- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- Re: security requirements
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-18-2006 05:55 AM
04-18-2006 05:55 AM
Console Device is world writeable/readable while in use. I am not sure what would happen if I issued a chmod command. The permissions are currently crw—w—w-.
what chmod command could be used to correct this.
thanks...Jay
Solved! Go to Solution.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-18-2006 06:09 AM
04-18-2006 06:09 AM
Re: security requirements
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-18-2006 06:13 AM
04-18-2006 06:13 AM
Re: security requirements
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-18-2006 06:26 AM
04-18-2006 06:26 AM
Solution- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-18-2006 06:37 AM
04-18-2006 06:37 AM
Re: security requirements
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-18-2006 07:02 AM
04-18-2006 07:02 AM
Re: security requirements
http://www.giac.org/certified_professionals/practicals/gsna/0101.php
and found nothing about write permission to /dev/console.
If you do a chmod o-w /dev/console and reboot - it comes back - so I'd say it is an OS requirement and carry on with the audit.
Rgds...Geoff
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-18-2006 10:32 AM
04-18-2006 10:32 AM
Re: security requirements
Bill Hassell, sysadmin
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-19-2006 01:38 AM
04-19-2006 01:38 AM
Re: security requirements
I will also point you to two other references:
Managing Systems and Workgroups - Chapter 8. Administering a System: Managing System Security
http://docs.hp.com/en/B2355-90950/ch08.html
sub - Security Considerations for Device Files:
http://docs.hp.com/en/B2355-90950/ch08s04.html#cegdefcg
sub - Link-Level Access:
http://docs.hp.com/en/B2355-90950/ch08s06.html#d0e69379
Also of note is the Center for Internet Security - HP-UX Benchmark v1.3.1:
http://www.cisecurity.com/bench_hpux.html
Of note is section 5.7 which recommends that /dev/vg01 not be world writable.
If you further examine the Bastille scripts and a few other resources. The largest concern over device file security is over /dev/mem, /dev/kmem, /dev/lan*, /dev/ieee*, /dev/ether* and /dev/vg*. Based on what these device files are used to access, you can see why they would be limited.
Other things I have seen would suggest keeping /dev and any dirs under /dev limited to no world write (pretty good recommendation). Of course, you must keep in mind that any permission that is required for the system to run will be restored on reboot.
One last point, if you are so concerned about console security above all else, I would question two points, the first being, how secure is access to your console (are you also using the remote console with the GSP or MP card as well?) and the second is, how trusted or untrusted are your users? Perhaps they shouldn't be allowed to directly log in, or you should consider other means of monitoring or limiting acccess such as separating the services between multiple nodes or limiting other services.
The HP-UX Benchmark is an excellent reference for this.
Good luck,
Don