Foreword |
|
xv | |
Preface |
|
xvii | |
|
Ready or Not, Here I Come! |
|
|
1 | (20) |
|
|
2 | (2) |
|
What is Needed to Compromise a System? |
|
|
4 | (1) |
|
|
5 | (10) |
|
Making a Copy of the Shell |
|
|
5 | (2) |
|
|
7 | (1) |
|
|
8 | (2) |
|
|
10 | (1) |
|
|
11 | (1) |
|
|
12 | (1) |
|
|
13 | (1) |
|
|
13 | (1) |
|
|
14 | (1) |
|
|
14 | (1) |
|
What Can Happen When the System is Compromised? |
|
|
15 | (1) |
|
|
16 | (1) |
|
|
17 | (1) |
|
|
18 | (3) |
|
Passwords, Users, and Groups |
|
|
21 | (61) |
|
|
21 | (3) |
|
|
23 | (1) |
|
|
23 | (1) |
|
|
24 | (4) |
|
Passwords on the Group File |
|
|
26 | (1) |
|
|
27 | (1) |
|
|
28 | (2) |
|
|
28 | (2) |
|
|
30 | (1) |
|
|
30 | (1) |
|
|
30 | (1) |
|
Security Risk of the /etc/passwd File |
|
|
30 | (1) |
|
|
31 | (12) |
|
Implementing a Trusted System |
|
|
37 | (2) |
|
Details of the Trusted System |
|
|
39 | (4) |
|
Trusted Systems and Tools |
|
|
43 | (2) |
|
|
43 | (1) |
|
|
43 | (1) |
|
|
44 | (1) |
|
|
45 | (1) |
|
|
45 | (6) |
|
Standard Password Policies |
|
|
45 | (3) |
|
Trusted System Password Policies |
|
|
48 | (3) |
|
What Makes a Good Password? |
|
|
51 | (3) |
|
|
51 | (1) |
|
|
52 | (1) |
|
Forcing Acceptable Passwords |
|
|
52 | (1) |
|
|
52 | (2) |
|
Passwords and Multiple Hosts |
|
|
54 | (1) |
|
|
54 | (22) |
|
|
54 | (5) |
|
Adding Users with SAM Templates |
|
|
59 | (4) |
|
|
63 | (1) |
|
|
64 | (1) |
|
Locking/Deactivating a User |
|
|
65 | (9) |
|
Unlocking/Activating a User |
|
|
74 | (1) |
|
Status of Important Users |
|
|
75 | (1) |
|
|
76 | (1) |
|
|
76 | (1) |
|
The /etc/default/security File |
|
|
77 | (5) |
|
Abort Login on Missing Home Directory |
|
|
77 | (1) |
|
Change the Minimum Password Length |
|
|
78 | (1) |
|
|
78 | (1) |
|
Limit Number of Concurrent Sessions Per User |
|
|
79 | (1) |
|
|
79 | (1) |
|
Restrict su to Root by Group Membership |
|
|
80 | (1) |
|
Default PATH Variable When ``su''ing |
|
|
80 | (2) |
|
Disks, File Systems, and Permissions |
|
|
82 | (48) |
|
|
82 | (2) |
|
|
84 | (4) |
|
|
85 | (1) |
|
|
85 | (2) |
|
|
87 | (1) |
|
|
88 | (1) |
|
|
88 | (1) |
|
|
88 | (1) |
|
|
88 | (1) |
|
|
89 | (1) |
|
|
89 | (4) |
|
|
91 | (1) |
|
|
91 | (1) |
|
Protection from Disk Resource Attacks |
|
|
91 | (2) |
|
|
93 | (17) |
|
Traditional UNIX File Permissions |
|
|
93 | (3) |
|
|
96 | (5) |
|
|
101 | (2) |
|
|
103 | (1) |
|
|
104 | (2) |
|
|
106 | (1) |
|
|
107 | (1) |
|
Home Directory Permissions |
|
|
108 | (1) |
|
Permissions of Programs Installed with SD-UX |
|
|
109 | (1) |
|
|
110 | (11) |
|
|
111 | (9) |
|
|
120 | (1) |
|
Differences between HFS and JFS ACLs |
|
|
121 | (1) |
|
|
121 | (1) |
|
The chatr Command and the Executable Stack |
|
|
121 | (2) |
|
Restricting Execute Permission on Stacks |
|
|
122 | (1) |
|
|
123 | (3) |
|
|
126 | (4) |
|
Security and Network Attached Storage |
|
|
