- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- Re: single user mode and security- massive loophol...
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-29-2002 12:48 PM
05-29-2002 12:48 PM
food for thought.
Mark
Solved! Go to Solution.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-29-2002 12:55 PM
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-29-2002 12:57 PM
05-29-2002 12:57 PM
Re: single user mode and security- massive loophole???
If you configure the system - trusted then it will definitely ask you for the password.
In the non-trusted mode, yes there is a security loophole.
Piyush
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-29-2002 01:00 PM
05-29-2002 01:00 PM
Re: single user mode and security- massive loophole???
I can't speak for others, but we DO NOT put .rhosts & .netrc files on the workstations such that you could gain access to servers w/o a PW. You'll still ALWAYS need to know the root PW on the servers. And of course those PWs are ALWAYS different from our workstation root PW. We also set up the securetty file on ALL servers & workstations.
In fact SAs are responsible for their W/S root PW & do not share them w/other SAs except on a need-to-know basis.
Yes that leaves workstations somewhat vulnerable, but here you need key-card access to our work areas as well as the data ctrs anyway.....
Rgds,
Jeff
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-29-2002 01:06 PM
05-29-2002 01:06 PM
Re: single user mode and security- massive loophole???
- paging notification if a machine goes down
- nightly password file timestamp check (NIS)
- system security awareness class
The threat is more likely to come from a disgrunted employee who's not happy at work :)
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-29-2002 01:17 PM
05-29-2002 01:17 PM
Re: single user mode and security- massive loophole???
That's one of the marvels of HPUX! For any system, HP or not, physical security should come first. Booting without passwords, booting from CDs, etc are double-edged swords. Often to get our jobs done "You can't live with 'em and you can't live without 'em"!
And just like a chain, security for your enterprise is only as strong as your weakest link. If that's a physically non-secured workstation that has users with non-password access to servers and it can be booted into single-user mode without a password... You can see where that's going.
Darrell
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-29-2002 01:45 PM
05-29-2002 01:45 PM
Re: single user mode and security- massive loophole???
A beta version of HP-UX Bastille is currently available from http://www.bastille-linux.org (click on "Download Beta w/ HP support")
Still, no matter what you do, if you don't have good physical security, you don't have good security. Anyone with a screwdriver can disassemble the machine and do whatever they want with the parts and data contained inside.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-29-2002 02:57 PM
05-29-2002 02:57 PM
Re: single user mode and security- massive loophole???
Or how about the hole where I can't log in, but I can shutdown (power down) your box.
To fix these problems, prevent unauthorized personnel from getting physical access to the equipment (power switch, tape drives, CD-ROMS, etc.).
With workstations in an office environment, physical security might be trickier, because you're likely to have a collection of employees with a higher risk profile than the folks that operate an equipment room - maybe security cameras would help.
In the end, if you don't have adequate physical security, you've got no security at all. The OS/application hardening will all be for naught if you give me physical access to the box.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-30-2002 04:12 AM
05-30-2002 04:12 AM
Re: single user mode and security- massive loophole???
Yes someone can still dismantle the box, but these things can be designed to not work when changed are made.
Yes they can still power-off the machine, but how secure do you want it to be? Should you give these users the ability to power down any machine that stores important data? - No. What about tempesting, EMR, printouts, etc? the list rapidly expands.
All the previous postings give excellent advice.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-30-2002 04:57 AM
05-30-2002 04:57 AM
Re: single user mode and security- massive loophole???
Later,
Bill
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-30-2002 05:08 AM
05-30-2002 05:08 AM
Re: single user mode and security- massive loophole???
one question I still have is about the workstation vs server root account. I think I have it right, but I want to check (base off what was set up here). server A has root, password bob. workstation B has root, password tim. untrusted system. ws has mounted /home from the server, contains files, user directories, etc. fstab on ws has A:/home /home nfs rw,suid 0 0. If I have on the server in /etc/exports a line for /home that has in it the option "root=B", then the root account for the ws will act as the root account for the server. this would mean that if a file has root ownership and permissions (750, say), with this config, I can su to root on the w (use password tim) and remove this file. if that line is not there, then the only way to remove this file would be to go to the server. Do I have this right? what if I (as root on ws) put a file on /home? can the server root remove it (does it hold true in reverse?)
Thanks for the responses guys! I'd been wondering for a while, and I'd have spent forever trying to figure it out on my own.
Mark
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-30-2002 05:08 AM
05-30-2002 05:08 AM
Re: single user mode and security- massive loophole???
even if you set the boot_admin secure mode, if somebody can access the box (physically, i.e. touching it), s/he can attach another SCSI-device with the same ID as your boot disk (to the boot SCSI-channel), toggle the power, get a SCSI-ID-conflict and thus turn off the boot_admin secure mode :-(
Or s/he can simply open the cabinet and steal the disk(s)...
Without physical access control there is NO security!!!
Just my $0.02,
Wodisch
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-30-2002 05:31 AM
05-30-2002 05:31 AM
Re: single user mode and security- massive loophole???
Your fears over NFS are justified, since it is fundamentally insecure as has been pointed out in other forum threads. Don't exportfs anything in that manner. Don't put suid/sgid files in exported filesystems. Regulary check exported filesystems to ensure that other users haven't done such a thing. One customer I visited (a bank) even insisted that NFS was banned, .rhosts was banned and all non-root users had no access to chown/chmod! That policy certainly made life difficult for honest people.
Steve
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-30-2002 06:23 AM
05-30-2002 06:23 AM
Re: single user mode and security- massive loophole???
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-30-2002 07:07 AM
05-30-2002 07:07 AM
Re: single user mode and security- massive loophole???
I dont care as much about workstations, as they dont hold user accounts nor data and applications. If a workstation is trashed, I can simply ignite them ;)
Your comment is not true about windows NT security either. I have 4 programs on Linux floppies for NT 3.5, 4.0, 2000, and XP admin hacks. The same problem exists. If i can get your box in my hands your done.
Dont forget that if an admin leaves the install disk in, i can run a quick recovery and steal your system as easy as you can get my Unix from single user mode.
Regards,
Shannon
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-30-2002 07:20 AM
05-30-2002 07:20 AM
Re: single user mode and security- massive loophole???
sorry, channeled a little Yoda there :)
Thanks, all!
Mark
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-30-2002 07:51 AM
05-30-2002 07:51 AM
Re: single user mode and security- massive loophole???
There is NOT hole on single user, because there is root password on this mode, init 1.
I hope this help you.
Juanma.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-30-2002 08:24 AM
05-30-2002 08:24 AM
Re: single user mode and security- massive loophole???
Just to add on to what has already been said, Center for Internet Security has a HP-UX security benchmark for HP-UX 10.20, HP-UX 11.00 and HP-UX 11.11:
http://www.cisecurity.org/bench_HPUX.html
This benchmark comprises a list of hardening rules. These rules are very precise and clear. Will be good to check them out as well.
Hope this helps. Regards.
Steven Sim Kok Leong
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-31-2002 03:47 AM
05-31-2002 03:47 AM
Re: single user mode and security- massive loophole???
We put all our production servers in the conmputer room.
No workstations or terminals can log into the servers without a login.
The logins expire after 30 days and the sane password cannot be used for 7 times. We spend a bit of time changing passwords every 3 weeks.