- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- Security Best Practices
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО04-22-2001 05:03 PM
тАО04-22-2001 05:03 PM
I have seen numerous articles on other aspects of security, but not this.
Your advice will be appreciated.
Thanks,
Jo
Solved! Go to Solution.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО04-22-2001 05:38 PM
тАО04-22-2001 05:38 PM
Re: Security Best Practices
- root needs to be accountable, this mean only ONE person will know its password and who is responsible for it.
- seal the root password onto an envelop and give it to your boss for emergency situations which the root user cannot be reached, this envelop should be updated every time the root password being changed.
- establish a policy to change root password periodically, say, every 3 months.
- if other people needed to run root specific commands, setup sudo for this and grant only minimum authority.
- disallow straight login to root by setting up /etc/securetty with single test line "console".
Rgds,
Philip
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО04-22-2001 07:52 PM
тАО04-22-2001 07:52 PM
Re: Security Best Practices
have a look at the following link. It is for HP-UX Online Internet Training in a virtual classroom. HP-UX Security Course is near the bottom. Cost is low ($129 US) relative to OpenView in New Orleans, but don't let the boss know! I have tested the virtual classroom and it works on my laptop (You may have to get some security turned off on the firewall to use this on JetStream).
http://education.itresourcecenter.hp.com/Trainer/education/productlist.asp?comm=7
I could have turned around and talked to you about this, but this is heaps more fun. FRED
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО04-22-2001 11:43 PM
тАО04-22-2001 11:43 PM
Re: Security Best Practices
This white paper will help:-
http://people.hp.se/stevesk/bastion11.html
Paula
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО04-23-2001 01:48 AM
тАО04-23-2001 01:48 AM
Re: Security Best Practices
* BIND (runs as root per default, but can run chrooted as non-privileged user)
* sendmail (runs as root -- but can be replaced by Postfix, which doesn't run as root and which can run chrooted)
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО04-23-2001 02:30 AM
тАО04-23-2001 02:30 AM
Re: Security Best Practices
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО04-23-2001 01:47 PM
тАО04-23-2001 01:47 PM
Re: Security Best Practices
Paula, thanks for the whitepaper. I will have a close look at it.
We run a large site with several sys admins which makes it hard to restrict the use of root especially when we take turns at callout. I was wondering if there is someone in a similiar situation and what steps they may have taken to tighten up security.
I'm looking for ways to improve what we already have in place. (I'm relatively new to this site - and of course take security quite seriously).
Thanks everybody who have responded so far to this question.
Jo
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО04-23-2001 03:49 PM
тАО04-23-2001 03:49 PM
SolutionWe used the bastion11 checklist as the foundation for tightening up a system. For root, I asked the same question on how to restrict - here is the thread:
http://forums.itrc.hp.com/cm/QuestionAnswer/1,1150,0xaf7e37f45ef7d4118fef0090279cd0f9,00.html
Here are the excerpts from that thread that might help...
There is now way that I know of to restrict the su capability that is native to HP-UX. The easiest thing that comes to mind is just not giving out the password. If you don't want them to do a 'su -' then why give them the password?
Another option you have though is to use the product called 'sudo'. You can get it from the HP-UX Porting center. Here is a link to it:
http://www.courtesan.com/sudo
Sudo allows you to set people up with the capability to run things with root capability without having to give out the root password or give out full 'su -' access.
sudo is a way to limit who has root access. In the sudoers file you can have something like the line below to prevent root access;
Cmnd_Alias SU=/usr/bin/su, !/usr/bin/su *root*, !/usr/bin/su "",!/usr/bin/su -
Also, I have put in something for rlogin as well. If you are root one one system and do rlogin to another system, you are root on the other system as well.
The above Cmnd_Alias will prevent specified users from becoming UID=0 unless they are in the sudoers file as having the rights to UID=0.
regards,
~pf
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО04-23-2001 08:22 PM
тАО04-23-2001 08:22 PM
Re: Security Best Practices
Regards,
Jo
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО05-01-2001 02:45 AM
тАО05-01-2001 02:45 AM
Re: Security Best Practices
With multiple root users a way to track what they are doings is by putting an entry into roots .profile as such:-
# Who logged in (From where)
date >> ~/.sh_history
who -u|grep root >> ~/.sh_history
Which will put time, date and from the who command will identify the ip address of their login.
To look at what was done vi .sh_history and search for date:-
/May 1
Tue May 1 00:06:20 BST 2001
root-gdr pts/tr May 1 00:06 . 7269 172.20.1.138
crontab -e
Shows that root user GDR loggied it at 00:06 hours from an in house ip address and could have edited the crontab.
DO NOT save the .sh_history on exit as current entries will be lost.
HTH
Paula
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО05-01-2001 03:34 PM
тАО05-01-2001 03:34 PM
Re: Security Best Practices
Thanks for that. Your suggestion is a good idea.
Thanks,
Jo
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО05-06-2001 05:00 AM
тАО05-06-2001 05:00 AM
Re: Security Best Practices
You are most welcome, and BTW welcome to the forum.
;-) Paula
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО05-06-2001 08:35 AM
тАО05-06-2001 08:35 AM
Re: Security Best Practices
just want to add that we use a history file per tty logged on ($HOME/.sh_history_xx). So if more than one root is logged on, their commands don't get mixed up in the history file.
If you want to use the history file for security check you might want to apply this too; otherwise if more than one root is logged on, you won't know who did what.
regards,
Thierry.