Problem solve Get help with specific problems with your technologies, process and projects.

Run few services, be more secure

Run few services, be more secure
by Katherine Hosch

This tip provides one way to secure your Solaris operating system.

Aside from not having up-to-date patches, improperly configured inetd services are a huge source of security vulnerabilities. Most network services are started by the inetd daemon, following configuration rules specified in /etc/inetd.conf. The default Solaris /etc/inetd.conf includes lines to start up many unnecessary (and highly vulnerable) services. Services that are often unnecessary are: exec, comsat, talk, uucp, finger, echo, discard, daytime, chargen, sadmind, rpc.cmsd and rpc.ttdbserverd. The last three of these have been some of the favorite targets of hackers, since they all have been susceptible to buffer-overflow attacks, which allow for remote root compromise of targeted systems.

About the author:
Katherine Hosch is a security engineer and systems administrator with Scientific Applications International Corporation (SAIC) at Entergy Services, Inc., in Covington, LA.

Related book

Solaris Security : For System Administrators
Author : Peter H. Gregory
Publisher : Prentice Hall
ISBN/CODE : 0130960535
Cover Type : Soft Cover
Pages : 250
Published : Aug. 1999
System administrators: Learn the specifics for making your system secure, whether it's an organization-wide network or a standalone workstation. Expert author Peter Gregory has managed security for everything from top-secret corporate research facilities to casinos. Take advantage of his expertise to build a secure, reliable system of your own. Solaris Security looks at the physical, logical and human factors that affect security.

This was last published in March 2001

Dig Deeper on Alternative operating system security

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.