Thanks to all for the GREAT input.  Maybe I compile all of this information
into that "white paper" I've been looking for... :-)

Marc


On 7/23/07, Axton <[EMAIL PROTECTED]> wrote:

Some ar.conf settings:

Allow-Backquote-In-Process-String
Allows the server to run a process with a backquote in the process
name or in its arguments. Valid values are T and F. The default is F.

Disable-Client-Operation
The following client types can be restricted:
14—arreload
15—arcache

Disable-User-Cache-Utilities
Prevents unauthorized users from attempting to use User Cache
commands. Valid values for this option are T and F. The default is F
(cache utilities are enabled). If the parameter is set to T, then the
arreload and arcache utilities are disabled for the AR System server.

Plugin-Disable-Remote
Specifies whether the plug-in service will accept calls from a remote
server. Valid values are T and F. If the option is set to T, the
plug-in service accepts calls only from an AR System server running on
the local machine. The default is F (allow calls from a remote
server).

If you are on a pre-7 server, there is also a hard coded password for
the following accounts:
- Remedy Application Server
- MidTier User
both of which have admin rights.

Active-Link-Dir
The directory where active link server run processes are stored. Only
commands located in the specified directory can be run. This is a
security feature that makes sure clients or API programs can use only
a safe set of server processes.

Active-Link-Shell
(UNIX only) A shell that will be the parent of any active link server
process. This parameter causes the server to start the shell with the
specified process as a parameter. This is a security feature. The
specified shell might be a security shell that verifies a path, or
runs with a user ID other than the one that the server uses. For
example, if the server runs as root and an administrator specified a
shell that runs as a lower user privilege, an active link will invoke
the shell that runs as a user, instead of as root.

Axton Grams

On 7/23/07, Marc Simmons <[EMAIL PROTECTED]> wrote:
> **
> Axton,
>
> Thanks for the imput.  I'm actually looking to provide more guidance to
our
> server security team.  When I showed them how to create a user from the
> command line using arcache (an admin user at that) and then access their
> system they lost their minds.  When I created a form and workflow and
showed
> them that I could access their system as root (the owner of the
processes)
> using $PROCESS$ there were strokes, seizures etc.  So now they have
asked me
> what else they need to look for, I was hoping that someone in the list
new
> of a white paper or other document that layed out a security plan for
Remedy
> Servers.
>
> Thanks,
> Marc Simmons
>
>
> On 7/20/07, Axton <[EMAIL PROTECTED]> wrote:
> >
> > Some other things to consider:
> > - allowing back ticks in run process commands
> > - run process directory and access
> > - sql injection
> > - relative security of data on the wire (no/weak/strong encryption)
> > - web: xss vulnerabilities
> > - form/field/active link permissions
> > - server hardening
> > - network architecture for related components
> > - protocol implementation (malformed packets causing DoS, etc.); they
do
> exist
> >
> > Patch is probably the incorrect term, you are probably looking to
> > properly configure the system.  Only BMC can provide patches, usually
> > in the form of a stripped binary.
> >
> > Axton Grams
> >
> > On 7/20/07, Marc Simmons <[EMAIL PROTECTED]> wrote:
> > > **
> > >
> > > Hi List,
> > >
> > > Does anyone know of a white paper that details the security risks
with
> > > Remedy (ie arcache, arreload, encryption) etc and how to "patch"
those
> > > holes.  I know that there are bits and pieces of information in the
> > > admin/config guides etc.  I was just hoping that there would be a
doc
> that
> > > consolidated all of that information.
> > >
> > > Thanks
> > > --
> > > Marc Simmons
> > > Remedy Administrator
> > >
> > > "Everyday above ground is a good day... the rest is a choice!"
> > > __20060125_______________________This posting was
> submitted
> > > with HTML in it___
> >
> >
>
_______________________________________________________________________________
> > UNSUBSCRIBE or access ARSlist Archives at www.arslist.orgARSlist:"Where
> the Answers Are"
> >
>
>
>
> --
>
> Marc Simmons
> Remedy Administrator
>
> "Everyday above ground is a good day... the rest is a choice!"
> __20060125_______________________This posting was submitted
> with HTML in it___


_______________________________________________________________________________
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org ARSlist:"Where
the Answers Are"




--
Marc Simmons
Remedy Administrator

"Everyday above ground is a good day... the rest is a choice!"

_______________________________________________________________________________
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org ARSlist:"Where the Answers 
Are"

Reply via email to