Rapid AIX Security Hardening with Trusted Execution (TE) AIX schnell absichern mit Trusted Execution Andreas Leibl, RSTC Ltd
|
|
|
- Garey Cook
- 10 years ago
- Views:
Transcription
1 IBM Power Systems und Systems Management Symposium Rapid AIX Security Hardening with Trusted Execution (TE) AIX schnell absichern mit Trusted Execution Andreas Leibl, RSTC Ltd
2 Andreas Leibl RSTC Ltd based in Bristol, UK and Ulm, Germany If you have any questions about the talk please send me an or contact me in LinkedIn: Xing: 2
3 Agenda AIX Security Trusted Execution (TE) & Trusted Computing Base (TCB) System Integrity Check Runtime Integrity Check Trusted Path Adding your own files 3
4 AIX & Security UNIX type security (accounts & permissions) Role Based Access Control (enhanced RBAC) enhanced in AIX 7.1 with Domain RBAC Trusted Execution (TE) 4
5 RBAC Role Based Access Control Fine granular control Kernel level, applications need not be modified No privilege escalation through faulty programs or shell escapes Users gain privileges through roles which allow them to execute certain operations Superior to sudo 5
6 Domain RBAC RBAC enhancement in AIX 7.1 Allows restrictions of privileges to certain objects Example: Right to resize filesystems can be limited to certain filesystems 6
7 Trusted Execution Replaces Trusted Computing Base (TCB) Superior capabilities TCB still available 7
8 Trusted Computing Base (TCB) Needs to be enabled at install time Limited to static (offline) checks (security sweeps) Default database quite limited (heavy use of VOLATILE keyword which effectively disables TCB checks for specified files) Weak checksums - low security 8
9 TE vs. TCB TE can be enabled at any time Uses cryptographically strong hashes Hashes can be cryptographically signed Runtime (online) checks in addition to static (offline) checks 9
10 TE Protection Trojan horses Root kits Any tampering with critical files Can easily be extended to include user files 10
11 Trusted Execution Requirements AIX 6.1 or 7.1 CryptoLight for C library (clic.rte.*) from expansion pack lslpp -l 'clic.*' Fileset Level State Description Path: /usr/lib/objrepos clic.rte.kernext COMMITTED CryptoLite for C Kernel clic.rte.lib COMMITTED CryptoLite for C Library Path: /etc/objrepos clic.rte.kernext COMMITTED CryptoLite for C Kernel 11
12 TE: Strong Hashes One way hash functions generate secure fingerprint of files Default hash algorithm: SHA256 Also available: SHA1 (160 bits), SHA512 Can sign the hashes in the TE database for added security AIX files come with signed hashes from IBM 12
13 Trusted Signature Database Can use grep -p or the proper command to see stanzas in the TE database: trustchk -q /usr/bin/ls /usr/bin/ls: owner = bin group = bin mode = 555 type = FILE hardlinks = symlinks = size = cert_tag = 00d3cbd b209 signature = 964bf2d53b4e0b6c3be62e2569ab9da192634a69d5f2d eb f0d da627ea2cd7b a1c82e25cbf585733de4e88dc649b5306dfb7427b32c29ac37f259ed5f6598c415f682abda422ee3a f9f1f7191b32ebcd467ad3ca302425c5607e59ffad1fcd69306f c2f0c1d8e143b1752d hash_value = 49d01450fe520cc2c7ed85153a90ef5f2b841aaf38f40e466f734b92ad4356c8 minslabel = maxslabel = intlabel = accessauths = aix.fs.object.list innateprivs = PV_DAC_R,PV_DAC_X inheritprivs = authprivs = secflags = FSF_EPS t_innateprivs = PV_MAC_R,PV_MIC 13
14 System Integrity Check TE checks all files listed in database Changed permissions are corrected Changed files are disabled (read, write and execute permissions revoked) Run manually or by crond 14
15 Planting a Trojan Horse Let's do something nasty... mv /usr/bin/ls /usr/bin/.ls vi /usr/bin/ls... cat /usr/bin/ls!/usr/bin/sh Replacing the ls command with a malicious version that installs a backdoor and then emulates ls behaviour echo "Doing something dirty here (which you can't see)..." /usr/bin/.ls $* chmod 555 /usr/bin/ls ls /home Doing something dirty here (which you can't see)... guest lost+found root 15
16 System Integrity Check in Action - Check only trustchk -n ALL trustchk: Verification of attributes failed: /usr/lpp/ diagnostics/bin/ecc_mcode_get : mode trustchk: Verification of attributes failed: /usr/sbin/sshd : size trustchk: Verification of attributes failed: /usr/sbin/ ifconfig.ib : group trustchk: Verification of attributes failed: /usr/bin/ls : owner group size hashvalue signature 16
