Practical Solaris 10 Security Glenn Brunette
|
|
|
- Ginger Lynn Small
- 10 years ago
- Views:
Transcription
1 Practical Solaris 10 Security Glenn Brunette Distinguished Engineer Sun Microsystems, Inc.
2 Agenda Attacker Goals Attack Scenario Background Attack Defense Scenario Attack Detection Scenario Copyright 2006 Sun Microsystems, Inc. 2
3 Attacker Goals Local System Access Administrative Privileges Access Privileged Information Conceal Attack and Avoid Detection Inject, Modify or Destroy Local Content Staging Platform for Further Attacks Copyright 2006 Sun Microsystems, Inc. 3
4 Attack Scenario Background While operating from the network: > Attack originates from a local or remote network. > Attacker does not have local system access. While operating from the local system: > Attacker has obtained command line access (unprivileged account). In Both Cases: > Attack takes place against a Solaris 10 non-global zone. > Solaris 10 global zone == service processor Copyright 2006 Sun Microsystems, Inc. 4
5 Attack Defense Scenario IP Filter, TCP Wrappers, IPsec, etc. Service Management Facility (SMF) Process Rights Management Non-Executable Stack Pluggable Authentication Mechanism (PAM) Reduced Installation Profile Solaris Zones Solaris Cryptographic Framework User Rights Management Copyright 2006 Sun Microsystems, Inc. 5
6 Attack Defense Scenario IP Filter, TCP Wrappers, IPsec, etc. Copyright 2006 Sun Microsystems, Inc. 6
7 Attack Defense Scenario IP Filter, TCP Wrappers, IPsec, etc. Service Management Facility (SMF) Copyright 2006 Sun Microsystems, Inc. 7
8 Service Management Facility Provide a uniform mechanism to disable/manage services. > e.g., svcadm [disable enable] telnet Support alternative service profiles > e.g., Secure by Default profile (in Solaris 10 11/06) Leverage authorizations to manage/configure services. Define context to permit services to be started as a specific user and group and with specific privileges. Support automatic service dependency resolution. > e.g., svcadm enable -r nfs/client Facilitate delegated service restarts. Copyright 2006 Sun Microsystems, Inc. 8
9 Solaris 10 11/06 Solaris Secure By Default Only Secure Shell is reachable by default. > root use of Secure Shell is not permitted by default. Existing services are configured in SMF to either be: > Disabled by default > Listening for local (e.g., loopback) connections only Configuration can be selected using CLI or JumpStart: > netservices: open (traditional) or limited (SBD) > service_profile: open or limited_net Default installation method in Nevada/OpenSolaris: > Solaris upgrades are not changed or impacted. > Solaris 10 initial (fresh) installations can select SBD mode. Copyright 2006 Sun Microsystems, Inc. 9
10 Solaris 10 11/06 Solaris Secure By Default Example #1 # netservices netservices: usage: netservices [ open limited ] # netservices limited restarting syslogd restarting sendmail dtlogin needs to be restarted. Restart now? [Y] y restarting dtlogin # netstat -af inet -P tcp grep LISTEN [...] *.sunrpc *.* LISTEN *.ssh *.* LISTEN localhost.smtp *.* LISTEN localhost.submission *.* LISTEN Copyright 2006 Sun Microsystems, Inc. 10
11 SMF Execution Context exec methods can be forced to run as a given user: > {start, stop, etc.}/user exec methods can be forced to run as a given group: > {start, stop, etc.}/group exec methods can be forced to use specific privileges: > {start, stop, etc.}/privileges > {start, stop, etc.}/limit_privileges Other exec context can also be defined: > default project and resource pool, supplemental groups, etc. Copyright 2006 Sun Microsystems, Inc. 11
12 SMF Execution Context Example # svcprop -v -p start apache2 start/exec astring /lib/svc/method/http-apache2\ start start/timeout_seconds count 60 start/type astring method start/user astring webservd start/group astring webservd start/privileges astring basic,!proc_session,!proc_info,!file_link_any,net_privaddr start/limit_privileges astring :default start/use_profile boolean false start/supp_groups astring :default start/working_directory astring :default start/project astring :default start/resource_pool astring :default Example taken from the Sun BluePrint: Limiting Service Privileges in the Solaris 10 Operating System, Copyright 2006 Sun Microsystems, Inc. 12
13 Attack Defense Scenario IP Filter, TCP Wrappers, IPsec, etc. Service Management Facility (SMF) Process Rights Management Copyright 2006 Sun Microsystems, Inc. 13
