22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

408 Lotus Security Handbook<br />

Removing obsolete files<br />

Occasionally, there is a need to remove unwanted and unneeded files from the<br />

AIX server.<br />

AIX provides the system administrator with the skulker command, which can<br />

automatically track and remove obsolete files. This facility works on candidate<br />

files located in the /tmp directory, executable a.out files, core files, and ed.hup<br />

files. To run the skulker command, type the following at the command prompt:<br />

# skulker -p<br />

You can automate the skulker command by setting up the cron facility to perform<br />

this task regularly.<br />

Removing unowned files<br />

When a user ID is removed, that user’s files then have no owner assigned to<br />

them. To identify files that have no owner, use the find command as follows:<br />

# find / -nouser -ls<br />

After identifying files that have no owners, determine whether the files are<br />

needed. If they are needed, they should be assigned to a different user.<br />

Alternatively, these files can be removed from the system.<br />

Managing unauthorized remote host access<br />

Some programs use the .rhosts file to gain access to a system. In some cases,<br />

access can be granted to unauthenticated users. To avoid this situation, the<br />

.rhosts file should be removed from the AIX server.<br />

For HACMP clusters, .rhosts files are required. Instead of removing them from<br />

these configurations, the permissions should be set to 600 and ownership of the<br />

files should be assigned to root.system.<br />

To find .rhosts files, run the following command:<br />

# find / -name .rhosts -ls<br />

Monitoring executable files<br />

To monitor the activity of critical executable files, a good understanding of how<br />

these files are being used is required. The executable files that need to be<br />

monitored are those that are owned by root and have either their SUID or SGID<br />

bits set.<br />

After carefully monitoring these files during normal system activity, a report can<br />

be generated that includes a list of files that are normally executed. This report<br />

can then be validated against subsequent reports that show new files with these

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!