HP-UX Host Intrusion Detection System Version 4.3 administrator guide
Table Of Contents
- HP-UX Host Intrusion Detection System Version 4.3 administrator guide
- Table of Contents
- About This Document
- 1 Introduction
- 2 Configuring HP-UX HIDS
- 3 Getting Started with HP-UX HIDS
- 4 Using the System Manager Screen
- Starting the HP-UX HIDS System Manager
- Stopping the HP-UX HIDS System Manager
- System Manager Components
- Starting HP-UX HIDS Agents
- Getting the Status of Agent Hosts
- Resynchronizing Agent Hosts
- Activating Schedules on Agent Hosts
- Stopping Schedules on Agent Hosts
- Halting HP-UX HIDS Agents
- Accessing Other Screens
- 5 Using the Schedule Manager Screen
- The Schedule Manager
- Configuring Surveillance Schedules
- Configuring Surveillance Groups
- Configuring Detection Templates
- Setting Surveillance Schedule Timetables
- Configuring Alert Aggregation
- Configuring Monitor Failed Attempts
- Configuring Duplicate Alert Suppression
- Viewing Surveillance Schedule Details
- Predefined Surveillance Schedules and Groups
- 6 Using the Host Manager Screen
- 7 Using the Network Node Screen
- 8 Using the Preferences Screen
- A Templates and Alerts
- Alert Summary
- UNIX Regular Expressions
- Limitations
- Template Property Types
- Buffer Overflow Template
- Race Condition Template
- Modification of files/directories Template
- Changes to Log File Template
- Creation and Modification of setuid/setgid File Template
- Creation of World-Writable File Template
- Modification of Another User’s File Template
- Login/Logout Template
- Repeated Failed Logins Template
- Repeated Failed su Commands Template
- Log File Monitoring Template
- B Automated Response for Alerts
- C Tuning Schedules and Generating Alert Reports
- D The Agent Configuration File
- E The Surveillance Schedule Text File
- F Error Messages
- G Troubleshooting
- Troubleshooting
- Agent and System Manager cannot communicate with each other
- Agent complains that idds has not been enabled, yet lsdev shows /dev/idds is present
- Agent does not start on system boot
- Agent halts abnormally, leaving ids_* files and message queues
- Agent host appears to hang and/or you see message disk full
- Agent needs further troubleshooting
- Agent does not start after installation
- Agents appear to be stuck in polling status
- Agent displays error if hostname to IP mapping is not registered in name service
- Aggregated alerts targets or details field are truncated and the same aggregated alert has several entries logged in the IDS_ALERTFILE
- Alert date/time sort seems inconsistent
- Alerts are not being displayed in the alert browser
- Buffer overflow triggers false positives
- Duplicate alerts appear in System Manager
- Getting several aggregated alerts for the same process
- GUI runs out of memory after receiving around 19,000 alerts
- The idsadmin Command needs installed agent certificates
- The idsadmin Command notifies of bad certificate when pinging a remote agent
- IDS_checkInstall fails with a kmtune error
- IDS_genAdminKeys or IDS_genAgentCerts does not complete successfully
- IDS_genAdminKeys or idsgui quits early
- Large files in /var/opt/ids
- Log files are filling up
- No Agent Available
- Normal operation of an application generates heavy volume of alerts
- Reflection X rlogin produces multiple login and logout alerts
- Schedule Manager timetable screen appears to hang
- SSH does not perform a clean exit after idsagent is started
- System Manager appears to hang
- System Manager does not let you save files to specific directories
- System Manager does not start after idsgui is started
- System Manager starts with no borders or title bar in X client programs on Windows
- System Manager times out on agent functions such as Activate and Status Poll
- UNKNOWN program and arguments in certain alert messages
- Using HP-UX HIDS with IPFilter and SecureShell
- Unable to Generate Administrator Keys and Agent Certificates on PA–RISC 1.1 Systems
- Troubleshooting
- H HP Software License

How Automated Response Works in HP-UX HIDS
This section discusses how the response programs handle the agent alerts.
Alert Process
When the agent generates an alert, the following actions occur:
1. The agent stores the alert in a local log file with a path name defined by the IDS_ALERTFILE
configuration variable. The default is /var/opt/ids/alert.log. For information, see
“The Agent Configuration File” (page 191).
2. If it is communicating with the System Manager, the agent sends the alert to the System
Manager.
3. The agent looks for executable files in the directory defined by the IDS_RESPONSE_DIR
configuration variable. The default directory is /opt/ids/response. For more information,
see “The Agent Configuration File” (page 191)
The agent can execute up to 50 files. If there are more than 50 files in the
IDS_RESPONSE_DIR, the agent selects 50 ordinary files each time an alert is generated and
ignores the rest.
4. For each executable file, the agent sets certain environment variables and passes the alert
details as command-line parameters.
5. The agent executes the files one at a time in ASCII sorted order, but does not wait for them
to terminate.
NOTE: When alert aggregation is enabled, only aggregated alerts and alerts that are not
or cannot be aggregated follow the alert process above. For more information about alert
aggregation, see “Configuring Alert Aggregation” (page 72).
The alert process does not apply to the additional real-time alerts that are issued when both
the alert aggregation and the real-time alerts options are enabled. These additional real time
alerts are not logged to IDS_ALERTFILE and are not sent to the System Manager. Instead,
they are only sent to any response programs in the directory defined by the
IDS_RT_RESPONSE_DIR configuration variable. The default directory is /opt/ids/
rt_response.
Security Checks
The following rules apply to the response directory and its files:
□ If the response directory fails these checks, then no response program is run.
• The directory must not be world-writable, that is, not writable by others.
• The directory must be owned by user ids.
• The directory must be local; it cannot be a symbolic link, a pipe, NFS-mounted, and so
on.
□ If a response program fails these checks, it is not run.
• A file in the response directory must be a local regular file; it cannot be a symbolic link,
a pipe, NFS-mounted, and so on.
• A file in the response directory must not be world-writable.
Programming Notes
1. Response programs run with the same user ID as the HP-UX HIDS agent. While this is not
a privileged user ID, you can modify and delete HP-UX HIDS files using this ID. Pay attention
to security issues when planning alert response design.
2. Response programs are detached from a controlling terminal and runs as a background
process. Standard output and standard error are both redirected to the error log file, as
defined by the IDS_ERRORFILE configuration variable. The default is /var/opt/ids/
error.log.
160 Automated Response for Alerts