14 Process Rights Management Solaris kernel checks for privileges and not just UID == 0! > Division of root authority into discrete privileges (67 and counting) > Privileges can be granted to processes based on need. > Privileges can be disabled or dropped when not needed. > Child processes can have different (fewer) privileges than the parent. Completely backward compatible and extensible. > No changes required to use existing code. Privilege bracketing helps to mitigate effects of future flaws. > e.g., proc_fork and proc_exec > e.g., proc_info Copyright 2006 Sun Microsystems, Inc. 14
15 Process Privileges Example #1 $ ppriv $$ $ ppriv -l basic 28983: bash file_link_any flags = <none> proc_exec E: basic proc_fork I: basic proc_info P: basic proc_session L: all $ ppriv -De cat /etc/shadow cat[3988]: missing privilege "file_dac_read" (euid = 101, syscall = 225) needed at ufs_iaccess+0xc9 cat: cannot open /etc/shadow $ ppriv -s -proc_fork,-proc_exec -De /bin/vi [attempt to run a command/escape to a shell] vi[4180]: missing privilege "proc_fork" (euid = 101, syscall = 143) needed at cfork+0x3b Copyright 2006 Sun Microsystems, Inc. 15
16 Process Privileges Example #2 # ppriv -S `pgrep rpcbind` 933: /usr/sbin/rpcbind flags = PRIV_AWARE E: net_bindmlp,net_privaddr,proc_fork,sys_nfs I: none P: net_bindmlp,net_privaddr,proc_fork,sys_nfs L: none # ppriv -S `pgrep statd` 5139: /usr/lib/nfs/statd flags = PRIV_AWARE E: net_bindmlp,proc_fork I: none P: net_bindmlp,proc_fork L: none Copyright 2006 Sun Microsystems, Inc. 16
17 Process Privilege Debugging web_svc zone: global zone: web_svc zone: global zone: # svcadm disable apache2 # privdebug -v -f -n httpd # svcadm enable apache2 [output of privdebug command] STAT TIMESTAMP PPID PID PRIV CMD USED net_privaddr httpd USED proc_fork httpd USED proc_fork httpd USED proc_fork httpd USED proc_fork httpd USED proc_fork httpd USED proc_fork httpd privdebug is available from the OpenSolaris Security Community: Copyright 2006 Sun Microsystems, Inc. 17
18 Attack Defense Scenario IP Filter, TCP Wrappers, IPsec, etc. Service Management Facility (SMF) Process Rights Management Non-Executable Stack Copyright 2006 Sun Microsystems, Inc. 18
19 Non-Executable Stack Example $ cc -o shell-exstk shell.c $ cc -o shell-noexstk -M /usr/lib/ld/map.noexst shell.c $./shell-exstk Attempting to start a shell... $ exit $./shell-noexstk Attempting to start a shell... Segmentation Fault(coredump) Sep 16 15:06:06 kilroy genunix: [ID kern.notice] NOTICE: shell-noexstk[23132] attempt to execute code on stack by uid 101 Copyright 2006 Sun Microsystems, Inc. 19
20 Attack Defense Scenario IP Filter, TCP Wrappers, IPsec, etc. Service Management Facility (SMF) Process Rights Management Non-Executable Stack Pluggable Authentication Mechanism (PAM) Copyright 2006 Sun Microsystems, Inc. 20
21 Attack Defense Scenario IP Filter, TCP Wrappers, IPsec, etc. Service Management Facility (SMF) Process Rights Management Non-Executable Stack Pluggable Authentication Mechanism (PAM) Reduced Installation Profile Copyright 2006 Sun Microsystems, Inc. 21
22 Solaris 10U1 (Build 5) Reduced Networking Metacluster Meta Cluster Size (MB) # Pkgs # Set-UID # Set-GID Reduced Networking SUNWCrnet Core SUNWCreq End User SUNWCuser Developer SUNWCprog Entire SUNWCall Entire + OEM SUNWCXall Copyright 2006 Sun Microsystems, Inc. 22
23 Attack Defense Scenario IP Filter, TCP Wrappers, IPsec, etc. Service Management Facility (SMF) Process Rights Management Non-Executable Stack Pluggable Authentication Mechanism (PAM) Reduced Installation Profile Solaris Zones Copyright 2006 Sun Microsystems, Inc. 23
24 Zones Zones are virtualized application environments. > No direct access to hardware. Zones have security boundaries around them. Zones have their own: > root directory, naming service configuration, process containment, resource controls, devices, etc. Zones communicate via network only (default). Zones operate with fewer privileges (default). Copyright 2006 Sun Microsystems, Inc. 24
25 Zones Copyright 2006 Sun Microsystems, Inc. 25
26 Zones Security Example #1 # modload autofs Insufficient privileges to load a module # modunload -i 101 Insufficient privileges to unload a module # snoop snoop: No network interface devices found # mdb -k mdb: failed to open /dev/ksyms: No such file or directory # dtrace -l ID PROVIDER MODULE FUNCTION NAME # ppriv -D -e route add net default route[4676]: missing privilege "sys_net_config" (euid = 0, syscall = 4) needed at ip_rts_request+0x138 add net default: gateway : insufficient privileges Copyright 2006 Sun Microsystems, Inc. 26