17 System Integrity Check Sometimes produces false alerts Means: TSD wasn t updated correctly (includes permissions,suid) or files were removed or properties not specified (like size in case of sshd) The -n flag only means trustchk only reports problems -> no corrective action 17
18 Checking the Hash want to check the hash value? openssl dgst -sha256 /usr/bin/ls SHA256(/usr/bin/ls)= 4e6da7a726bb27428f2e8321a2aea231f587e88aacc03ac766c0cf1a openssl dgst -sha256 /usr/bin/.ls SHA256(/usr/bin/.ls)= 49d01450fe520cc2c7ed85153a90ef5f2b841aaf38f40e466f734b92ad4356c8 trustchk -q /usr/bin/ls grep hash hash_value = Modifed ls Original ls TSD entry 49d01450fe520cc2c7ed85153a90ef5f2b841aaf38f40e466f734b92ad4356c8 18
19 System Integrity Check - Interactive Use trustchk -t to correct problems interactively trustchk -t /usr/bin/ls trustchk: Verification of attributes failed: owner Change the file owner for /usr/bin/ls? [(y)es,(n)o,(i)gnore all errors]: n trustchk: Verification of attributes failed: group Change the file group for /usr/bin/ls? [(y)es,(n)o,(i)gnore all errors]: n trustchk: Verification of attributes failed: size Disable access to the file: /usr/bin/ls? [(y)es,(n)o,(i)gnore all errors]: n trustchk: Verification of attributes failed: hash Disable access to the file: /usr/bin/ls? [(y)es,(n)o,(i)gnore all errors]: n trustchk: Verification of attributes failed: signature Disable access to the file: /usr/bin/ls? [(y)es,(n)o,(i)gnore all errors]: n trustchk: Verification of stanza failed: 19
20 System Integrity Check - Autocorrection trustchk -y = auto (think fsck -y) trustchk -y /usr/bin/ls trustchk: Verification of attributes failed: owner trustchk: Verification of attributes failed: group trustchk: Verification of attributes failed: mode trustchk: Verification of attributes failed: size trustchk: Verification of attributes failed: hash trustchk: Verification of attributes failed: signature trustchk: Verification of stanza failed: /usr/bin/.ls -l /usr/bin/ls T 1 bin bin 93 May 28 16:07 /usr/bin/ls File disabled 20
21 System Integrity Check - Autocorrection Wrong permissions get reset Wrong owner and group get reset Files that changed size or hash value are disabled 21
22 Runtime Integrity Check Binaries, shared libraries, kernel extensions and shell scripts are checked before execution Kernel refuses to load/execute them if verification fails Check is repeated every time -> no window of opportunity for attackers 22
23 Runtime Integrity Check Policies trustchk -p name=values sets policies TE=[ON OFF] : turns runtime checks on/off CHKEXEC=[ON OFF] : executable checking STOP_ON_CHKFAIL= [ON OFF] : stop executables failing the test STOP_UNTRUSTD= [ON OFF] : stop executables not listed in /etc/security/tsd/tsd.dat And more... 23
24 Runtime Integrity Check - Modified File trustchk -p TE=ON CHKEXEC=ON STOP_ON_CHKFAIL=ON ls ksh: ls: Execute permission denied. Changed command does not execute cp /usr/bin/ls /usr/bin/.badls cp /usr/bin/.ls /usr/bin/ls chown bin:bin /usr/bin/ls ls.xauthority... Check is re-run every time the command is executed 24
25 Runtime Integrity Check - Unlisted File STOP_UNTRUSTD prevents execution of commands not listed in the TSD trustchk -p TE=ON CHKEXEC=ON STOP_UNTRUSTD=ON /usr/bin/.ls ksh: /usr/bin/.ls: Execute permission denied. ls -l /usr/bin/.ls -r-xr-xr-x 1 bin bin May 28 17:39 /usr/ bin/.ls Command.ls (the original ls) not executed (no check failure, file permissions ok) 25
26 Path Protection Trusted path Limits where programs/scripts can be started from Much more effective that restricted shell and a fixed $PATH variable 26
27 Trusted Path in Action cp /usr/bin/ls /usr/local/bin/ls /usr/local/bin/ls.xauthority... /usr/local/bin/ not in trusted path trustchk -p TEP=ON /usr/local/bin/ls ksh: /usr/local/bin/ls: Execute permission denied. trustchk -p tep TEP=ON TEP=/usr/bin:/usr/sbin:/etc:/bin:/sbin:/sbin/helpers/jfs2:/usr/ lib/instl:/usr/ccs/bin:/usr/lib:/usr/lib/security 27
