Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-20-2003 01:28 AM
10-20-2003 01:28 AM
can go to to get security tools that I can
use to monitor who is doing what as root
on a server. Just looking at roots history
file is not enough. I could install TCPwrappers
that I believe has some logging. I have tripwire and cops installed but none of these
really tell who or what. I use to use logshell
at another company and was wondering if something similar exists. /.rhosts has to go also. I need to know who/what is using it.
Solved! Go to Solution.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-20-2003 01:36 AM
10-20-2003 01:36 AM
Re: security
http://www.passgo.com/datasheets/upm.pdf
Does what you want and loads more.
-- Graham
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-20-2003 01:38 AM
10-20-2003 01:38 AM
Re: security
The best solution is to change the password to root and remove any files that can be executed up to root, then have people submit their requests to you for root command executions.
Let's say you allow someone to have root priv's and they go into vi or simply "more" a file and then bang (!) out and start another shell or simply execute a command, which won't be logged.
live free or die
harry
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-20-2003 01:53 AM
10-20-2003 01:53 AM
Re: security
HTH.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-20-2003 01:57 AM
10-20-2003 01:57 AM
SolutionHere is how we keep up on these security issues.
Fist we subscribe to itrc security bulletins, which you apparently already do.
Next we use the following tools to harden security on our system and notify us of security patches.
Bastille Security hardening
http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=B6849AA
Perl which the above needs.
http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=PERL
Security Patch Check
http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=B6834AA
TCP Wrappers
http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=TCPWRAP
IDS/9000 (Intrusion Detection Sytstem)
http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=J5083AA
Get all these products working you'll be quite secure.
Secure shell
http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=T1471AA
SEP
Owner of ISN Corporation
http://isnamerica.com
http://hpuxconsulting.com
Sponsor: http://hpux.ws
Twitter: http://twitter.com/hpuxlinux
Founder http://newdatacloud.com
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-20-2003 02:46 AM
10-20-2003 02:46 AM
Re: security
as "ask other users to submit what they would like to run with root to yourself" aka being a lazy sysadmin once :) - use sudo. Define what people do what.Consequently restrict root logins to console only,
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-21-2003 10:13 AM
10-21-2003 10:13 AM
Re: security
If you need info now.
/usr/sam/bin/samlog_viewer might help.
If root is using a history file
strings .history might help.
If users are loging in as root you can find who they are and make them stop. (I think everyone should use sudo)
who -a /etc/wtmp |grep root
root pts/tb Oct 21 17:05 . 7731 bozo.thecompany.com
root pts/tb Oct 21 17:05 . 7731 id= tb term=0 exit=0
root pts/tb Oct 21 17:05 . 7731 id= tb term=0 exit=0
root pts/tb Oct 21 17:06 . 7818 bozo.thecompany.com
root pts/tb Oct 21 17:06 . 7818 id= tb term=0 exit=0
root pts/tb Oct 21 17:06 . 7818 id= tb term=0 exit=0
if users are using su to become root
you can get times and term id and who from /var/adm/sulog
If you have accounting you can use
/usr/sbin/acctcom to find commands executed
and from what terminal
if you have multiple acctoing files
pacct pacct1 pacct2 etc you need
to run
acctcom pacct? corresponding to your time period.
Rory