HP-UX Host Intrusion Detection System Version 4.3 administrator guide
Table Of Contents
- HP-UX Host Intrusion Detection System Version 4.3 administrator guide
- Table of Contents
- About This Document
- 1 Introduction
- 2 Configuring HP-UX HIDS
- 3 Getting Started with HP-UX HIDS
- 4 Using the System Manager Screen
- Starting the HP-UX HIDS System Manager
- Stopping the HP-UX HIDS System Manager
- System Manager Components
- Starting HP-UX HIDS Agents
- Getting the Status of Agent Hosts
- Resynchronizing Agent Hosts
- Activating Schedules on Agent Hosts
- Stopping Schedules on Agent Hosts
- Halting HP-UX HIDS Agents
- Accessing Other Screens
- 5 Using the Schedule Manager Screen
- The Schedule Manager
- Configuring Surveillance Schedules
- Configuring Surveillance Groups
- Configuring Detection Templates
- Setting Surveillance Schedule Timetables
- Configuring Alert Aggregation
- Configuring Monitor Failed Attempts
- Configuring Duplicate Alert Suppression
- Viewing Surveillance Schedule Details
- Predefined Surveillance Schedules and Groups
- 6 Using the Host Manager Screen
- 7 Using the Network Node Screen
- 8 Using the Preferences Screen
- A Templates and Alerts
- Alert Summary
- UNIX Regular Expressions
- Limitations
- Template Property Types
- Buffer Overflow Template
- Race Condition Template
- Modification of files/directories Template
- Changes to Log File Template
- Creation and Modification of setuid/setgid File Template
- Creation of World-Writable File Template
- Modification of Another User’s File Template
- Login/Logout Template
- Repeated Failed Logins Template
- Repeated Failed su Commands Template
- Log File Monitoring Template
- B Automated Response for Alerts
- C Tuning Schedules and Generating Alert Reports
- D The Agent Configuration File
- E The Surveillance Schedule Text File
- F Error Messages
- G Troubleshooting
- Troubleshooting
- Agent and System Manager cannot communicate with each other
- Agent complains that idds has not been enabled, yet lsdev shows /dev/idds is present
- Agent does not start on system boot
- Agent halts abnormally, leaving ids_* files and message queues
- Agent host appears to hang and/or you see message disk full
- Agent needs further troubleshooting
- Agent does not start after installation
- Agents appear to be stuck in polling status
- Agent displays error if hostname to IP mapping is not registered in name service
- Aggregated alerts targets or details field are truncated and the same aggregated alert has several entries logged in the IDS_ALERTFILE
- Alert date/time sort seems inconsistent
- Alerts are not being displayed in the alert browser
- Buffer overflow triggers false positives
- Duplicate alerts appear in System Manager
- Getting several aggregated alerts for the same process
- GUI runs out of memory after receiving around 19,000 alerts
- The idsadmin Command needs installed agent certificates
- The idsadmin Command notifies of bad certificate when pinging a remote agent
- IDS_checkInstall fails with a kmtune error
- IDS_genAdminKeys or IDS_genAgentCerts does not complete successfully
- IDS_genAdminKeys or idsgui quits early
- Large files in /var/opt/ids
- Log files are filling up
- No Agent Available
- Normal operation of an application generates heavy volume of alerts
- Reflection X rlogin produces multiple login and logout alerts
- Schedule Manager timetable screen appears to hang
- SSH does not perform a clean exit after idsagent is started
- System Manager appears to hang
- System Manager does not let you save files to specific directories
- System Manager does not start after idsgui is started
- System Manager starts with no borders or title bar in X client programs on Windows
- System Manager times out on agent functions such as Activate and Status Poll
- UNKNOWN program and arguments in certain alert messages
- Using HP-UX HIDS with IPFilter and SecureShell
- Unable to Generate Administrator Keys and Agent Certificates on PA–RISC 1.1 Systems
- Troubleshooting
- H HP Software License
are not designed to handle security attacks. Moreover, most codes run with more privileges than
it needs to accomplish a task. Often a site installs its web server to run as root, granting it far
greater privileges than it needs to serve up websites and CGI scripts. Web servers that run as
root are easy targets for attack. CGI scripts are easily accessible, and any individual can gain
complete root privileges to such systems.
Springboards to Attack the Next Target
Even if you are not attacked, your company systems can be used to launch an attack on other
victims on the Internet.
Existing Tools Are Only Part of the Solution
A number of technologies have emerged as potential solutions to the various security problems
faced by companies. Firewalls, encryption, and security auditing tools are useful. HP-UX HIDS
integrates with these existing technologies to enhance system and network security.
Firewalls
A firewall is a system that is placed between two networks to control what traffic can pass
between those networks. A firewall is usually placed between the Internet and your company
intranet. It can be viewed as a useful point of policy enforcement through which you can decide
what network traffic is and is not permitted to pass in and out of your organization. When
deployed correctly, a difficult task in a complex business environment, a firewall is an efficient
tool to prevent attacks on critical systems and data. However, a firewall connected to the Internet
cannot protect against an attack on systems launched from inside an organization. Often, it cannot
stop an attacker inside your organization from attacking systems on the Internet, that is, your
systems can be used as a springboard to attack another victim.
A further complication in deploying firewalls is that it is difficult to establish clearly where the
boundary exists between inside and outside. At one time, it was obvious that the Internet was
outside and the intranet was inside. However, more and more corporations are joining their
intranets in multiple-partner arrangements, often termed extranets. If internal and external
systems are included under the same extranets, it becomes difficult to place the firewall at the
required location. In such an environment, some form of continuous security monitoring tool is
needed to ensure that critical systems are not attacked and valuable data is not being pilfered
by partners.
Encryption
Encryption is a mathematical technique that prevents unauthorized reading and modification
of data. With encryption, the intended recipients of data can read it, but no intermediate recipient
can read or alter the data. Encryption also authenticates the sender of a message. It ensures that
the claimed sender really is the intended sender of the message.
In any well-designed cryptographic system, the heart of the security is the key used to encrypt
the message. Knowing this key enables hackers to decrypt any message, alter it, and retransmit
it to the sender. Even if the inner workings of the encryption software are known, without the
key, hackers cannot read or alter messages.
The problem with relying on encryption lies in system vulnerability. In this case, the weakest
link is not the encryption technology but the systems on which the key is stored. How can you
be sure that the program you are using to encrypt data has not saved your key to a temporary
file on your disk, from which an attacker can later retrieve it? If attackers gain access to your key,
not only can they decrypt your data, they can impersonate you and send messages claiming to
be signed only by you.
Encryption does not protect data while it is in the clear (not encrypted) as you process it, for
example, preparing a document for printing. Moreover, encryption cannot protect your systems
Importance of Intrusion Detection 21