28 Adding Your Own Files TE protection for your own files: EASY! Step 1: Create certificates and keys with openssl (only once) Step 2: Add to the TE database. That's it. TE takes care of the rest. 28
29 Creating Certificates cd /te openssl genrsa -out mycorpprivkey.perm 2048 Generating RSA private key, 2048 bit long modulus e is (0x10001) openssl req -new -x509 -key mycorpprivkey.perm -outform DER -mycorpcert.der - days 3650 You are about to be asked to enter information that will be incorporated... (some questions asked here)... openssl pkcs8 -inform PEM -in mycorpprivkey.perm -topk8 -nocrypt -outform DER - out mycorpprivkey.der ls mycorpcert.der mycorpprivkey.der mycorpprivkey.perm 29
30 Add to TE Database trustchk -s /te/mycorpprivkey.der -v mycorpcert.der -a /usr/local/bin/mycmd trustchk -q /usr/local/bin/mycmd /usr/local/bin/mycmd: type = FILE owner = root group = system mode = 755 size = 47 hash_value = 48d45e86a5a8ff4c6a94dfe fc0e1a6c0967f06233eaa84ff232fbceb2 cert_tag = 008b2dd04da79dc0b5 signature = a3ecc6b2c a0be
31 Test: Finding Illegal Modifications trustchk -n /usr/local/bin/mycmd echo $? 0 echo "CHANGED" >> /usr/local/bin/mycmd trustchk -n /usr/local/bin/mycmd trustchk: Verification of attributes failed: /usr/local/bin/mycmd : size hashvalue signature echo $?
32 Maintenance Installing updates naturally changes the files Hashes in the TE database need updating AIX updates come with new signatures Need to update hashes for own files 32
33 Want to give it a go? IBM business partners can get AIX test systems for free from the Virtual Loaner Program Not a business partner? Sign up at (all you need is a VAT ID) 33
34 Questions? 34
35 Thank you! If you think of a question later feel free to send me an . 35
Creation and Management of Certificates
Security OpenSSL Creation and Management of Certificates Roberta Daidone [email protected] What are we going to do? Setup of a Certification Authority Creation of a self-signed root certificate
Secure Shell Demon setup under Windows XP / Windows Server 2003
Secure Shell Demon setup under Windows XP / Windows Server 2003 Configuration inside of Cygwin $ chgrp Administrators /var/{run,log,empty} $ chown Administrators /var/{run,log,empty} $ chmod 775 /var/{run,log}
Ciphermail Gateway Separate Front-end and Back-end Configuration Guide
CIPHERMAIL EMAIL ENCRYPTION Ciphermail Gateway Separate Front-end and Back-end Configuration Guide June 19, 2014, Rev: 8975 Copyright 2010-2014, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction
Locking Down Files With Encrypted File System
Page 1 of 6 close window Locking Down Files With Encrypted File System August September 2008 by Jaqui Lynch In October 2007 I outlined some of the new security features in AIX* version 6.1. This article
EventTracker Windows syslog User Guide
EventTracker Windows syslog User Guide Publication Date: September 16, 2011 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Introduction This document is prepared to help user(s)
Unix/Linux Forensics 1
Unix/Linux Forensics 1 Simple Linux Commands date display the date ls list the files in the current directory more display files one screen at a time cat display the contents of a file wc displays lines,
Executable Integrity Verification
Executable Integrity Verification Abstract Background Determining if a given executable has been trojaned is a tedious task. It is beyond the capabilities of the average end user and even many network
An Introduction to the Linux Command Shell For Beginners
An Introduction to the Linux Command Shell For Beginners Presented by: Victor Gedris In Co-Operation With: The Ottawa Canada Linux Users Group and ExitCertified Copyright and Redistribution This manual
Secure File Transfer Installation. Sender Recipient Attached FIles Pages Date. Development Internal/External None 11 6/23/08
Technical Note Secure File Transfer Installation Sender Recipient Attached FIles Pages Date Development Internal/External None 11 6/23/08 Overview This document explains how to install OpenSSH for Secure
LSN 10 Linux Overview
LSN 10 Linux Overview ECT362 Operating Systems Department of Engineering Technology LSN 10 Linux Overview Linux Contemporary open source implementation of UNIX available for free on the Internet Introduced