27 Zones Security Example #2 # mount -p / - / zfs - no rw,devices,setuid,exec,atime /dev - /dev lofs - no zonedevfs /lib - /lib lofs - no ro,nodevices,nosub /platform- /platformlofs - no ro,nodevices,nosub /sbin - /sbin lofs - no ro,nodevices,nosub /usr - /usr lofs - no ro,nodevices,nosub [...] # mv /usr/bin/login /usr/bin/login.foo mv: cannot rename /usr/bin/login to /usr/bin/login.foo: Read-only file system Copyright 2006 Sun Microsystems, Inc. 27
28 Zones Security Example #3 # zonecfg -z myzone info limitpriv limitpriv: default,sys_time # zlogin myzone ppriv -l zone grep sys_time sys_time # zlogin myzone svcs -v ntp STATE NSTATE STIME CTID FMRI online - 10:17: svc:/network/ntp:default # zlogin myzone ntpq -c peers remote refid st t when poll reach [...] ================================================[...] *blackhole u [...] # ssh blackhole date ; date ; zlogin myzone date Thu Jun 15 10:25:25 EDT 2006 Thu Jun 15 10:25:25 EDT 2006 Thu Jun 15 10:25:25 EDT 2006 Copyright 2006 Sun Microsystems, Inc. 28
29 Attack Defense Scenario IP Filter, TCP Wrappers, IPsec, etc. Service Management Facility (SMF) Process Rights Management Non-Executable Stack Pluggable Authentication Mechanism (PAM) Reduced Installation Profile Solaris Zones Solaris Cryptographic Framework Copyright 2006 Sun Microsystems, Inc. 29
30 Cryptographic Framework Standards-based, pluggable framework > Kernel support as well as user-land (PKCS#11) > Supports administrative policies (e.g., FIPS 140 algorithms only) By default, supports major algorithms. > Encryption : AES, Blowfish, RC4, DES, 3DES, RSA > Digest : MD5, SHA-1, SHA-256, SHA-384, SHA-512 > MAC : DES MAC, MD5 HMAC, SHA-1 HMAC, SHA-256 HMAC, SHA-384 HMAC, SHA-512 HMAC > Optimized for both SPARC, Intel and AMD Framework supports pluggable hardware/software providers: > e.g., UltraSPARC T1 and the Sun CryptoAccelerator 6000 Copyright 2006 Sun Microsystems, Inc. 30
31 Attack Defense Scenario IP Filter, TCP Wrappers, IPsec, etc. Service Management Facility (SMF) Process Rights Management Non-Executable Stack Pluggable Authentication Mechanism (PAM) Reduced Installation Profile Solaris Zones Solaris Cryptographic Framework User Rights Management Copyright 2006 Sun Microsystems, Inc. 31
32 User Rights Management (Roles) Solaris Users versus Roles > Roles can only be accessed by users already logged in. > Users cannot assume a role unless authorized. $ id -a uid=80(webservd) gid=80(webservd) $ roles No roles $ su - root Password: Roles can only be assumed by authorized users su: Sorry Copyright 2006 Sun Microsystems, Inc. 32
33 User Rights Management (Rights) Copyright 2006 Sun Microsystems, Inc. 33
34 User Rights Management Example # svcprop -p httpd -p general apache2 general/enabled boolean false general/action_authorization astring sunw.apache.oper general/entity_stability astring Evolving httpd/ssl boolean false httpd/stability astring Evolving # auths weboper sunw.apache.oper # profiles -l weboper Apache Operator: /usr/sbin/svcadm /usr/bin/svcs Copyright 2006 Sun Microsystems, Inc. 34
35 User Rights Management Example $ svcs -o state,ctid,fmri apache2 STATE CTID FMRI online svc:/network/ $ svcadm restart apache2 $ svcs -o state,ctid,fmri apache2 STATE CTID FMRI online svc:/network/ $ ls ls: not found $ echo * local.cshrc local.login local.profile Copyright 2006 Sun Microsystems, Inc. 35
36 Solaris Trusted Extensions Labeled Security for Solaris 10+ Multi-Level Desktop, Networking and Printing Labeled Filesystems and Devices Compatible with all Solaris hardware and applications Common Criteria Target: CAPP, RBACPP, EAL 4+ Available November 2006 Copyright 2006 Sun Microsystems, Inc. 36
37 Attack Detection Scenario Solaris Audit Basic Audit and Reporting Tool (BART) Cryptographically Signed ELF Objects Solaris Fingerprint Database Solaris Security Toolkit Copyright 2006 Sun Microsystems, Inc. 37
38 Solaris Audit Kernel auditing of system calls and administrative actions. > Can record events happening in any zone (from the global zone). Example: $ auditreduce -m AUE_su -r joe praudit -s file, :25: :00, header,97,2,aue_su,, , :28: :00 subject,joe,joe,other,joe,other,1834, , text,bad auth. for user roleb return,failure,2 Example taken from the Sun BluePrint: Enforcing the Two-Person Rule Via Role-based Access Control in the Solaris 10 OS, Copyright 2006 Sun Microsystems, Inc. 38