126 | (1) |
|
Security and the Storage Area Network |
|
|
127 | (1) |
|
|
127 | (1) |
|
|
128 | (2) |
|
|
130 | (46) |
|
|
131 | (4) |
|
|
135 | (1) |
|
The /etc/dialups and /etc/d_passwd Files |
|
|
136 | (1) |
|
|
137 | (16) |
|
Installing the Secure Web Console |
|
|
138 | (3) |
|
|
141 | (3) |
|
Operator Use of the Secure Web Console |
|
|
144 | (2) |
|
Upgrading the Secure Web Console Firmware |
|
|
146 | (4) |
|
Secure Web Console Documentation |
|
|
150 | (1) |
|
Web Console---How Does it Work? |
|
|
151 | (1) |
|
Secure Web Console, Authentication, Traffic, and SSL |
|
|
152 | (1) |
|
Physical Access and Boot Authentication |
|
|
153 | (1) |
|
Guardian Service Processor |
|
|
154 | (15) |
|
|
159 | (7) |
|
|
166 | (1) |
|
|
167 | (2) |
|
|
169 | (7) |
|
Restricting Login by Startup Script |
|
|
169 | (1) |
|
Trusted Systems: Restructing by Time of Day |
|
|
170 | (1) |
|
Trusted System: Enhanced Terminal Security |
|
|
171 | (3) |
|
|
174 | (2) |
|
|
176 | (27) |
|
|
176 | (8) |
|
|
177 | (1) |
|
|
178 | (3) |
|
Wildcard Characters in Equivalence Files |
|
|
181 | (1) |
|
|
182 | (1) |
|
The rexec and remsh Command |
|
|
183 | (1) |
|
|
184 | (1) |
|
|
184 | (1) |
|
|
185 | (3) |
|
|
188 | (1) |
|
|
189 | (9) |
|
Installing the LDAP Client |
|
|
190 | (1) |
|
|
191 | (5) |
|
|
196 | (1) |
|
LDAP Security Considerations and Functionality |
|
|
197 | (1) |
|
|
198 | (1) |
|
|
199 | (1) |
|
|
199 | (2) |
|
|
201 | (2) |
|
Distributing root Privileges |
|
|
203 | (20) |
|
SUID/SGID Scripts and Programs |
|
|
204 | (3) |
|
Breaking an SUID/SGID Script or Program |
|
|
204 | (3) |
|
|
207 | (12) |
|
Configuring Restricted SAM Using the Builder |
|
|
208 | (2) |
|
Configuring Restricted SAM---Command Line |
|
|
210 | (1) |
|
Testing the Restricted SAM Configuration |
|
|
211 | (1) |
|
How the Non-root User Runs SAM |
|
|
212 | (1) |
|
|
213 | (1) |
|
|
213 | (2) |
|
Customizing SAM Using the SAM Interface |
|
|
215 | (4) |
|
|
219 | (2) |
|
Installing sudo from Linked Binary |
|
|
219 | (1) |
|
Installing sudo from Source |
|
|
219 | (1) |
|
|
220 | (1) |
|
How the User Executes sudo |
|
|
221 | (1) |
|
|
221 | (1) |
|
|
221 | (1) |
|
|
222 | (1) |
|
|
222 | (1) |
|
|
223 | (36) |
|
Installation of the Central Management Server |
|
|
223 | (6) |
|
Adding Nodes to the SCM Cluster |
|
|
229 | (3) |
|
ServiceControl Manager Graphical User Interface |
|
|
232 | (2) |
|
|
234 | (1) |
|
|
235 | (2) |
|
|
237 | (10) |
|
|
247 | (4) |
|
|
251 | (2) |
|
|
253 | (2) |
|
|
255 | (2) |
|
|
257 | (2) |
|
|
259 | (25) |
|
The Internet Daemon Startup |
|
|
259 | (1) |
|
|
259 | (1) |
|
|
260 | (1) |
|
|
261 | (1) |
|
|
261 | (1) |
|
Understanding Socket Connections |
|
|
261 | (1) |
|
|
262 | (5) |
|
|
262 | (2) |
|
Configuring tcpwrapper: Method 1 |
|
|
264 | (1) |
|
Configuring tcpwrapper: Method 2 |
|
|