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected]
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected] A number of devices are running Linux due to its flexibility and open source nature. This has made Linux platform
DoD Public Key Enablement (PKE) Quick Reference Guide. Securing Apache HTTP with mod_ssl for Linux
DoD Public Key Enablement (PKE) Quick Reference Guide Securing Apache HTTP with mod_ssl for Linux Contact: [email protected] URL: https://www.us.army.mil/suite/page/474113 This guide provides instructions
Learning Network Security with SSL The OpenSSL Way
Learning Network Security with SSL The OpenSSL Way Shalendra Chhabra [email protected]. Computer Science and Enginering University of California, Riverside http://www.cs.ucr.edu/ schhabra Slides Available
Basic Linux & Package Management. Original slides from GTFO Security
Basic Linux & Package Management Original slides from GTFO Security outline Linux What it is? Commands Filesystem / Shell Package Management Services run on Linux mail dns web central authentication router
Practical Mac OS X Insecurity
Practical Mac OS X Insecurity Security Concepts, Problems, and Exploits on Your Mac Angelo Laub [email protected] December 11, 2004 1 Introduction While rumors have it that Mac OS X is extremely secure
Managing the SSL Certificate for the ESRS HTTPS Listener Service Technical Notes P/N 300-011-843 REV A01 January 14, 2011
Managing the SSL Certificate for the ESRS HTTPS Listener Service Technical Notes P/N 300-011-843 REV A01 January 14, 2011 This document contains information on these topics: Introduction... 2 Terminology...
SSL Tunnels. Introduction
SSL Tunnels Introduction As you probably know, SSL protects data communications by encrypting all data exchanged between a client and a server using cryptographic algorithms. This makes it very difficult,
A Brief Guide to Certificate Management
A Brief Guide to Certificate Management M.L. Luvisetto November 18, 2008 1 Introduction: Concepts, Passphrase Certificates are the way users authenticate themselves in network activities that perform identity
Oracle Solaris Security: Mitigate Risk by Isolating Users, Applications, and Data
Oracle Solaris Security: Mitigate Risk by Isolating Users, Applications, and Data Will Fiveash presenter, Darren Moffat author Staff Engineer Solaris Kerberos Development Safe Harbor Statement The following
Patterns for Secure Boot and Secure Storage in Computer Systems
Patterns for Secure Boot and Secure Storage in Computer Systems Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy Horst Görtz Institute for IT Security, Ruhr-University Bochum, Germany {hans.loehr,ahmad.sadeghi,marcel.winandy}@trust.rub.de
Rootkit: Analysis, Detection and Protection
Rootkit: Analysis, Detection and Protection Igor Neri Sicurezza Informatica Prof. Bistarelli 1/34 Definition of Rootkit A rootkit is malware which consists of a set of programs designed to hide or obscure
Cedric Rajendran VMware, Inc. Security Hardening vsphere 5.5
Cedric Rajendran VMware, Inc. Security Hardening vsphere 5.5 Agenda Security Hardening vsphere 5.5 ESXi Architectural Review ESXi Software Packaging The ESXi Firewall ESXi Local User Security Host Logs
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
Know Your Enemy: A Forensic Analysis
Know Your Enemy: A Forensic Analysis The Study of an Attack Honeynet Project http://project.honeynet.org Last Modified: 23 May 2000 This paper is a continuation of the Know Your Enemy series. The first
static void insecure (localhost *unix)
static void insecure (localhost *unix) Eric Pancer [email protected] Information Security Team DePaul University http://infosec.depaul.edu Securing UNIX Hosts from Local Attack p.1/32 Overview
SBClient SSL. Ehab AbuShmais
SBClient SSL Ehab AbuShmais Agenda SSL Background U2 SSL Support SBClient SSL 2 What Is SSL SSL (Secure Sockets Layer) Provides a secured channel between two communication endpoints Addresses all three
EMC AVAMAR 6.0 GUIDE FOR IBM DB2 P/N 300-011-636 REV A01 EMC CORPORATION CORPORATE HEADQUARTERS: HOPKINTON, MA 01748-9103 1-508-435-1000 WWW.EMC.