39 Basic Auditing and Reporting Tool File-level integrity validation tool: > Evalutes: uid, gid, permissions/acls, contents, mtime, size, type, etc. # cat./rules /etc CHECK all # find /etc bart create -I > newmanifest # bart compare -r./rules./oldmanifest./newmanifest /etc/user_attr: size control:28268 test:23520 acl control:user::rw-,group::rw-,mask:r-x,other:r-- test:user::rw-,group::rw-,mask:r-x,other:rwcontents control:28dd3a3af2fcc103f422993de5b162f3 test:28893a3af2fcc103f422993de5b162f3 1 See: Sun BluePrint: Automating File Integrity Checks, Copyright 2006 Sun Microsystems, Inc. 39
40 Cryptographically Signed ELF Objects ELF Objects Cryptographically Signed > binaries, libraries, kernel modules, crypto modules, etc. # file /usr/lib/ssh/sshd /usr/lib/ssh/sshd: ELF 32-bit MSB executable SPARC Version 1, dynamically linked, stripped # elfsign verify -e /usr/lib/ssh/sshd elfsign: verification of /usr/lib/ssh/sshd passed. # elfsign list -f signer -e /usr/bin/ls CN=SunOS 5.10, OU=Solaris Signed Execution, O=Sun Microsystems Inc Cryptographic modules must be signed by Sun. > Signature must be validated before module can be loaded. Copyright 2006 Sun Microsystems, Inc. 40
41 Solaris Fingerprint Database Searchable database of MD5 fingerprints for files included in Solaris, Trusted Solaris, and bundled software. # digest -v -a md5 /usr/lib/ssh/sshd md5 (/usr/lib/ssh/sshd) = b94b091a2d33dd4d6481dffa784ba632 [Process fingerprint using the Solaris Fingerprint DB] b94b091a2d33dd4d6481dffa784ba632 - (/usr/lib/ssh/sshd) 1 match(es) * canonical-path: /usr/lib/ssh/sshd * package: SUNWsshdu * version: ,REV= * architecture: sparc * source: Solaris 10/SPARC Copyright 2006 Sun Microsystems, Inc. 41
42 Solaris Security Toolkit Configurable (and pluggable) security tool used to configure or assess the security posture of a Solaris system. # jass-execute -a hardening.driver -V 2 [...] disable-spc [FAIL] Service svc:/application/print/cleanup:default was enabled. disable-spc [FAIL] Service svc:/application/print/cleanup:default was running. disable-spc [FAIL] Script Total: 2 Errors disable-ssh-root-login [PASS] Service svc:/network/ssh:default was installed. disable-ssh-root-login [PASS] PermitRootLogin parameter is set to "no" in /etc/ssh/sshd_config. disable-ssh-root-login [PASS] Script Total: 0 Errors Copyright 2006 Sun Microsystems, Inc. 42
43 Actions... 1 Evaluate, pilot and beat up Solaris 10 and Solaris Trusted Extensions today! 2 Share with us what you like, what you don't and how you would improve the product! 3 Join the OpenSolaris Community! Copyright 2006 Sun Microsystems, Inc. 43
44 For More Information Sun Security Home > OpenSolaris Security Community > Sun Security Coordination Center > & Sun Security BluePrints > Sun Security Bloggers > Copyright 2006 Sun Microsystems, Inc. 44
45 Practical Solaris 10 Security Glenn Brunette Sun Microsystems, Inc.
Solaris 10 Security. Technical Deep Dive. Glenn Brunette. Distinguished Engineer Sun Microsystems, Inc.
Solaris 10 Security Technical Deep Dive Glenn Brunette Distinguished Engineer Sun Microsystems, Inc. Agenda Solaris Security Goals Solaris 9 Security Review an overview of features from past releases.
SOLARIS 10 SECURITY. Technical Overview. Andreas Neuhold Systems Practice Lead Austria Sun Microsystems, GesmbH
SOLARIS 10 SECURITY Technical Overview Andreas Neuhold Systems Practice Lead Austria Sun Microsystems, GesmbH Solaris 10 Lizenzen Millions ~ 7M ZFS 7,0 6,5 6,0 5,5 Solaris Container 5,0 4,5 4,0 3,5 3,0
McAfee Firewall Enterprise 8.2.1
Configuration Guide FIPS 140 2 Revision A McAfee Firewall Enterprise 8.2.1 The McAfee Firewall Enterprise FIPS 140 2 Configuration Guide, version 8.2.1, provides instructions for setting up McAfee Firewall
Oracle Solaris Security: Mitigate Risk by Isolating Users, Applications, and Data
Oracle Solaris Security: Mitigate Risk by Isolating Users, Applications, and Data Will Fiveash presenter, Darren Moffat author Staff Engineer Solaris Kerberos Development Safe Harbor Statement The following
McAfee Firewall Enterprise 8.3.1
Configuration Guide Revision A McAfee Firewall Enterprise 8.3.1 FIPS 140-2 The McAfee Firewall Enterprise FIPS 140-2 Configuration Guide, version 8.3.1, provides instructions for setting up McAfee Firewall
An Oracle White Paper August 2010. Using Oracle Solaris 10 to Overcome Security Challenges
An Oracle White Paper August 2010 Using Oracle Solaris 10 to Overcome Security Challenges Introduction... 1 Security Features in Oracle Solaris 10... 2 Reduce and Securely Delegate Privileges... 2 Network
REDUCE RISK WITH ORACLE SOLARIS 11
REDUCE RISK WITH ORACLE SOLARIS 11 MITIGATE RISKS WITH INTELLIGENT SECURITY CONTROLS KEY FEATURES Security in Silicon: Hardware-integrated cryptographic acceleration to protect both data and network. Reduce
Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.
Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0 Accellion, Inc. December 24, 2009 Copyright Accellion, Inc. 2009. May be reproduced only in its original entirety
TABLE OF CONTENTS NETWORK SECURITY 2...1
Network Security 2 This document is the exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
Linux OS-Level Security Nikitas Angelinas MSST 2015
Linux OS-Level Security Nikitas Angelinas MSST 2015 Agenda SELinux SELinux issues Audit subsystem Audit issues Further OS hardening 2 SELinux Security-Enhanced Linux Is NOT a Linux distribution A kernel
WebSphere DataPower Release 6.0.1 - FIPS 140-2 and NIST SP800-131a support.
WebSphere DataPower Release 6.0.1 - FIPS 140-2 and NIST SP800-131a support. 601DataPower_Security_NIST.ppt Page 1 of 17 This presentation discusses three new security features in the WebSphere DataPower
PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations
PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations Instructor Version Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway Switch Port R1 FA0/1
IP Filter Host Based Firewall Using the Firewall Framework Author: Tim Wort
IP Filter Host Based Firewall Using the Firewall Framework Author: Tim Wort This paper explores configuring the IP Filter SMF service to use the Firewall Framework to build a Host Based Firewall. The IP
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
Authorize.net modules for oscommerce Online Merchant.
Authorize.net Authorize.net modules for oscommerce Online Merchant. Chapters oscommerce Online Merchant v2.3 Copyright Copyright (c) 2014 oscommerce. All rights reserved. Content may be reproduced for
Solaris For The Modern Data Center. Taking Advantage of Solaris 11 Features
Solaris For The Modern Data Center Taking Advantage of Solaris 11 Features JANUARY 2013 Contents Introduction... 2 Patching and Maintenance... 2 IPS Packages... 2 Boot Environments... 2 Fast Reboot...
Windows Server 2008 R2 Boot Manager Security Policy For FIPS 140-2 Validation
Boot Manager Security Policy Windows Server 2008 R2 Boot Manager Security Policy For FIPS 140-2 Validation v 1.3 6/8/11 1 INTRODUCTION... 1 1.1 Cryptographic Boundary for BOOTMGR... 1 2 SECURITY POLICY...
Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline
Course Number: SEC 150 Course Title: Security Concepts Hours: 2 Lab Hours: 2 Credit Hours: 3 Course Description: This course provides an overview of current technologies used to provide secure transport
Linux Operating System Security
Linux Operating System Security Kenneth Ingham and Anil Somayaji September 29, 2009 1 Course overview This class is for students who want to learn how to configure systems to be secure, test the security
SSL Tunnels. Introduction
SSL Tunnels Introduction As you probably know, SSL protects data communications by encrypting all data exchanged between a client and a server using cryptographic algorithms. This makes it very difficult,
Развертывание сервера приложений Oracle GlassFish Server на OpenSolaris: мониторинг, подготовка к работе и резервное копирование
Развертывание сервера приложений Oracle GlassFish Server на OpenSolaris: мониторинг, подготовка к работе и резервное копирование Филипп Торчинский Sun Microsystems 1 Agenda Introduction What is OpenSolaris,
Security Configuration Guide P/N 300-010-493 Rev A05
EMC VPLEX Security Configuration Guide P/N 300-010-493 Rev A05 June 7, 2011 This guide provides an overview of VPLEX security configuration settings, including secure deployment and usage settings needed
Enabling SSL and Client Certificates on the SAP J2EE Engine
Enabling SSL and Client Certificates on the SAP J2EE Engine Angel Dichev RIG, SAP Labs SAP AG 1 Learning Objectives As a result of this session, you will be able to: Understand the different SAP J2EE Engine
SecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the
NETWORK SECURITY HACKS
SECOND EDITION NETWORK SECURITY HACKS 2008 AGI-Information Management Consultants May be used for personal purporses only or by libraries associated to dandelon.com network. Andrew Lockhart O'REILLY Beijing
PATROL Console Server and RTserver Getting Started
PATROL Console Server and RTserver Getting Started Supporting PATROL Console Server 7.5.00 RTserver 6.6.00 February 14, 2005 Contacting BMC Software You can access the BMC Software website at http://www.bmc.com.
ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0
ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0 Module 1: Vulnerabilities, Threats, and Attacks 1.1 Fundamental Principles of a Secure Network
Linux System Administration on Red Hat
Linux System Administration on Red Hat Kenneth Ingham September 29, 2009 1 Course overview This class is for people who are familiar with Linux or Unix systems as a user (i.e., they know file manipulation,
Pulse Secure, LLC. January 9, 2015
Pulse Secure Network Connect Cryptographic Module Version 2.0 Non-Proprietary Security Policy Document Version 1.1 Pulse Secure, LLC. January 9, 2015 2015 by Pulse Secure, LLC. All rights reserved. May
How To Configure the Oracle ZFS Storage Appliance for Quest Authentication for Oracle Solaris
How To Configure the Oracle ZFS Storage Appliance for Quest Authentication for Oracle Solaris January 2014; v1.3 By Andrew Ness This article describes how to configure Quest Authentication Services in
NETWORK SECURITY HACKS *
NETWORK SECURITY HACKS * Andrew %pckhart Ji O'REILLY* Beijing Cambridge Farnham Koln Paris Sebastopol Taipei Tokyo Contents Credits Preface ix xi Chapter 1. Unix Host Security 1 1. Secure Mount Points
Using BroadSAFE TM Technology 07/18/05
Using BroadSAFE TM Technology 07/18/05 Layers of a Security System Security System Data Encryption Key Negotiation Authentication Identity Root Key Once root is compromised, all subsequent layers of security
Lab 8.3.1.2 Configure Basic AP Security through IOS CLI
Lab 8.3.1.2 Configure Basic AP Security through IOS CLI Estimated Time: 30 minutes Number of Team Members: Students will work in teams of two. Objective In this lab, the student will learn the following
Configuring Security Features of Session Recording
Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording
Intrusion Detection using the Linux Audit Framework. Stephen Quinney <[email protected]> School of Informatics University of Edinburgh
Intrusion Detection using the Linux Audit Framework Stephen Quinney School of Informatics University of Edinburgh the only secure computer is one that s unplugged... Two Distinct
Security Policy. Trapeze Networks
MP-422F Mobility Point Security Policy Trapeze Networks August 14, 2009 Copyright Trapeze Networks 2007. May be reproduced only in its original entirety [without revision]. TABLE OF CONTENTS 1. MODULE
Oracle Solaris: Aktueller Stand und Ausblick
Oracle Solaris: Aktueller Stand und Ausblick Detlef Drewanz Principal Sales Consultant, EMEA Server Presales The following is intended to outline our general product direction. It
Sun ZFS Storage Appliance Rule-Based Identity Mapping Between Active Directory and Network Information Services Implementation Guide
An Oracle White Paper February 2011 Sun ZFS Storage Appliance Rule-Based Identity Mapping Between Active Directory and Network Information Services Implementation Guide Introduction... 4 Overview and Prerequisites...
Secure File Transfer Appliance Security Policy Document Version 1.9. Accellion, Inc.
Secure File Transfer Appliance Security Policy Document Version 1.9 Accellion, Inc. November 11, 2010 Copyright Accellion, Inc. 2010. May be reproduced only in its original entirety [without revision].
Nortel Networks, Inc. VPN Client Software (Software Version: 7_11.101) FIPS 140-2 Non-Proprietary Security Policy
Nortel Networks, Inc. VPN Client Software (Software Version: 7_11.101) FIPS 140-2 Non-Proprietary Security Policy Level 1 Validation Document Version 0.5 Prepared for: Prepared by: Nortel Networks, Inc.
SoftNAS Application Guide: In-Flight Encryption 12/7/2015 SOFTNAS LLC
SoftNAS Application Guide: In-Flight Encryption 12/7/2015 SOFTNAS LLC SoftNAS Application Guide: In-Flight Encryption Contents Introduction to In-Flight Data Encryption... 2 CIFS Encryption In-Flight...
SBClient SSL. Ehab AbuShmais
SBClient SSL Ehab AbuShmais Agenda SSL Background U2 SSL Support SBClient SSL 2 What Is SSL SSL (Secure Sockets Layer) Provides a secured channel between two communication endpoints Addresses all three
SCP - Strategic Infrastructure Security
SCP - Strategic Infrastructure Security Lesson 1 - Cryptogaphy and Data Security Cryptogaphy and Data Security History of Cryptography The number lock analogy Cryptography Terminology Caesar and Character
Implementing Secure Shell
Secure Shell (SSH) is an application and a protocol that provides a secure replacement to the Berkeley r-tools. The protocol secures sessions using standard cryptographic mechanisms, and the application
HP Education Services
HP Education Services HP-UX Security (H3541S) Concerned about system security? HP s updated and enhanced HP-UX Security course can help you secure your systems and mitigate risks. Designed for experienced
Northrop Grumman M5 Network Security SCS Linux Kernel Cryptographic Services. FIPS Security Policy Version 2.42. www.northropgrumman.
