HP-UX System Administrator's Guide: Security Management HP-UX 11i v3 (B3921-90020, September 2010)

Table Of Contents
putpwent function, 191
putspwent function, 191
R
random number generator, 83
recovery
security guidelines for, 26
remote access
security guidelines for managing, 55
Remote Access Services, 67
overview of, 67
remote procedure call
See RPC, 73
remote sessions
securing using SSH, 76
reuse
password, 190
roleadm, 149
examples, 150
syntax, 149
roles
configuring, 149
default, 150
groups, 151
guidelines for creating, 146
root
drawbacks of, 137
root access
gaining, 24
monitoring, 58
reviewing, 59
using Restricted SMH Builder for limited, 58
root account
protecting, 57
RPC
and TCP wrappers, 73
RSA cryptosystem, 203, 204
rsh command
limiting system access with, 30
run level
changing, 53
controlling access with, 53
S
screen lock
configuring, 54
Sec00Tools security level, 25
Sec20MngDMZ security level, 25
Sec30DMZ security level, 25
Secure Shell
see SSH, 76
securing remote sessions, 76
security attribute
defining, 46, 62
security level
choosing during installation, 25
security patch
installing, 26
SecurityMon file set, 186
selection and generation, 189
self-auditing program, 181
set group ID program
See setgid programs, 50
set user ID program
See setuid programs, 50
setacl command
changing ACLs with, 97
changing JFS ACLs with, 100
setfilexsec command, 113, 128
setgid programs, 27, 192
managing, 50
setuid programs, 27, 192
managing, 50
shadow password, 43
single-user mode
booting into, 24
SIS, 73
Software Assistant
using, 26
spoofing
defined, 70
protecting against using TCP wrappers, 72
SSH, 46
associated technologies, 83
authentication, 76, 80
encryption, 76
features, 76
GSS-API, 81
HP-UX system, 82
password authentication, 82
port forwarding, 77
privileged mode execution, 79
public key based authentication, 81
running, 78
running scp client, 79
running sftp client, 79
running ssh client, 78
securing remote sessions, 76
software components, 77
strong random number generator, 83
support for TCP wrappers, 84
SSH-1 protocol, 82
SSH-2 protocol, 82
stack buffer overflow protection, 52
sticky bit
setting, 89
strong random number generator, 83
superuser access
monitoring, 58
protecting, 57
reviewing, 59
using Restricted SMH Builder for limited, 58
swlist command, 186
211