EMC AVAMAR 6.0 FOR IBM DB2 GUIDE P/N 300-011-636 REV A01 EMC CORPORATION CORPORATE HEADQUARTERS: HOPKINTON, MA 01748-9103 1-508-435-1000 WWW.EMC.COM Copyright and Trademark Notices Copyright 2002-2011
Encrypted Connections
EMu Documentation Encrypted Connections Document Version 1 EMu Version 4.0.03 www.kesoftware.com 2010 KE Software. All rights reserved. Contents SECTION 1 Encrypted Connections 1 How it works 2 Requirements
Ciphire Mail. Abstract
Ciphire Mail Technical Introduction Abstract Ciphire Mail is cryptographic software providing email encryption and digital signatures. The Ciphire Mail client resides on the user's computer between the
Replacing vcenter Server 4.0 Certificates VMware vsphere 4.0
Technical Note Replacing vcenter Server 4.0 Certificates VMware vsphere 4.0 Certificates are automatically generated when you install vcenter Server and ESX/ESXi. These default certificates are not signed
Application Whitelisting - Extend your Security Arsenal? Mike Baldi Cyber Security Architect Honeywell Process Solutions
Application Whitelisting - Extend your Security Arsenal? Mike Baldi Cyber Security Architect Honeywell Process Solutions 1 Agenda What is Application Whitelisting (AWL) Protection provided by Application
SSL Configuration on Weblogic Oracle FLEXCUBE Universal Banking Release 12.0.87.01.0 [August] [2014]
SSL Configuration on Weblogic Oracle FLEXCUBE Universal Banking Release 12.0.87.01.0 [August] [2014] Table of Contents 1. CONFIGURING SSL ON ORACLE WEBLOGIC... 1-1 1.1 INTRODUCTION... 1-1 1.2 SETTING UP
HOWTO. Configure Nginx for SSL with DoD CAC Authentication on CentOS 6.3. Joshua Penton Geocent, LLC [email protected].
HOWTO Configure Nginx for SSL with DoD CAC Authentication on CentOS 6.3 Joshua Penton Geocent, LLC [email protected] March 2013 Table of Contents Overview... 1 Prerequisites... 2 Install OpenSSL...
OpenSSL (lab notes) Definition: OpenSSL is an open-source library containing cryptographic tools.
Network security MSc IDL (GLIA) and MSc HIT / Isima Academic year 2012-2013 OpenSSL (lab notes) Definition: OpenSSL is an open-source library containing cryptographic tools. 1. OpenSSL usage Exercice 1.1
WebApp S/MIME Manual. Release 7.2.1. Zarafa BV
WebApp S/MIME Manual Release 7.2.1 Zarafa BV January 06, 2016 Contents 1 Introduction 2 2 Installation 3 2.1 RPM based distributions............................................. 3 2.2 DEB based distributions.............................................
Contents III: Contents II: Contents: Rule Set Based Access Control (RSBAC) 4.2 Model Specifics 5.2 AUTH
Rule Set Based Access Control (RSBAC) Linux Kernel Security Extension Tutorial Amon Ott Contents: 1 Motivation: Why We Need Better Security in the Linux Kernel 2 Overview of RSBAC 3 How
Homeland Security Red Teaming
Homeland Security Red Teaming Directs intergovernmental coordination Specifies Red Teaming Viewing systems from the perspective of a potential adversary Target hardening Looking for weakness in existing
Monitoring Server File Integrity With CloudPassage Halo
Contents: Monitoring Server File Integrity With CloudPassage Halo How File Integrity Monitoring Works Run a File Integrity Scan 1. Define a Server Group to Scan 2. Create or Clone a File Integrity Policy
Marriott Enrollment Server for Web User Guide V1.4
Marriott Enrollment Server for Web User Guide V1.4 Page 1 of 26 Table of Contents TABLE OF CONTENTS... 2 PREREQUISITES... 3 ADMINISTRATIVE ACCESS... 3 RNACS... 3 SUPPORTED BROWSERS... 3 DOWNLOADING USING
CA and SSL Certificates
1 For this exercise you must again be root. Login and obtain root privileges: sudo su 2 Create a working directory only accessible to root: mkdir ~/ca cd ~/ca chmod og rwx. 3 Install openssl if necessary
efolder White Paper: The Truth about Data Integrity: 5 Questions to ask your Online Backup Provider
efolder White Paper: The Truth about Data Integrity: 5 Questions to ask your Online Backup Provider January 2015 Introduction Competition is fierce in the exploding online backup industry. With so many
NOTE: This is not a official Cisco document and you use it on your own risk.
How to conifgure NGS for with certificate chain Contents How to conifgure NGS for with certificate chain... 1 Idea:... 1 Setup:... 1 Configuration steps:... 1 Test login with client and verify certificate
[SMO-SFO-ICO-PE-046-GU-
Presentation This module contains all the SSL definitions. See also the SSL Security Guidance Introduction The package SSL is a static library which implements an API to use the dynamic SSL library. It
Creating and Managing Certificates for My webmethods Server. Version 8.2 and Later
Creating and Managing Certificates for My webmethods Server Version 8.2 and Later November 2011 Contents Introduction...4 Scope... 4 Assumptions... 4 Terminology... 4 File Formats... 5 Truststore Formats...
