Security Help
Mark Bradley
markb at stan.Solbourne.COM
Thu May 3 03:28:10 AEST 1990
With the latest flurry of concerns over security, networked or otherwise,
I have reposted this without permission of the authors in hopes that some
might benefit from it. Good luck. For the impoverished, underpaid, and
overworked, I think this is free. :{) I especially like the section
devoted to the "Wily Hacker".
markb
================================================================
From: davy at itstd.sri.com
Subject: "Improving the Security of Your UNIX System"
Message-ID: <7285 at brazos.Rice.edu>
Date: 2 May 90 02:22:29 GMT
A new white paper from SRI International's Information and
Telecommunication Sciences and Technology Division is now available.
The paper, "Improving the Security of Your UNIX System," describes
measures that you as a system administrator can take to make your UNIX
system(s) more secure. Oriented primarily at SunOS 4.x, most of the
information covered applies equally well to any Berkeley UNIX system with
or without NFS and/or Yellow Pages (NIS). Some of the information can
also be applied to System V, although this is not a primary focus of the
paper.
An abbreviated Table of Contents:
1. INTRODUCTION
The Internet Worm, the Wily Hacker, other break-ins
2. IMPROVING SECURITY
2.1 Account Security
Passwords, expiration dates, guest accounts, group accounts,
Yellow Pages
2.2 Network Security
Trusted hosts, secure terminals, NFS, FTP, TFTP, mail,
finger, modems and terminal servers, firewalls
2.3 File System Security
Setuid shell scripts, sticky bit on directories, setgid
bit on directories, umask values, encrypting files,
devices
3. MONITORING SECURITY
3.1 Account Security
lastlog, utmp, wtmp, acct
3.2 Network Security
syslog, showmount
3.3 File System Security
find, checklists, backups
3.4 Know Your System
ps, who, w, ls
4. SOFTWARE FOR IMPROVING SECURITY
4.1 Obtaining Fixes and New Versions
Sun fixes on UUNET, Berkeley fixes, SIMTEL-20 and UUNET,
vendors
4.2 The npasswd Command
4.3 The COPS Package
4.4 Sun C2 Security Features
4.5 Kerberos
5. KEEPING ABREAST OF THE BUGS
5.1 CERT
5.2 DDN Management Bulletins
5.3 Security-related mailing lists
6. SUGGESTED READING
7. CONCLUSIONS
REFERENCES
APPENDIX A - SECURITY CHECKLIST
In order to format the paper, the "troff" text formatter and the "-ms"
macro package (available with any Sun or Berkeley UNIX system) are
required. You *do not* need a PostScript printer, unless you want to
print the cover page with the SRI logo on it.
The paper is available via anonymous FTP from the host SPAM.ITSTD.SRI.COM
(128.18.4.3) as the file "pub/security-doc.tar.Z". Be sure to remember to
set "image" mode on the transfer. Sorry, UUCP access is not available -
if you don't have Internet access, find a friend who does.
Enjoy.
Dave Curry
SRI International
Information and Telecommunications
Sciences and Technology Division
333 Ravenswood Avenue
Menlo Park, CA 94025
(415) 859-2508
davy at itstd.sri.com
--
Mark Bradley Faster, faster, until the thrill
I/O Subsystems of speed overcomes the fear of death.
Solbourne Computer, Inc. --Hunter S. Thompson
More information about the Comp.sys.sgi
mailing list