HP-UX Host Intrusion Detection System Version 4.3 administrator guide
Table Of Contents
- HP-UX Host Intrusion Detection System Version 4.3 administrator guide
- Table of Contents
- About This Document
- 1 Introduction
- 2 Configuring HP-UX HIDS
- 3 Getting Started with HP-UX HIDS
- 4 Using the System Manager Screen
- Starting the HP-UX HIDS System Manager
- Stopping the HP-UX HIDS System Manager
- System Manager Components
- Starting HP-UX HIDS Agents
- Getting the Status of Agent Hosts
- Resynchronizing Agent Hosts
- Activating Schedules on Agent Hosts
- Stopping Schedules on Agent Hosts
- Halting HP-UX HIDS Agents
- Accessing Other Screens
- 5 Using the Schedule Manager Screen
- The Schedule Manager
- Configuring Surveillance Schedules
- Configuring Surveillance Groups
- Configuring Detection Templates
- Setting Surveillance Schedule Timetables
- Configuring Alert Aggregation
- Configuring Monitor Failed Attempts
- Configuring Duplicate Alert Suppression
- Viewing Surveillance Schedule Details
- Predefined Surveillance Schedules and Groups
- 6 Using the Host Manager Screen
- 7 Using the Network Node Screen
- 8 Using the Preferences Screen
- A Templates and Alerts
- Alert Summary
- UNIX Regular Expressions
- Limitations
- Template Property Types
- Buffer Overflow Template
- Race Condition Template
- Modification of files/directories Template
- Changes to Log File Template
- Creation and Modification of setuid/setgid File Template
- Creation of World-Writable File Template
- Modification of Another User’s File Template
- Login/Logout Template
- Repeated Failed Logins Template
- Repeated Failed su Commands Template
- Log File Monitoring Template
- B Automated Response for Alerts
- C Tuning Schedules and Generating Alert Reports
- D The Agent Configuration File
- E The Surveillance Schedule Text File
- F Error Messages
- G Troubleshooting
- Troubleshooting
- Agent and System Manager cannot communicate with each other
- Agent complains that idds has not been enabled, yet lsdev shows /dev/idds is present
- Agent does not start on system boot
- Agent halts abnormally, leaving ids_* files and message queues
- Agent host appears to hang and/or you see message disk full
- Agent needs further troubleshooting
- Agent does not start after installation
- Agents appear to be stuck in polling status
- Agent displays error if hostname to IP mapping is not registered in name service
- Aggregated alerts targets or details field are truncated and the same aggregated alert has several entries logged in the IDS_ALERTFILE
- Alert date/time sort seems inconsistent
- Alerts are not being displayed in the alert browser
- Buffer overflow triggers false positives
- Duplicate alerts appear in System Manager
- Getting several aggregated alerts for the same process
- GUI runs out of memory after receiving around 19,000 alerts
- The idsadmin Command needs installed agent certificates
- The idsadmin Command notifies of bad certificate when pinging a remote agent
- IDS_checkInstall fails with a kmtune error
- IDS_genAdminKeys or IDS_genAgentCerts does not complete successfully
- IDS_genAdminKeys or idsgui quits early
- Large files in /var/opt/ids
- Log files are filling up
- No Agent Available
- Normal operation of an application generates heavy volume of alerts
- Reflection X rlogin produces multiple login and logout alerts
- Schedule Manager timetable screen appears to hang
- SSH does not perform a clean exit after idsagent is started
- System Manager appears to hang
- System Manager does not let you save files to specific directories
- System Manager does not start after idsgui is started
- System Manager starts with no borders or title bar in X client programs on Windows
- System Manager times out on agent functions such as Activate and Status Poll
- UNKNOWN program and arguments in certain alert messages
- Using HP-UX HIDS with IPFilter and SecureShell
- Unable to Generate Administrator Keys and Agent Certificates on PA–RISC 1.1 Systems
- Troubleshooting
- H HP Software License
the serious problem that comes from within. Industrial corporate espionage is also a significant
threat.
How are These Threats Realized?
This section discusses the circumstances that lead to some common security problems.
Misplaced Trust
Trust can be misplaced during any of the following events:
• While accessing the website of a specific company, you trust that it is the website of the
company you intend to visit.
• When you download product data from a website, you trust that it is accurate.
• When you order a company’s product from the Internet, you trust that your order information
is being kept confidential.
• When you receive email messages, you trust that sender information is accurate.
• When you type your password into a program, you trust that the program does not include
code to decrypt the password at a later date.
Malicious Code
Computer viruses are the single biggest cause of lost productivity in business environments. The
real cost of viruses is not the damage they cause, but the total cost of cleanup to ensure that the
infection has not spread throughout the company network. Moreover, Java™ and ActiveX permit
the downloading of executable code from the Internet without any assurances of its real purpose.
There are many examples of websites that contain ActiveX or Java applets that steal files from
your hard drive.
Strong Security with a Weak Link
Vulnerability of a system when you download executables from the web depends on its weakest
link. For example, a router vendor shipped boxes with a default password that was easy to guess.
Most administrators forgot to change the password. Despite investing many hours in correctly
configuring the routers for secure operation, their security can be defeated in seconds by an
attacker who knew the password.
Exploitation of Critical Infrastructure Elements
As more business is done over the Internet, more trust is placed in critical infrastructure elements:
the routers, hubs, and web servers that move data around the Internet. This infrastructure also
include DNS name servers that enable users to access URLs from their browsers. A DNS server
maps names such as www.company.com to an Internet Protocol (IP) address, such as 10.2.3.4.
By targeting these important infrastructure services, an attacker can bring down a whole
organization. Sometimes attackers do not have to steal your information to hurt you. By simply
making your systems unavailable for use, such attackers can cause losses in both revenue and
credibility in your industry.
Misconfigured Software and Hardware
If you do not configure a critical piece of software or hardware properly, your network becomes
vulnerable to security attacks. This is a particular problem in the area of firewalls, where
configuration rules are complex. One missing rule can leave your whole internal network open
to attack.
Excessive Privileges for Simple Tasks
A code that runs with privileges (such as root on UNIX® systems, or as administrator on Windows
NT® systems) is particularly vulnerable, because a simple bug can have a major impact. Codes
20 Introduction