How To Send An Encrypted Email In Outlook 2000 (For A Password Protected Email) On A Pc Or Macintosh (For An Ipo) On Pc Or Ipo (For Pc Or For A Password Safemail) On An Iphone Or
Outlook 2000 1. Open Outlook 2000 and select the Tools > Options > Security. 2. Click Change Settings. 3. Under the Certificates and Algorithms, there are two Choose buttons. The first allows you to select
To enable https for appliance
To enable https for appliance We have used openssl command to generate a key pair. The below image shows on how to generate key using the openssl command. SSH into appliance and login as root. Copy all
Linux System Administration on Red Hat
Linux System Administration on Red Hat Kenneth Ingham September 29, 2009 1 Course overview This class is for people who are familiar with Linux or Unix systems as a user (i.e., they know file manipulation,
VERITAS NetBackup 6.0 Encryption
VERITAS NetBackup 6.0 Encryption System Administrator s Guide for UNIX, Windows, and Linux N15274C September 2005 Disclaimer The information contained in this publication is subject to change without notice.
OpenADR 2.0 Security. Jim Zuber, CTO QualityLogic, Inc.
OpenADR 2.0 Security Jim Zuber, CTO QualityLogic, Inc. Security Overview Client and server x.509v3 certificates TLS 1.2 with SHA256 ECC or RSA cipher suites TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 TLS_RSA_WITH_AES_128_CBC_SHA256
SSL Certificate Generation
SSL Certificate Generation Last updated: 2/09/2014 Table of contents 1 INTRODUCTION...3 2 PROCEDURES...4 2.1 Creation and Installation...4 2.2 Conversion of an existing certificate chain available in a
Avoid the SSLippery Slope of Default SSL
Copyright 2014 Splunk Inc. Avoid the SSLippery Slope of Default SSL Duane Waddle, IT Specialist, UltraMegaCorp George Starcher, Security Engineer, Peak Hosting SSL Refresher Provides bulk encryption of
What s New in MySQL 5.7 Security Georgi Joro Kodinov Team Lead MySQL Server General Team
What s New in MySQL 5.7 Security Georgi Joro Kodinov Team Lead MySQL Server General Team Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information
Sharing Secrets Using Encryption Facility
Sharing Secrets Using Encryption Facility Eysha S. Powers IBM Corporation Insert Custom Session QR if Desired Tuesday, August 11, 2015: 6:00pm 7:00pm Session Number 17624 Cryptography is used in a variety
SSL Protect your users, start with yourself
SSL Protect your users, start with yourself Kulsysmn 14 december 2006 Philip Brusten Overview Introduction Cryptographic algorithms Secure Socket Layer Certificate signing service
Symmetric and Public-key Crypto Due April 14 2015, 11:59PM
CMSC 414 (Spring 2015) 1 Symmetric and Public-key Crypto Due April 14 2015, 11:59PM Updated April 11: see Piazza for a list of errata. Sections 1 4 are Copyright c 2006-2011 Wenliang Du, Syracuse University.
Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology
Port Scanning and Vulnerability Assessment ECE4893 Internetwork Security Georgia Institute of Technology Agenda Reconnaissance Scanning Network Mapping OS detection Vulnerability assessment Reconnaissance
Linux Deployment Guide. How to deploy Network Shutdown Module for Linux
Linux Deployment Guide How to deploy Network Shutdown Module for Linux 1 Contents 2 Introduction... 4 3 To Prepare your System for Install... 4 3.1 RedHat 5.9 i386 Command... 4 3.2 RedHat 5.9 x86_64 Command...
