HP-UX Host Intrusion Detection System Version 4.3 administrator guide
Table Of Contents
- HP-UX Host Intrusion Detection System Version 4.3 administrator guide
- Table of Contents
- About This Document
- 1 Introduction
- 2 Configuring HP-UX HIDS
- 3 Getting Started with HP-UX HIDS
- 4 Using the System Manager Screen
- Starting the HP-UX HIDS System Manager
- Stopping the HP-UX HIDS System Manager
- System Manager Components
- Starting HP-UX HIDS Agents
- Getting the Status of Agent Hosts
- Resynchronizing Agent Hosts
- Activating Schedules on Agent Hosts
- Stopping Schedules on Agent Hosts
- Halting HP-UX HIDS Agents
- Accessing Other Screens
- 5 Using the Schedule Manager Screen
- The Schedule Manager
- Configuring Surveillance Schedules
- Configuring Surveillance Groups
- Configuring Detection Templates
- Setting Surveillance Schedule Timetables
- Configuring Alert Aggregation
- Configuring Monitor Failed Attempts
- Configuring Duplicate Alert Suppression
- Viewing Surveillance Schedule Details
- Predefined Surveillance Schedules and Groups
- 6 Using the Host Manager Screen
- 7 Using the Network Node Screen
- 8 Using the Preferences Screen
- A Templates and Alerts
- Alert Summary
- UNIX Regular Expressions
- Limitations
- Template Property Types
- Buffer Overflow Template
- Race Condition Template
- Modification of files/directories Template
- Changes to Log File Template
- Creation and Modification of setuid/setgid File Template
- Creation of World-Writable File Template
- Modification of Another User’s File Template
- Login/Logout Template
- Repeated Failed Logins Template
- Repeated Failed su Commands Template
- Log File Monitoring Template
- B Automated Response for Alerts
- C Tuning Schedules and Generating Alert Reports
- D The Agent Configuration File
- E The Surveillance Schedule Text File
- F Error Messages
- G Troubleshooting
- Troubleshooting
- Agent and System Manager cannot communicate with each other
- Agent complains that idds has not been enabled, yet lsdev shows /dev/idds is present
- Agent does not start on system boot
- Agent halts abnormally, leaving ids_* files and message queues
- Agent host appears to hang and/or you see message disk full
- Agent needs further troubleshooting
- Agent does not start after installation
- Agents appear to be stuck in polling status
- Agent displays error if hostname to IP mapping is not registered in name service
- Aggregated alerts targets or details field are truncated and the same aggregated alert has several entries logged in the IDS_ALERTFILE
- Alert date/time sort seems inconsistent
- Alerts are not being displayed in the alert browser
- Buffer overflow triggers false positives
- Duplicate alerts appear in System Manager
- Getting several aggregated alerts for the same process
- GUI runs out of memory after receiving around 19,000 alerts
- The idsadmin Command needs installed agent certificates
- The idsadmin Command notifies of bad certificate when pinging a remote agent
- IDS_checkInstall fails with a kmtune error
- IDS_genAdminKeys or IDS_genAgentCerts does not complete successfully
- IDS_genAdminKeys or idsgui quits early
- Large files in /var/opt/ids
- Log files are filling up
- No Agent Available
- Normal operation of an application generates heavy volume of alerts
- Reflection X rlogin produces multiple login and logout alerts
- Schedule Manager timetable screen appears to hang
- SSH does not perform a clean exit after idsagent is started
- System Manager appears to hang
- System Manager does not let you save files to specific directories
- System Manager does not start after idsgui is started
- System Manager starts with no borders or title bar in X client programs on Windows
- System Manager times out on agent functions such as Activate and Status Poll
- UNKNOWN program and arguments in certain alert messages
- Using HP-UX HIDS with IPFilter and SecureShell
- Unable to Generate Administrator Keys and Agent Certificates on PA–RISC 1.1 Systems
- Troubleshooting
- H HP Software License

many alerts, which are not security relevant. The “Files Modified by Program List/Program
List” properties can be used to ignore changes to certain files when they are performed by
a known program. The pathnames_to_not_watch property can be used to ignore
directories and files where changes to files are not considered as security risks.
• The template “Modification of Another User’s File Template” (page 144) generates many
alerts if not tuned correctly.
• The templates “Repeated Failed Logins Template” (page 151), “Repeated Failed su Commands
Template” (page 153) and “Login/Logout Template” (page 147) have low overhead on the
system and can be run in any schedule.
• When tuning a template, consider the areas that impose great risk if the system is penetrated.
Obviously, replacing a program in /bin, /sbin or the kernel in /stand is a serious threat.
• Consider the areas that does not impose great risk if the system is penetrated. For example,
many files change under /var/adm path, and ignoring that directory is usually safe. But if
a symbolic link attack is launched from /var/adm, the attack may not be detected. This is
a trade-off decision.
• Start with a single template and then see how many alerts are generated. Determine if any
of these are security events, and if not, modify the template properties to filter the spurious
alerts.
• You may find software that is behaving incorrectly, such as writing to /opt (considered a
read-only file system), creating world-writable lock files (a security issue), saving temporary
data in /etc (should only be for configuration data). Contact the software vendor about
these programs.
Setting Surveillance Schedule Timetables
Once you have defined a surveillance schedule with its complement of surveillance groups and
detection templates, you need to specify the days and times that the groups will be active when
the schedule is activated on an agent host. Use this procedure to establish and change the times
a schedule runs.
NOTE: You cannot reset the timetable of a surveillance group if it is in a surveillance schedule
that is currently scheduled or running on an agent host. For more information, see “Using the
System Manager Screen” (page 47).
IMPORTANT: If one or more groups end and one or more groups start in adjacent time slots,
there will be a several second interval between the end of the former groups and the start of the
latter groups in which none of the groups will be running. If a group is scheduled across adjacent
time slots, it is not interrupted.
IMPORTANT: While a schedule may contain more than 10 groups, it may have no more than
10 groups active in any one-hour time slot.
70 Using the Schedule Manager Screen