HP-UX Host Intrusion Detection System Version 4.3 administrator guide
Table Of Contents
- HP-UX Host Intrusion Detection System Version 4.3 administrator guide
- Table of Contents
- About This Document
- 1 Introduction
- 2 Configuring HP-UX HIDS
- 3 Getting Started with HP-UX HIDS
- 4 Using the System Manager Screen
- Starting the HP-UX HIDS System Manager
- Stopping the HP-UX HIDS System Manager
- System Manager Components
- Starting HP-UX HIDS Agents
- Getting the Status of Agent Hosts
- Resynchronizing Agent Hosts
- Activating Schedules on Agent Hosts
- Stopping Schedules on Agent Hosts
- Halting HP-UX HIDS Agents
- Accessing Other Screens
- 5 Using the Schedule Manager Screen
- The Schedule Manager
- Configuring Surveillance Schedules
- Configuring Surveillance Groups
- Configuring Detection Templates
- Setting Surveillance Schedule Timetables
- Configuring Alert Aggregation
- Configuring Monitor Failed Attempts
- Configuring Duplicate Alert Suppression
- Viewing Surveillance Schedule Details
- Predefined Surveillance Schedules and Groups
- 6 Using the Host Manager Screen
- 7 Using the Network Node Screen
- 8 Using the Preferences Screen
- A Templates and Alerts
- Alert Summary
- UNIX Regular Expressions
- Limitations
- Template Property Types
- Buffer Overflow Template
- Race Condition Template
- Modification of files/directories Template
- Changes to Log File Template
- Creation and Modification of setuid/setgid File Template
- Creation of World-Writable File Template
- Modification of Another User’s File Template
- Login/Logout Template
- Repeated Failed Logins Template
- Repeated Failed su Commands Template
- Log File Monitoring Template
- B Automated Response for Alerts
- C Tuning Schedules and Generating Alert Reports
- D The Agent Configuration File
- E The Surveillance Schedule Text File
- F Error Messages
- G Troubleshooting
- Troubleshooting
- Agent and System Manager cannot communicate with each other
- Agent complains that idds has not been enabled, yet lsdev shows /dev/idds is present
- Agent does not start on system boot
- Agent halts abnormally, leaving ids_* files and message queues
- Agent host appears to hang and/or you see message disk full
- Agent needs further troubleshooting
- Agent does not start after installation
- Agents appear to be stuck in polling status
- Agent displays error if hostname to IP mapping is not registered in name service
- Aggregated alerts targets or details field are truncated and the same aggregated alert has several entries logged in the IDS_ALERTFILE
- Alert date/time sort seems inconsistent
- Alerts are not being displayed in the alert browser
- Buffer overflow triggers false positives
- Duplicate alerts appear in System Manager
- Getting several aggregated alerts for the same process
- GUI runs out of memory after receiving around 19,000 alerts
- The idsadmin Command needs installed agent certificates
- The idsadmin Command notifies of bad certificate when pinging a remote agent
- IDS_checkInstall fails with a kmtune error
- IDS_genAdminKeys or IDS_genAgentCerts does not complete successfully
- IDS_genAdminKeys or idsgui quits early
- Large files in /var/opt/ids
- Log files are filling up
- No Agent Available
- Normal operation of an application generates heavy volume of alerts
- Reflection X rlogin produces multiple login and logout alerts
- Schedule Manager timetable screen appears to hang
- SSH does not perform a clean exit after idsagent is started
- System Manager appears to hang
- System Manager does not let you save files to specific directories
- System Manager does not start after idsgui is started
- System Manager starts with no borders or title bar in X client programs on Windows
- System Manager times out on agent functions such as Activate and Status Poll
- UNKNOWN program and arguments in certain alert messages
- Using HP-UX HIDS with IPFilter and SecureShell
- Unable to Generate Administrator Keys and Agent Certificates on PA–RISC 1.1 Systems
- Troubleshooting
- H HP Software License

3. If you must transmit alert information to another system, set up your own secure
communication process.
4. If a response program has its setuid or setgid bit set, it runs as that effective user or
group. It is a good practice to restrict setuid and setgid programs to the absolute minimum
necessary. For more information, see “Writing Privileged Response Programs” (page 167).
5. When a response program is started, the agent process provides it with a set of environment
variables listed in Table B-9, and passes the alert information as program arguments listed
in Table B-1. Tables B-1 to B-6 for the alert information passed as arguments 0 through 9 for
each template.
Table B-1 Additional Arguments Passed to Response Programs for Kernel Template Alerts
DescriptionAlert Value/FormatAlert Field TypeAlert FieldResponse
Program
Argument
System call number that triggered
the alert. Corresponds to a number
defined in scall_define.h.
<syscall#>
IntegerSystem Call #
argv[10]
Process ID (pid) of the attacker
<pid>
IntegerAttacker
Process ID
argv[11]
Parent process ID (ppid) of the
attacker
<ppid>
IntegerAttacker Parent
Process ID
argv[12]
User ID (uid) of the attacker
<uid>
IntegerAttacker User
ID
argv[13]
Group ID (gid) of the attacker
<gid>
IntegerAttacker Group
ID
argv[14]
Effective user ID (euid) of the
attacker
<euid>
IntegerAttacker
Effective User
ID
argv[15]
Effective group ID (egid) of the
attacker
<egid>
IntegerAttacker
Effective Group
ID
argv[16]
Full pathname of the file under
attack
<full pathname>
StringPathname of
Target File
argv[17]
File type of the file under attack.
Corresponds to an enum vtype
value defined in vnode.h.
<type>
IntegerTarget File Type
argv[18]
Mode of file under attack
<mode>(decimal)
IntegerTarget File
Mode
argv[19]
Owner of the file (uid) under attack
<uid>
IntegerTarget File
Owner
argv[20]
Group of the file (gid) under attack
<gid>
IntegerTarget File
Group
argv[21]
Inode number of the file under attack
<inode>
IntegerTarget File
Inode
argv[22]
Device number of the file under
attack
<device>
IntegerTarget File
Device
argv[23]
Full pathname of the attack program
<full pathname>
StringPathname of
attack program
argv[24]
File type of the attack program.
Corresponds to an enum vtype
value defined in vnode.h.
<type>IntegerAttack Program
Type
argv[25]
How Automated Response Works in HP-UX HIDS 161