DOCUMENTUM CONTENT SERVER CERTIFICATE BASED SSL CONFIGURATION AND TROUBLESHOOTING
White Paper DOCUMENTUM CONTENT SERVER CERTIFICATE BASED SSL CONFIGURATION AND TROUBLESHOOTING Abstract This White Paper explains configuration for enabling Certificate based SSL for secure communication
How to Tunnel Remote Desktop using SSH (Cygwin) for Windows XP (SP2)
How to Tunnel Remote Desktop using SSH (Cygwin) for Windows XP (SP2) The ssh server is an emulation of the UNIX environment and OpenSSH for Windows, by Redhat, called cygwin This manual covers: Installation
Tivoli Endpoint Manager for Remote Control Version 8 Release 2. Internet Connection Broker Guide
Tivoli Endpoint Manager for Remote Control Version 8 Release 2 Internet Connection Broker Guide Tivoli Endpoint Manager for Remote Control Version 8 Release 2 Internet Connection Broker Guide Note Before
Installation & Configuration Guide for Solaris 8
Installation & Configuration Guide for Solaris 8 Document version 1.1.2, 2003-02-27 CWRU Information Technology Services If you have any questions or problems using these instructions, simply contact the
Features. The Samhain HIDS. Overview of available features. Rainer Wichmann
Overview of available features November 1, 2011 POSIX (e.g. Linux, *BSD, Solaris 2.x, AIX 5.x, HP-UX 11, and Mac OS X. Windows 2000 / WindowsXP with POSIX emulation (e.g. Cygwin). Please note that this
Host Hardening. OS Vulnerability test. CERT Report on systems vulnerabilities. (March 21, 2011)
Host Hardening (March 21, 2011) Abdou Illia Spring 2011 CERT Report on systems vulnerabilities Source: CERT Report @ http://www.kb.cert.org/vuls/bymetric 2 OS Vulnerability test Source: http://www.omninerd.com/articles/2006_operating_system_vulnerabilit
USER GUIDE. Snow Inventory Client for Unix Version 1.1.03 Release date 2015-04-29 Document date 2015-05-20
USER GUIDE Product Snow Inventory Client for Unix Version 1.1.03 Release date 2015-04-29 Document date 2015-05-20 CONTENT ABOUT THIS DOCUMENT... 3 OVERVIEW... 3 OPERATING SYSTEMS SUPPORTED... 3 PREREQUISITES...
Practical Mac OS X Insecurity. Security Concepts, Problems and Exploits on your Mac
Practical Mac OS X Insecurity Security Concepts, Problems and Exploits on your Mac Who am I? Student of physics, mathematics and astronomy in Bonn Mac user since 1995 I love Macs Mac evangelist Intentions
SAS 9.4 In-Database Products
SAS 9.4 In-Database Products Administrator s Guide Fifth Edition SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2015. SAS 9.4 In-Database Products:
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
Installing IBM Websphere Application Server 7 and 8 on OS4 Enterprise Linux
Installing IBM Websphere Application Server 7 and 8 on OS4 Enterprise Linux By the OS4 Documentation Team Prepared by Roberto J Dohnert Copyright 2013, PC/OpenSystems LLC This whitepaper describes how
Implementing SSL Security on a PowerExchange 9.1.0 Network
Implementing SSL Security on a PowerExchange 9.1.0 Network 2012 Informatica Abstract This article describes how to implement SSL security on a PowerExchange network. To implement SSL security, configure
Security Workshop. Apache + SSL exercises in Ubuntu. 1 Install apache2 and enable SSL 2. 2 Generate a Local Certificate 2
Security Workshop Apache + SSL exercises in Ubuntu Contents 1 Install apache2 and enable SSL 2 2 Generate a Local Certificate 2 3 Configure Apache to use the new certificate 4 4 Verify that http and https
Cisco Expressway Certificate Creation and Use
Cisco Expressway Certificate Creation and Use Deployment Guide Cisco Expressway X8.1 D15061.01 December 2013 Contents Introduction 3 PKI introduction 3 Overview of certificate use on the Expressway 3 Certificate
Oracle Database Vault: Design Failures
Oracle Database Vault: Design Failures What is Database Vault? Helps protecting against insider threats even when these comes from privileged database users (SYS) Mandatory in certain countries: laws Can
Hacking Linux-Powered Devices. Stefan Arentz <[email protected]>
Hacking Linux-Powered Devices Stefan Arentz Part I Introduction What is Embedded Linux? Embedded usually means that it is a device with limited and specialized capabilities. It is not
Hands-On UNIX Exercise:
Hands-On UNIX Exercise: This exercise takes you around some of the features of the shell. Even if you don't need to use them all straight away, it's very useful to be aware of them and to know how to deal
USEFUL UNIX COMMANDS
cancel cat file USEFUL UNIX COMMANDS cancel print requested with lp Display the file cat file1 file2 > files Combine file1 and file2 into files cat file1 >> file2 chgrp [options] newgroup files Append
Dell Client BIOS: Signed Firmware Update
Dell Client BIOS: Signed Firmware Update An Implementation and Deployment Guide to NIST SP800-147 BIOS Protections for Dell Client BIOS Rick Martinez Dell Client BIOS This white paper is for informational