264 | (1) |
|
|
265 | (1) |
|
tcpwrapper Access Control |
|
|
265 | (2) |
|
|
267 | (2) |
|
|
269 | (8) |
|
|
271 | (1) |
|
The FTP Configuration File |
|
|
272 | (4) |
|
|
276 | (1) |
|
|
277 | (3) |
|
|
280 | (1) |
|
|
281 | (1) |
|
|
282 | (1) |
|
Running Other Services from inetd |
|
|
283 | (1) |
|
|
284 | (26) |
|
|
285 | (1) |
|
|
286 | (4) |
|
|
288 | (1) |
|
|
289 | (1) |
|
|
290 | (1) |
|
|
290 | (14) |
|
|
304 | (1) |
|
|
304 | (1) |
|
|
305 | (1) |
|
Kerberos and the -P Option |
|
|
306 | (2) |
|
|
308 | (2) |
|
|
310 | (14) |
|
|
311 | (7) |
|
|
318 | (3) |
|
|
321 | (1) |
|
Using IPSec/9000 as a Firewall |
|
|
321 | (1) |
|
|
321 | (2) |
|
Managing Keys on IPSec/9000 |
|
|
323 | (1) |
|
Monitoring System Activity |
|
|
324 | (42) |
|
|
324 | (2) |
|
|
326 | (1) |
|
|
327 | (1) |
|
|
328 | (3) |
|
Login History Displayed at login |
|
|
329 | (2) |
|
|
331 | (2) |
|
|
333 | (1) |
|
|
334 | (1) |
|
|
334 | (2) |
|
Open Source Log Tools and Utilities |
|
|
336 | (1) |
|
|
337 | (3) |
|
|
340 | (12) |
|
|
341 | (3) |
|
|
344 | (2) |
|
|
346 | (4) |
|
Interpreting the Audit Log Data |
|
|
350 | (2) |
|
|
352 | (3) |
|
Utilizing Performance Data |
|
|
355 | (9) |
|
The Performance Collection Daemon |
|
|
356 | (8) |
|
Monitoring System Resources |
|
|
364 | (1) |
|
Managing System Resources |
|
|
365 | (1) |
|
Monitoring System Changes |
|
|
366 | (20) |
|
System Configuration Repository |
|
|
366 | (10) |
|
|
367 | (1) |
|
|
367 | (4) |
|
Viewing the SCR Information |
|
|
371 | (3) |
|
Creating a Customized Filter |
|
|
374 | (1) |
|
|
375 | (1) |
|
|
376 | (1) |
|
|
376 | (10) |
|
|
376 | (3) |
|
|
379 | (4) |
|
|
383 | (3) |
|
|
386 | (20) |
|
|
386 | (3) |
|
|
389 | (1) |
|
|
390 | (1) |
|
|
390 | (1) |
|
Intrusion Detection System/9000 |
|
|
391 | (15) |
|
Installing and Configuring IDS/9000 |
|
|
393 | (3) |
|
Surveillance Groups and Schedules |
|
|
396 | (5) |
|
|
401 | (2) |
|
|
403 | (1) |
|
|
403 | (3) |
|
|
406 | (29) |
|
|
|
|
|
|
407 | (1) |
|
|
407 | (1) |
|
|
408 | (27) |
|
|
409 | (4) |
|
Install Additional Products |
|
|
413 | (1) |
|
Install Support Plus Bundle |
|
|
414 | (1) |
|
|
414 | (2) |
|
|
416 | (4) |
|
Disable Network Services (inetd Services) |
|
|
420 | (2) |
|
|
422 | (4) |
|
|
426 | (3) |
|
|
429 | (1) |
|
|
430 | (1) |
|
|
431 | (2) |
|
Install Software and Test Configuration |
|
|
433 | (1) |
|
Create System Recovery Tape |
|
|
433 | (2) |
|
Checklist, Security, Patches, and Miscellaneous Topics |
|
|
435 | (17) |
|
|
435 | (3) |
|
The HP-UX Security Patch Check Tool |
|
|
438 | (5) |
|
The HP-UX Security Book Web Site |
|
|
443 | (1) |
|
Continuing Your Knowledge |
|
|
443 | (1) |
|
|
444 | (3) |
|
Protecting Your System Against ``Ten Ways to Become root'' |
|
|
447 | (3) |
|
The Bastille Hardening System |
|
|
450 | (1) |
|
|
451 | (1) |
Index |
|
452 | |