Some ar.conf settings:

Allow-Backquote-In-Process-String
Allows the server to run a process with a backquote in the process
name or in its arguments. Valid values are T and F. The default is F.

Disable-Client-Operation
The following client types can be restricted:
14—arreload
15—arcache

Disable-User-Cache-Utilities
Prevents unauthorized users from attempting to use User Cache
commands. Valid values for this option are T and F. The default is F
(cache utilities are enabled). If the parameter is set to T, then the
arreload and arcache utilities are disabled for the AR System server.

Plugin-Disable-Remote
Specifies whether the plug-in service will accept calls from a remote
server. Valid values are T and F. If the option is set to T, the
plug-in service accepts calls only from an AR System server running on
the local machine. The default is F (allow calls from a remote
server).

If you are on a pre-7 server, there is also a hard coded password for
the following accounts:
- Remedy Application Server
- MidTier User
both of which have admin rights.

Active-Link-Dir
The directory where active link server run processes are stored. Only
commands located in the specified directory can be run. This is a
security feature that makes sure clients or API programs can use only
a safe set of server processes.

Active-Link-Shell
(UNIX only) A shell that will be the parent of any active link server
process. This parameter causes the server to start the shell with the
specified process as a parameter. This is a security feature. The
specified shell might be a security shell that verifies a path, or
runs with a user ID other than the one that the server uses. For
example, if the server runs as root and an administrator specified a
shell that runs as a lower user privilege, an active link will invoke
the shell that runs as a user, instead of as root.

Axton Grams

On 7/23/07, Marc Simmons <[EMAIL PROTECTED]> wrote:
**
Axton,

Thanks for the imput.  I'm actually looking to provide more guidance to our
server security team.  When I showed them how to create a user from the
command line using arcache (an admin user at that) and then access their
system they lost their minds.  When I created a form and workflow and showed
them that I could access their system as root (the owner of the processes)
using $PROCESS$ there were strokes, seizures etc.  So now they have asked me
what else they need to look for, I was hoping that someone in the list new
of a white paper or other document that layed out a security plan for Remedy
Servers.

Thanks,
Marc Simmons


On 7/20/07, Axton <[EMAIL PROTECTED]> wrote:
>
> Some other things to consider:
> - allowing back ticks in run process commands
> - run process directory and access
> - sql injection
> - relative security of data on the wire (no/weak/strong encryption)
> - web: xss vulnerabilities
> - form/field/active link permissions
> - server hardening
> - network architecture for related components
> - protocol implementation (malformed packets causing DoS, etc.); they do
exist
>
> Patch is probably the incorrect term, you are probably looking to
> properly configure the system.  Only BMC can provide patches, usually
> in the form of a stripped binary.
>
> Axton Grams
>
> On 7/20/07, Marc Simmons <[EMAIL PROTECTED]> wrote:
> > **
> >
> > Hi List,
> >
> > Does anyone know of a white paper that details the security risks with
> > Remedy (ie arcache, arreload, encryption) etc and how to "patch" those
> > holes.  I know that there are bits and pieces of information in the
> > admin/config guides etc.  I was just hoping that there would be a doc
that
> > consolidated all of that information.
> >
> > Thanks
> > --
> > Marc Simmons
> > Remedy Administrator
> >
> > "Everyday above ground is a good day... the rest is a choice!"
> > __20060125_______________________This posting was
submitted
> > with HTML in it___
>
>
_______________________________________________________________________________
> UNSUBSCRIBE or access ARSlist Archives at www.arslist.org ARSlist:"Where
the Answers Are"
>



--

Marc Simmons
Remedy Administrator

"Everyday above ground is a good day... the rest is a choice!"
__20060125_______________________This posting was submitted
with HTML in it___

_______________________________________________________________________________
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org ARSlist:"Where the Answers 
Are"

Reply via email to