Secuity thingies & Best Practices

From: William H. Magill <magill_at_isc.upenn.edu>
Date: Wed, 1 Mar 2000 13:56:18 -0500 (EST)

I just got my new XP1000/667 and have been playing with 5.0.

One thing which occurs to me which is needed is a "cookbook" for securing
Tru64... also possibly called a "Best Practices."

Corollary to that is a need for a repository of the 5.0 "ported" tools
one expects to be able to use.

I'm working from the host side, not the network side.
So I'm interested in building/expanding COPS and TITAN, not SATAN.

As best I can tell COPS hasn't been modified/updated since the early 90s.
in either cops-perl form or beyond 1.4.

So where to start....
Question 1 is pretty obvious -- I've asked pubs if something like this is
in the works for a Best Practices document?

Other questions:

Who else is playing in this sandbox?
Am I just re-inventing the wheel?
Guess I should put together a Tru64-unix-security-l mailing list?

Comments....?
=============

Dan Farmer (www.fish.com/titan/) lists a bunch of tools.
(below).

SKIP
ssh
smap
smrsh
tripwire
Tcp_wrappers
rcpbind
noshell
COPS
SATAN
TIGER
crack

-- 
                     www.tru64unix.org
T.T.F.N.
William H. Magill                          Senior Systems Administrator
Information Services and Computing (ISC)   University of Pennsylvania
Internet: magill_at_isc.upenn.edu             magill_at_acm.org
                                           http://www.isc-net.upenn.edu/~magill/
Received on Wed Mar 01 2000 - 18:57:11 NZDT

This archive was generated by hypermail 2.4.0 : Wed Nov 08 2023 - 11:53:40 NZDT