by Katherine Hosch This tip provides one way to secure your Solaris operating system. Aside from not having up-to-date patches, improperly configured inetd services are a huge source of security vulnerabilities. Most network services are started by the inetd daemon, following configuration rules specified in /etc/inetd.conf. The default Solaris /etc/inetd.conf includes lines to start up many unnecessary (and highly vulnerable) services. Services that are often unnecessary are: exec, comsat, talk, uucp, finger, echo, discard, daytime, chargen, sadmind, rpc.cmsd and rpc.ttdbserverd. The last three of these have been some of the favorite targets of hackers, since they all have been susceptible to buffer-overflow attacks, which allow for remote root compromise of targeted systems. About the author:
Katherine Hosch is a security engineer and systems administrator with Scientific Applications International Corporation (SAIC) at Entergy Services, Inc., in Covington, LA.
Author : Peter H. Gregory
Publisher : Prentice Hall
ISBN/CODE : 0130960535
Cover Type : Soft Cover
Pages : 250
Published : Aug. 1999
System administrators: Learn the specifics for making your system secure, whether it's an organization-wide network or a standalone workstation. Expert author Peter Gregory has managed security for everything from top-secret corporate research facilities to casinos. Take advantage of his expertise to build a secure, reliable system of your own. Solaris Security looks at the physical, logical and human factors that affect security.
This was first published in March 2001