Network Security Essentials Chapter 7
Network Security Essentials Chapter 7 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 7 Electronic Mail Security Despite the refusal of VADM Poindexter and LtCol North to appear,
SCP - Strategic Infrastructure Security
SCP - Strategic Infrastructure Security Lesson 1 - Cryptogaphy and Data Security Cryptogaphy and Data Security History of Cryptography The number lock analogy Cryptography Terminology Caesar and Character
MySQL Security: Best Practices
MySQL Security: Best Practices Sastry Vedantam [email protected] Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
Trouble Shooting on e-filing
DSC Registration Problem Description: I am not able to register my Digital Signature Certificate. Or while trying to e-file Income Tax Return using Digital Signature Certificate, the 'Select your.pfx file'
EMVCo Letter of Approval - Contact Terminal Level 2
May 18, 2015 Richard Pohl Triton Systems of Delaware, LLC 21405 B Street Long Beach MS 39560 USA Re: EMV Application Kernel: Approval Number(s): EMVCo Letter of Approval - Contact Terminal Level 2 Triton
HTTPS Configuration for SAP Connector
HTTPS Configuration for SAP Connector 1993-2015 Informatica LLC. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording or otherwise) without
Chapter 7: Unix Security. Chapter 7: 1
Chapter 7: Unix Security Chapter 7: 1 Objectives Understand the security features provided by a typical operating system. Introduce the basic Unix security model. See how general security principles are
Active Directory Adapter with 64-bit Support Installation and Configuration Guide
IBM Security Identity Manager Version 6.0 Active Directory Adapter with 64-bit Support Installation and Configuration Guide SC27-4384-02 IBM Security Identity Manager Version 6.0 Active Directory Adapter
Using the Radmind Command Line Tools to. Maintain Multiple Mac OS X Machines
Using the Radmind Command Line Tools to Maintain Multiple Mac OS X Machines Version 0.8.1 This document describes how to install, configure and use the radmind client and server tools to maintain a small
Linux Operating System Security
Linux Operating System Security Kenneth Ingham and Anil Somayaji September 29, 2009 1 Course overview This class is for students who want to learn how to configure systems to be secure, test the security
# openssl genrsa -out /etc/ssl/private/ca.key 1024 Generating RSA private key, 1024 bit long modulus...++++++...++++++ e is 65537 (0x10001
IPsec in Tunnel Mode between Windows XP Professional and OpenBSD with X.509v3 Certificate Authentication Thomas Walpuski February 7 th, 2002 Translated into English by Mike van Opstal
Package PKI. July 28, 2015
Version 0.1-3 Package PKI July 28, 2015 Title Public Key Infrastucture for R Based on the X.509 Standard Author Maintainer Depends R (>= 2.9.0),
The Tor VM Project. Installing the Build Environment & Building Tor VM. Copyright 2008 - The Tor Project, Inc. Authors: Martin Peck and Kyle Williams
The Tor VM Project Installing the Build Environment & Building Tor VM Authors: Martin Peck and Kyle Williams Table of Contents 1. Introduction and disclaimer 2. Creating the virtualization build environment
PCI Data Security Standards (DSS)
ENTERPRISE APPLICATION WHITELISTING SOLUTION Achieving PCI Compliance at the Point of Sale Using Bit9 Parity TM to Protect Cardholder Data PCI: Protecting Cardholder Data As the technology used by merchants
DOCUMENTUM CONTENT SERVER CERTIFICATE BASED SSL CONFIGURATION WITH CLIENTS
DOCUMENTUM CONTENT SERVER CERTIFICATE BASED SSL CONFIGURATION WITH CLIENTS ABSTRACT This white paper is step-by-step guide for Content Server 7.2 and above versions installation with certificate based
Host-based Intrusion Prevention System (HIPS)
Host-based Intrusion Prevention System (HIPS) White Paper Document Version ( esnhips 14.0.0.1) Creation Date: 6 th Feb, 2013 Host-based Intrusion Prevention System (HIPS) Few years back, it was relatively
Oracle security done right. Secure database access on the (unix and linux) operating system level.
Oracle security done right. Secure database access on the (unix and linux) operating system level. By Frits Hoogland, VX Company Security is an important part of modern database administration, and is
Deploying Certificates with Cisco pxgrid. Using Self-Signed Certificates with ISE pxgrid node and pxgrid Client
Deploying Certificates with Cisco pxgrid Using Self-Signed Certificates with ISE pxgrid node and pxgrid Client Table of Contents About this Document... 3 Introduction... 5 Example Certificate Configuration...
Linux Security on HP Servers: Security Enhanced Linux. Abstract. Intended Audience. Technical introduction
Linux Security on HP Servers: Security Enhanced Linux Technical introduction This white paper -- one in a series of Linux security white papers -- discusses Security Enhanced Linux (SELinux), a mandatory
