AIX Hardening Guide
AIX Hardening Guide
Introduction:
This guide contains procedures that follow best practices in the security industry. Follow these steps to secure an AIX machine.
These steps will help prevent threat agents from exploiting known vulnerabilities.
Procedure:
Check for most recent updates that will need to be performed subsequent to installation.
o Run oslevel –r to determine your maintenance level
o Go to http://techsupport.services.ibm.com/server/criticalfixes3/criticalfixes.html and select your package
o If your level is greater than what is listed on the site, there are no critical patches for your system at this time
Install security patches retrieved before continuing.
Network Services
Secure TCP/IP services. On AIX, the securetcpip command will remove the following commands:
o rlogin and rlogind
o rcp, rsh, and rshd
o tftp and tftpd
o trpt
Verify the /etc/security/services file – any service listed here is exempt from system ACLs.
If the following two lines are in the /etc/services file, remove them:
o sco_printer 70000/tcp sco_spooler # For System V print IPC
o sco_s5_port 70001/tcp lpNet_s5_port # For future use
Verify that packet forwarding has been disabled: /usr/sbin/no -o ipforwarding=0
Verify that source routing is off: /usr/sbin/no -o nonlocsrcroute=0
Verify that ntp (xntp) is running, configured, and starts on boot (/etc/rc.tcpip).
Verify that sshd starts on boot (/etc/rc.d/rc2.d).
Disable unneeded services from /etc/inetd.conf, /etc/inittab, /etc/rc.nfs, /etc/rc.tcpip
rc.tcpip/gated /etc/rc.tcpip Gated routing between interfaces Disable this service and use RIP
or a router instead
rc.tcpip/mroute /etc/rc.tcpip Multicast routing Disable this service. Use a router
d instead
rc.tcpip/names /etc/rc.tcpip DNS name server Use this only if your machine is a
DNS name server
rc.tcpip/ndp- /etc/rc.tcpip IPv6 host Disable unless you use IPv6
host
rc.tcpip/ndp- /etc/rc.tcpip IPv6 routing Disable this unless you use IPV6.
router
rc.tcpip/routed /etc/rc.tcpip RIP routing between interfaces Disable if you have a router for
packets between networks
rc.tcpip/rwhod /etc/rc.tcpip Remote “who” daemon Disable
rc.tcpip/sendmai /etc/rc.tcpip Mail services Disable this service unless the
l machine is used as a mail server
rc.tcpip/snmpd /etc/rc.tcpip Simple network management protocol Disable if you are not monitoring
the system via SNMP tools
Applied Trust Engineering, Inc.
9/28/2005
Page 4 of 5
rc.tcpip/timed /etc/rc.tcpip Old Time daemon Disable this service and use xntp
instead
Common Services
Verify that sendmail is the latest version (executable and config); ‘telnet <host> 25’ to verify versions (if required). (Refer to
www.sendmail.org.)
o Version ______________________
Verify that named is the latest version ‘(in)named version’ (if required). (Refer to www.isc.org.)
o Version ______________________
Verify that sshd is the latest version; ‘telnet <host> 22’ to verify version. (Refer to www.openssh.org.)
o Version ______________________
Verify that sshd runs only Protocol 2 (check sshd_config)
Verify that Apache is the latest version (if required). (Refer to www.apache.org.)
o Version ______________________
Verify that mod_ssl is the latest version (if required). (Refer to www.modssl.org.)
o Version ______________________
Specific Services
Sendmail
Confirm that relaying is turned off (promiscuous relay not set).
Configure sendmail privacy flags (confPRIVACY_FLAGS set in sendmail.mc).
If possible, configure sendmail to only queue/deliver mail, not accept outside connections.
BIND
Verify that Dynamic updates are off.
o /etc/named.conf does not contain the ‘allow-update’ statement.
Verify that recursion is off for external hosts.
o /etc/named.conf world view has ‘recursion no’ set.
Network Options
If you wish to remotely administer your host, don't use unencrypted channels to do so (such as telnet). Configure your
host to use encrypted communications with a utility such as SSH.
Final Updates
Configure syslog to send system log output to a centralized logging servers.
Verify that backup software has been installed and configured.
References:
http://www.cert.org/tech_tips/usc20_full.html#A114
http://colin.bitterfield.com/how_to_production_ready.html
http://www.menandmice.com/docs/DNS&BIND_security.pdf
http://www.sendmail.org/m4/readme.html
http://publib16.boulder.ibm.com/pseries/en_US/aixbman/security/securitytfrm.htm