Northrop Grumman M5 Network Security SCS Linux Kernel Cryptographic Services FIPS Security Policy Version 2.42 www.northropgrumman.com/m5/ SCS Linux Kernel Cryptographic Services Security Policy Version
Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version: 1.0.0.2
Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version: 1.0.0.2 FIPS 140 2 Non Proprietary Security Policy FIPS Security Level: 1 Document Version: 1.1 Prepared for: Prepared
Security Policy for FIPS 140 2 Validation
BitLocker Windows OS Loader Security Policy for FIPS 140 2 Validation BitLocker Windows OS Loader (winload) in Microsoft Windows 8.1 Enterprise Windows Server 2012 R2 Windows Storage Server 2012 R2 Surface
What is included in the ATRC server support
Linux Server Support Services What is included in the ATRC server support Installation Installation of any ATRC Supported distribution Compatibility with client hardware. Hardware Configuration Recommendations
GL254 - RED HAT ENTERPRISE LINUX SYSTEMS ADMINISTRATION III
QWERTYUIOP{ GL254 - RED HAT ENTERPRISE LINUX SYSTEMS ADMINISTRATION III This GL254 course is designed to follow an identical set of topics as the Red Hat RH254, RH255 RHCE exam prep courses with the added
An Oracle White Paper April 2010. How to Install the Oracle Solaris 10 Operating System on x86 Systems
An Oracle White Paper April 2010 How to Install the Oracle Solaris 10 Operating System on x86 Systems Introduction... 1 Installation Assumptions... 2 Check the Hardware Compatibility List... 2 Basic System
An Oracle White Paper April 2010. Best Practices for Running Oracle Databases in Oracle Solaris Containers
An Oracle White Paper April 2010 Best Practices for Running Oracle Databases in Oracle Solaris Containers Introduction... 1 Oracle Solaris Containers... 2 Oracle Solaris Zones Partitioning Technology...
Corporate VPN Using Mikrotik Cloud Feature. By SOUMIL GUPTA BHAYA Mikortik Certified Trainer
Corporate VPN Using Mikrotik Cloud Feature By SOUMIL GUPTA BHAYA Mikortik Certified Trainer What is a VPN? A virtual private network (VPN) is a method for the extension of a private network across a public
Introduction to Operating Systems
Introduction to Operating Systems It is important that you familiarize yourself with Windows and Linux in preparation for this course. The exercises in this book assume a basic knowledge of both of these
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
Implementing Cisco IOS Network Security
Implementing Cisco IOS Network Security IINS v3.0; 5 Days, Instructor-led Course Description Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles
TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control
TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control Version 3.4, Last Edited 9/10/2011 Students Name: Date of Experiment: Read the following guidelines before working in
Network Management Card Security Implementation
[ APPLICATION NOTE #67 ] OFFER AT A GLANCE Offers Involved Network Management Card, APC Security Wizard Applications Configuration and monitoring of network managed devices Broad Customer Problem Secure
FIPS 140-2 Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0
FIPS 40-2 Non- Proprietary Security Policy McAfee SIEM Cryptographic Module, Version.0 Document Version.4 December 2, 203 Document Version.4 McAfee Page of 6 Prepared For: Prepared By: McAfee, Inc. 282
Certification Report
Certification Report EAL 4+ Evaluation of Solaris 10 Release 11/06 Trusted Extensions Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and
End to end security for WebSphere MQ
End to end security for WebSphere MQ An Introduction to WebSphere MQ Advanced Message Security T.Rob Wyatt ([email protected]) Conference materials may not be reproduced in whole or in part without
VDCF - Virtual Datacenter Control Framework for the Solaris TM Operating System
VDCF - Virtual Datacenter Control Framework for the Solaris TM Operating System VDCF Proxy Version 5.5 17. April 2015 Copyright 2005-2015 JomaSoft GmbH All rights reserved. [email protected] VDCF - Proxy
CA SiteMinder. Web Agent Installation Guide for Apache-based Servers 12.51
CA SiteMinder Web Agent Installation Guide for Apache-based Servers 12.51 This Documentation, which includes embedded help systems and electronically distributed materials (hereinafter referred to as the
Rapid AIX Security Hardening with Trusted Execution (TE) AIX schnell absichern mit Trusted Execution Andreas Leibl, RSTC Ltd
IBM Power Systems und Systems Management Symposium 30.05. - 01.06.2011 Rapid AIX Security Hardening with Trusted Execution (TE) AIX schnell absichern mit Trusted Execution Andreas Leibl, RSTC Ltd Andreas
FIPS 140-2 Security Policy LogRhythm 6.0.4 Log Manager
FIPS 140-2 Security Policy LogRhythm 6.0.4 Log Manager LogRhythm 3195 Sterling Circle, Suite 100 Boulder CO, 80301 USA September 17, 2012 Document Version 1.0 Module Version 6.0.4 Page 1 of 23 Copyright
Pen Test Tips 2. Shell vs. Terminal
Pen Test Tips 2 Shell vs. Terminal Once you have successfully exploited a target machine you may be faced with a common dilemma that many penetration testers have, do I have shell access or terminal access?
