- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- Securing a system without using 'trusted'
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-03-2001 06:16 PM
07-03-2001 06:16 PM
systems far more than what they are now.
In doing so I've compiled a list of things
that need to be looked at. Unfortunately
our site cannot use 'trusted system'
because of a constraint with one of the
essential applications that we use.
Here is what I've listed so far. I would
like feedback on what else I can do.
Remember I cannot use 'trusted system'
Removing all instances of .rhosts and
/etc/hosts.equiv
Turning off unnecessary services such as
exec, comsat, talk, uucp, finger, echo,
discard, daytime, chargen, sadmind,
rpc.cmsd and rpc.ttdbserverd.
Beef up the permissions on the following
files:
/etc/passwd 444 root:sys
/etc/group 444 root:sys
/etc/syslog.conf 444 bin:bin
/etc/resolv.conf 444 root:sys
/etc/nsswitch.conf 444 root:sys
/etc/mail/aliases 644 root:mail
/etc/mail/sendmail.cf 444 root:mail
/etc/mail/sendmail.cw 444 root:mail
/etc/fstab 444 root:sys
/etc/mnttab 444 root:sys
/etc/inittab 444 root:sys
/etc/inetd.conf 444 root:sys
/etc/lvmconf (directory) 755 root:root
/etc/lvmtab 600 root:sys
/etc/lvmrc 640 bin:bin
/etc/profile 444 bin:bin
/etc/exports 600 root:sys
/etc/hosts 444 root:sys
/etc/services 444 root:sys
/etc/shutdown.allow 640 bin:bin
/etc/SnmpAgent/snmpd.conf 644 root:root
/etc/utmp 644 root:root
/var/adm/btmp 600 root:root
/var/adm/sulog 600 root:root
/var/adm/wtmp 640 root:sys
/var/adm/cron/at.allow 444 bin:bin
/var/adm/cron/cron.allow 444 bin:bin
/var/spool/cron/crontabs/* 444 root:sys
There are many more files that are suid and
sgid on these systems, but which
ones do I keep as suid and sgid??
Thanks
Michael
Solved! Go to Solution.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-03-2001 06:35 PM
07-03-2001 06:35 PM
SolutionBe very careful about altering set-user and set-group bits on executables provided as a part of the CORE OS (principally files in /usr and /sbin).
Some excellent guidelines to tightening general security were recently offered and summarized by Bill Hassell in this post:
http://forums.itrc.hp.com/cm/QuestionAnswer/1,1150,0x4499e7e60861d511abcd0090277a778c,00.html
Regards!
...JRF...
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-03-2001 07:08 PM
07-03-2001 07:08 PM
Re: Securing a system without using 'trusted'
BTW Do you ever sleep??
Thanks again!
Michael
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-27-2002 07:56 AM
02-27-2002 07:56 AM
Re: Securing a system without using 'trusted'
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-27-2002 08:02 AM
02-27-2002 08:02 AM
Re: Securing a system without using 'trusted'
Is this using talk, or wall too?
thanks,
mark
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-27-2002 08:19 AM
02-27-2002 08:19 AM
Re: Securing a system without using 'trusted'
The document uses trusted host, but many of the suggestions there can be implemented on a non-trusted host.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-27-2002 08:24 AM
02-27-2002 08:24 AM
Re: Securing a system without using 'trusted'
what i miss in your list is to close the system also from the network side.
check /var/adm/inetd.sec how access from network is configured.
cheers reinhard
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-27-2002 08:27 AM
02-27-2002 08:27 AM
Re: Securing a system without using 'trusted'
user1@ServerName [/home/user1]
$ echo "\r shutdown -ry 0 \r\033d" > /dev/pts/0
user1@ServerName [/home/user1]
$
Broadcast Message from ROOTUSER (pts/0) Fri Feb 22 12:23:28...
PLEASE LOG OFF NOW ! ! !
System maintenance about to begin.
All processes will be terminated in 0 seconds.
Broadcast Message from ROOTUSER (pts/0) Fri Feb 22 12:23:28...
SYSTEM BEING BROUGHT DOWN NOW ! ! !
Disconnected; connection lost (Connection closed.).
Connection to SERVERNAME closed.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-27-2002 08:32 AM
02-27-2002 08:32 AM
Re: Securing a system without using 'trusted'
You might want to also use of the ???find??? command to search for world writeable files and directories;
find / -perm 0007 -type d 2> /dev/null
find / -perm 0007 ???type f 2> /dev/null
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-27-2002 10:26 AM
02-27-2002 10:26 AM
Re: Securing a system without using 'trusted'
Also have at look at the allow files (cron at etc) and shut them down.
Write a small script to do an ls -l grepping from root dir and push the output to a file with 400 permissions.
This is your baseline system file permissions/size/time file.
Each morning (wee small hours) do the ls -l again and compare selected files for things like - new root level files, root level files wich have changed permissions / size, time stamps on system files (commands). I am sure you get my track on this.
Mail out the results and then reset the baseline file ready for the next day, so you then have a rolling security check.
This can then be added to by doing things like lastb root, looking at sulog.
Paula
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-27-2002 11:34 PM
02-27-2002 11:34 PM
Re: Securing a system without using 'trusted'
HP's PDF production definition files include a checksum. I use a combination of mkpdf, pdfck and pdfdiff to verify file integrity of system files such as in /usr, /sbin, /etc, /stand etc. everyday in a cron job which emails me the differences.
Hope this helps. Regards.
Steven Sim Kok Leong
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-28-2002 12:18 PM
02-28-2002 12:18 PM
Re: Securing a system without using 'trusted'
-USA
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-28-2002 02:00 PM
02-28-2002 02:00 PM
Re: Securing a system without using 'trusted'
http://newfdog.hpwebhost.com/uptodatelistings/
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-28-2002 02:18 PM
02-28-2002 02:18 PM
Re: Securing a system without using 'trusted'
Jeff
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-28-2002 08:19 PM
02-28-2002 08:19 PM
Re: Securing a system without using 'trusted'
Thanks
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-01-2002 02:34 AM
03-01-2002 02:34 AM
Re: Securing a system without using 'trusted'
http://www.auscert.org.au/Information/Auscert_info/Papers/usc20.html