HP-UX Host Intrusion Detection System Version 4.3 administrator guide
Table Of Contents
- HP-UX Host Intrusion Detection System Version 4.3 administrator guide
- Table of Contents
- About This Document
- 1 Introduction
- 2 Configuring HP-UX HIDS
- 3 Getting Started with HP-UX HIDS
- 4 Using the System Manager Screen
- Starting the HP-UX HIDS System Manager
- Stopping the HP-UX HIDS System Manager
- System Manager Components
- Starting HP-UX HIDS Agents
- Getting the Status of Agent Hosts
- Resynchronizing Agent Hosts
- Activating Schedules on Agent Hosts
- Stopping Schedules on Agent Hosts
- Halting HP-UX HIDS Agents
- Accessing Other Screens
- 5 Using the Schedule Manager Screen
- The Schedule Manager
- Configuring Surveillance Schedules
- Configuring Surveillance Groups
- Configuring Detection Templates
- Setting Surveillance Schedule Timetables
- Configuring Alert Aggregation
- Configuring Monitor Failed Attempts
- Configuring Duplicate Alert Suppression
- Viewing Surveillance Schedule Details
- Predefined Surveillance Schedules and Groups
- 6 Using the Host Manager Screen
- 7 Using the Network Node Screen
- 8 Using the Preferences Screen
- A Templates and Alerts
- Alert Summary
- UNIX Regular Expressions
- Limitations
- Template Property Types
- Buffer Overflow Template
- Race Condition Template
- Modification of files/directories Template
- Changes to Log File Template
- Creation and Modification of setuid/setgid File Template
- Creation of World-Writable File Template
- Modification of Another User’s File Template
- Login/Logout Template
- Repeated Failed Logins Template
- Repeated Failed su Commands Template
- Log File Monitoring Template
- B Automated Response for Alerts
- C Tuning Schedules and Generating Alert Reports
- D The Agent Configuration File
- E The Surveillance Schedule Text File
- F Error Messages
- G Troubleshooting
- Troubleshooting
- Agent and System Manager cannot communicate with each other
- Agent complains that idds has not been enabled, yet lsdev shows /dev/idds is present
- Agent does not start on system boot
- Agent halts abnormally, leaving ids_* files and message queues
- Agent host appears to hang and/or you see message disk full
- Agent needs further troubleshooting
- Agent does not start after installation
- Agents appear to be stuck in polling status
- Agent displays error if hostname to IP mapping is not registered in name service
- Aggregated alerts targets or details field are truncated and the same aggregated alert has several entries logged in the IDS_ALERTFILE
- Alert date/time sort seems inconsistent
- Alerts are not being displayed in the alert browser
- Buffer overflow triggers false positives
- Duplicate alerts appear in System Manager
- Getting several aggregated alerts for the same process
- GUI runs out of memory after receiving around 19,000 alerts
- The idsadmin Command needs installed agent certificates
- The idsadmin Command notifies of bad certificate when pinging a remote agent
- IDS_checkInstall fails with a kmtune error
- IDS_genAdminKeys or IDS_genAgentCerts does not complete successfully
- IDS_genAdminKeys or idsgui quits early
- Large files in /var/opt/ids
- Log files are filling up
- No Agent Available
- Normal operation of an application generates heavy volume of alerts
- Reflection X rlogin produces multiple login and logout alerts
- Schedule Manager timetable screen appears to hang
- SSH does not perform a clean exit after idsagent is started
- System Manager appears to hang
- System Manager does not let you save files to specific directories
- System Manager does not start after idsgui is started
- System Manager starts with no borders or title bar in X client programs on Windows
- System Manager times out on agent functions such as Activate and Status Poll
- UNKNOWN program and arguments in certain alert messages
- Using HP-UX HIDS with IPFilter and SecureShell
- Unable to Generate Administrator Keys and Agent Certificates on PA–RISC 1.1 Systems
- Troubleshooting
- H HP Software License

B Automated Response for Alerts
This appendix describes how to use response programs to process alerts automatically according
to your installation policy. It includes a sample C program, several sample response scripts, and
information about a prepackaged response program that communicates with HP OpenView
VantagePoint Operations. This appendix addresses the following topics:
• “How Automated Response Works in HP-UX HIDS” (page 160)
• “Programming Guidelines” (page 166)
• “Sample Response Programs” (page 171)
• “HP OpenView Operations SMART Plug-In” (page 177)
Response programs enable you to capture alerts automatically as they are generated by the
HP-UX HIDS agent, and to use your own tools to process them and make decisions, such as
alerting a system administrator about a potential intrusion. Response programs work in addition
to the normal agent-administration interface of HP-UX HIDS, in which alerts are reported to the
System Manager process on the administration system.
The response programs are executed on the agent system that generates the alert, thus enabling
near real-time intrusion response in the face of potential misuse.
Consider the following guidelines when responding to an intrusion attempt on a system:
• Do not do anything that is illegal in your region of the world.
Consult your local legal counsel before devising response strategies.
• Balance the response against the threat.
Not every target of an attack justifies an equal response; configure responses in proportion
to threats.
• Determine whether attack isolation is more important than continuous availability.
In response to an attack, you can disable networking on a server to isolate it from further
attacks. This isolation also serves to preserve any evidence of an intrusion. However, by
isolating the server, you can interfere with legitimate business activities.
Response Methods
Responses to intrusions use one of the following methods.
• Forwarding Information
Information about the alert can be forwarded by sending an email or calling a pager. Filtering
is required to prevent repeated alerts from causing a storm of pages. For examples, see
“Forwarding Information” (page 172).
• Halting Further Attacks
Automated response can halt further attacks by changing an attribute of the system. For
example, disabling an account, disabling remote logins, or changing a directory's access
permissions. For examples, see “Halting Further Attacks” (page 173).
• Preservation of Evidence
If evidence is to be preserved and analyzed, a response script can halt all further processing
on the system. Alternatively, it can disable network connections so that the system is
preserved in a running state. For examples, see “Preserving Evidence” (page 175).
• System Restoration to a Stable State
If business continuity is important, the system must be restored to a stable state. If critical
files are modified, they can be restored from trusted read-only media. For examples, see
“System Restoration to a Stable state” (page 177).
Response Methods 159