- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- Re: Security Policies/Procedures
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-07-2002 11:23 AM
01-07-2002 11:23 AM
Security Policies/Procedures
Much discussion concerning Unix security centers on de-activating services via /etc/inetd.conf or limiting access to certain hosts via /var/adm/inetd.sec and the use of /etc/hosts.allow and /etc/hosts.deny.
I am finding that some of the security vulnerabilities in certain services (finger and uucp for example) discovered over the years are disabled (or appear to be since they are commented out in /etc/inetd.conf) by default in a HP-UX installation. For all other services I wish to disable, should I comment out both the line in /etc/services and /etc/inetd.conf and create an entry in /var/adm/inetd.sec explicitly denying access to that service? What is the best method of disabling services you do not need running?
I also have run across many recommendations to use tcp_wrappers and ssh. I would like to get a feel for how commonly these utilities are used, and what kind of issues have been encountered in using them.
There also appears to be TCP ports opened that aren't necessarily represented in either /etc/services or /etc/inetd.conf identified via the lsof utility. How do you protect against other applications opening TCP ports you don't want opened? Apparently just because a service is not explicitly specified in one of these 2 files doesn't necessarily mean the service is disabled or restricted. Does /var/adm/inetd.sec also apply to these services in preventing them from being available to outside hosts?
I clearly cannot lock down all TCP/UDP ports and still have a useful system, so what are the best practices for identifying how and what to lock down?
I realize some of this depends on what applications are installed on a system. What I am looking for are general guidelines used at other organizations when addressing HP-UX security.
Thanks in advance! I can be reached via email at renner@fullnet.com
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-07-2002 11:51 AM
01-07-2002 11:51 AM
Re: Security Policies/Procedures
I have created and attached a zip file containing some security site links for you to check out.
Bear in mind, you are best served by checking with whatever govermental agency regulates your practices (if applicable).
Ex: banking/finance: F.D.I.C
Trading: S.E.C.
Health Care: HIPPA.
Just a few thoughts.
Good luck.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-07-2002 11:59 AM
01-07-2002 11:59 AM
Re: Security Policies/Procedures
http://armor.sourceforge.net/
FOR Armor FAQs:
http://cvs.sourceforge.net/cgi-bin/viewcvs.cgi/~checkout~/armor/armor/FAQ?rev=HEAD&content-type=text/plain
g'd luck
t++
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-07-2002 01:27 PM
01-07-2002 01:27 PM
Re: Security Policies/Procedures
Armor is a very interesting set of tools. I haven't had a chance to look at it in depth yet, but I will. Once I have my security policies determined, I intended to write a set of scripts similar to these to make implementation of the policy straight-forward for the rest of the administrators on my team. I may be able to use Armor for this purpose (at least a starting point) and save myself a lot of scripting time.
I had not run across Armor until you pointed it out, thanks!
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-08-2002 04:53 AM
01-08-2002 04:53 AM
Re: Security Policies/Procedures
Although you can have a general security policy, each application needs its own policy, along with each server. The more sensitive the data on a server/application, then the greater need for a more strict security policy. Security must always reside within each application, assisting in the security of the entire server security policy.
>>>For all other services I wish to disable, should I comment out both the line in /etc/services and /etc/inetd.conf and create an entry in /var/adm/inetd.sec explicitly denying access to that service? <<<
Yes, commenting out and explicitly denying service, as well as making sure there are no startup scripts for the services.
>>>What is the best method of disabling services you do not need running?<<<
It depends. If you are setting up a web server, you might not have inetd running at all (which is what I do). It boils down to a case by case basis on each service, depending upon what you need.
>>>I also have run across many recommendations to use tcp_wrappers and ssh. I would like to get a feel for how commonly these utilities are used, and what kind of issues have been encountered in using them. <<<
The best security policy would prohibit all (ALL) users from shell access.
>>> How do you protect against other applications opening TCP ports you don't want opened? <<<
With HPux 11.x you get ???syslogd ???N??? that turns off the socket listener (the logging of other systems via syslog).
>>> Apparently just because a service is not explicitly specified in one of these 2 files doesn't necessarily mean the service is disabled or restricted. Does /var/adm/inetd.sec also apply to these services in preventing them from being available to outside hosts? <<<
If inetd is not being used to service requests, then NO, the use of inetd.sec will not help, ie: Oracle.
>>> I clearly cannot lock down all TCP/UDP ports and still have a useful system, so what are the best practices for identifying how and what to lock down? <<<
Each Server and application will have its own security needs. For Web servers, I used the Bastian host document, and pushed it as far as not installing services that I will not use, like FTP, and NFS. My web servers don???t even have inetd running. Although I have shut down almost every service, I unfortunately have more than ports 80 and 443 open, which is why I have routers and firewalls (two different ones ???different vendors ??? one for the outside and one for the inside) wrapped around the Web servers.
>>>I realize some of this depends on what applications are installed on a system. What I am looking for are general guidelines used at other organizations when addressing HP-UX security. <<<
You are correct, that every application/server should have its own polices.
live free or die
harry