CLC Server Command Line Tools USER MANUAL
CLC Server Command Line Tools USER MANUAL Manual for CLC Server Command Line Tools 2.5 Windows, Mac OS X and Linux September 4, 2015 This software is for research purposes only. QIAGEN Aarhus A/S Silkeborgvej
What s New in Fireware XTM v11.5.1
What s New in Fireware XTM v11.5.1 New Features in Fireware XTM v11.5.1 Major Changes IPv6 Network Configuration and Routing FIPS 140-2 Dynamic Routing Enhancements Clientless SSO Log and Report Manager
Monitoring Traffic manager
Monitoring Traffic manager eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced
GE Measurement & Control. Cyber Security for NEI 08-09
GE Measurement & Control Cyber Security for NEI 08-09 Contents Cyber Security for NEI 08-09...3 Cyber Security Solution Support for NEI 08-09...3 1.0 Access Contols...4 2.0 Audit And Accountability...4
Installing a Symantec Backup Exec Agent on a SnapScale Cluster X2 Node or SnapServer DX1 or DX2. Summary
Technical Bulletin Application Note April 2013 Installing a Symantec Backup Exec Agent on a SnapScale Cluster X2 Node or SnapServer DX1 or DX2 Summary This application note describes how to install the
MySQL Security: Best Practices
MySQL Security: Best Practices Sastry Vedantam [email protected] Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
Oracle Solaris 11 and PCI DSS Meeting PCI DSS Compliance with Oracle Solaris 11
A COALFIRE WHITE PAPER Oracle Solaris 11 and PCI DSS Meeting PCI DSS Compliance with Oracle Solaris 11 April 4, 2013 Matt Getzelman PCI Practice Director, Coalfire 2013 Coalfire Systems, Inc. All Rights
CA SiteMinder. Web Agent Installation Guide for Apache-based Servers. r12.5. 2nd Edition
CA SiteMinder Web Agent Installation Guide for Apache-based Servers r12.5 2nd Edition This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred
An Oracle White Paper June 2010. How to Install and Configure a Two-Node Cluster
An Oracle White Paper June 2010 How to Install and Configure a Two-Node Cluster Table of Contents Introduction... 3 Two-Node Cluster: Overview... 4 Prerequisites, Assumptions, and Defaults... 4 Configuration
HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline CIS 110 - INTRODUCTION TO UNIX
HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline CIS 110 - INTRODUCTION TO UNIX Course Description: This is an introductory course designed for users of UNIX. It is taught
Configuring and Tuning SSH/SFTP on z/os
Configuring and Tuning SSH/SFTP on z/os Kirk Wolf / Steve Goetze Dovetailed Technologies [email protected] dovetail.com Monday, March 10, 2014, 1:30PM Session: 14787 www.share.org Session Info/Eval link
Identity Management based on FreeIPA
Identity Management based on FreeIPA SLAC 2014 Thorsten Scherf Red Hat EMEA What is an Identity Management System (IdM) An IdM system is a set of services and rules to manage the users of an organization
Installation Guide. McAfee VirusScan Enterprise for Linux 1.9.0 Software
Installation Guide McAfee VirusScan Enterprise for Linux 1.9.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active
Solaris Service Management Facility: Modern System Startup and Administration
Solaris Service Management Facility: Modern System Startup and Administration Jonathan Adams, David Bustos, Stephen Hahn, David Powell, and Liane Praza Sun Microsystems, Inc. ABSTRACT Application uptime
Siebel Installation Guide for UNIX. Siebel Innovation Pack 2013 Version 8.1/8.2, Rev. A April 2014
Siebel Installation Guide for UNIX Siebel Innovation Pack 2013 Version 8.1/8.2, Rev. A April 2014 Copyright 2005, 2014 Oracle and/or its affiliates. All rights reserved. This software and related documentation
PRIME IDENTITY MANAGEMENT CORE
PRIME IDENTITY MANAGEMENT CORE For secure enrollment applications processing and workflow management. PRIME Identity Management Core provides the foundation for any biometric identification platform. It
PARALLELS SERVER BARE METAL 5.0 README
PARALLELS SERVER BARE METAL 5.0 README 1999-2011 Parallels Holdings, Ltd. and its affiliates. All rights reserved. This document provides the first-priority information on the Parallels Server Bare Metal
2 Advanced Session... Properties 3 Session profile... wizard. 5 Application... preferences. 3 ASCII / Binary... Transfer
Contents I Table of Contents Foreword 0 Part I SecEx Overview 3 1 What is SecEx...? 3 2 Quick start... 4 Part II Configuring SecEx 5 1 Session Profiles... 5 2 Advanced Session... Properties 6 3 Session
Using an Open Source Framework to Catch the Bad Guy. Norman Mark St. Laurent Senior Solutions Architect, Red Hat 06.28.12
Using an Open Source Framework to Catch the Bad Guy Norman Mark St. Laurent Senior Solutions Architect, Red Hat 06.28.12 Agenda Audit Log Management Infrastructure Establishing Policies and Procedures
What s New in Centrify Server Suite 2015
C E N T R I F Y S E R V E R S U I T E 2 0 1 5 W H A T S N E W What s New in Centrify Server Suite 2015 Centrify Server Suite Standard Edition Hadoop support Big Data adoption by industry is around 25%
