have to make them. Are any of these servers internet facing? Are you using a "trusted" network?
Some things come to mind:
ldap/NIS+ for unix
ldap/ad for M$ stuff
bastille hosts: http://forums.itrc.hp.com/cm/QuestionAnswer/1,,0x4f9793e260b0d611abdb0090277a778c,00.html
to secure NT's -> power them off :-))
live free or die
harry
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
12-03-2002 01:08 PM
12-03-2002 01:08 PM
SolutionOther than SSH and TCP wrappers, we do not use any other 3rd party products. From our standpoint,increasing security is through reduction of permissions of files/directories and the turning off of certian services ( remote services, snmp, etc). Also, keeping up to date with the various secrity patches also aids with this. You may want to look into the security_patch_check utility:
http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=B6834AA
Hope this helps
Chris
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
12-03-2002 01:13 PM
12-03-2002 01:13 PM
Re: HPUX Securtity
We are also running SAP and I think I'll have trouble using NIS with SAP because SAP requires several different userids with the same UID (or that is what my BASIS folks tell me).
I am not looking to hardening these servers. Just keeping passwords from being sent over the network in clear text, and things like that. I'm also looking for somethng that will be easy to implement and transparent to use (I hope).
jls
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
12-03-2002 01:21 PM
12-03-2002 01:21 PM
Re: HPUX Securtity
Yes, serviceGuard works very well with trusted systems:
http://forums.itrc.hp.com/cm/QuestionAnswer/1,,0x25f2cdec06f1d61190050090279cd0f9,00.html
Secure shell will relive you of your worries of passwds passed in clear text.
Remember, the security needs of your environment are determined by the applications you run and their ability to do so. You don't want to secure yourself out of productivity.
Chris
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
12-03-2002 01:43 PM
12-03-2002 01:43 PM
Re: HPUX Securtity
Other things like a /etc/securetty file to keep root from logging on except from the console, thereby forcing root users to loging as themselves and su to root.
Enable trusted and enforce nontrivial passwords and expire them periodically, like every 60 days.
Use /etc/ftpusers and put accounts like root bin sys adm www etc in there.
We use SecurID here for passwords. That is a hardware software solution where every user gets a SecurID card and a pin number. The SecurID card has a random 6 digit number that changes every 60 seconds so the password would be the pin number followed by the SecurID number. Very secure as the passwords change every sixty seconds and it enforces single use on the password. So even if someone sniffed the password it will only work once.
By far the easiest and cheapest solution is the trusted system approach with non trivial passwords that expire every 45 or 60 days. Other than that remember that the only really secure system is one that is powered off.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
12-03-2002 01:53 PM
12-03-2002 01:53 PM
Re: HPUX Securtity
Other things to do are only allow RPC services that are required. Either limit access (inetd.sec) that are required to those users/hosts/subnets that need it or turn off (inetd.conf) services not required (nfs,tftp,finger,ntalk,ident,etc.)
Also setup ftp, sendmail & telnet banners with legal notices to protect the company in the event of unauthorized access or attempt.
Turn off anonymous ftp as well as turn on the novrfy & noexpn privacy options in sendmail.
And most importantly stay current on security related patches.
And it never hurts to run internal security checks against the server on a regular basis to verify just what is/isn't hardened.
Rgds,
Jeff
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
12-03-2002 02:09 PM
12-03-2002 02:09 PM
Re: HPUX Securtity
I am not sure about the price, but most of what they have there can be done through non-cost products, if you have the time and do not care about nells and whistles.
Hope it helps
John
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
12-03-2002 07:07 PM
12-03-2002 07:07 PM
Re: HPUX Securtity
So you don't want NIS in any secure environment. (there is NIS+ which can coexist with Trusted Systems but it is a big pain to manage and every NIS client must support NIS+ as NIS clients are incompatible with NIS+).
I know of no SAP requirement to have different user logins share a single UID. Must be an application problem. Any security specialist will tell you that duplicate logins for a single UID is bad.
Bill Hassell, sysadmin
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
12-04-2002 01:56 AM
12-04-2002 01:56 AM
Re: HPUX Securtity
You can employ sudo to allow people to have limited access to commands.
Another favourite of mine is to use aliases to redefine some commands - for example to prevent certain users from accessing commands that you don't want them to, set up aliases in their .profile (or whatever file is relevant) so that the commands actually just run /bin/true
The best way I've found to implement this is to define
ENV=$HOME/.kshrc in /etc/profile, then to add in the aliases in their .kshrc file so that the aliases apply even if they run a shell from within another command (eg. from vi).
It's often stated that most security breaches come from inside your own organisation (apart from anything else, the people there will probably have some access to your systems anyway, and in some cases they will have a reasonable grasp of IT). If you can, lock your users into a menu system, rather than giving them command line access.
For accounts that only need FTP access, set their shell to /bin/false so that they can't get command line access.
Use the restricted shells to allow limited access to the systems, rather than full shells.
Carry our regular audits of sulog, last and lastb output etc. You can't easily prevent things if you don't know they're going on.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
12-04-2002 10:19 AM
12-04-2002 10:19 AM
Re: HPUX Securtity
how about using "IPFilter/9000" to block off all unwanted access from the network (or even TO the network), including portscans?
FWIW,
Wodisch