If you would like to author some content, there is a good home for it at:
http://arswiki.org/wiki/Securing_ARS

Just needs more content.  I started this a while back, but there were
a number of topics mentioned that would definitely fit into this
article.

Axton Grams

On 7/24/07, Marc Simmons <[EMAIL PROTECTED]> wrote:
**
Thanks to all for the GREAT input.  Maybe I compile all of this information
into that "white paper" I've been looking for... :-)

Marc



On 7/23/07, Axton <[EMAIL PROTECTED]> wrote:
> Some ar.conf settings:
>
> Allow-Backquote-In-Process-String
> Allows the server to run a process with a backquote in the process
> name or in its arguments. Valid values are T and F. The default is F.
>
> Disable-Client-Operation
> The following client types can be restricted:
> 14—arreload
> 15—arcache
>
> Disable-User-Cache-Utilities
> Prevents unauthorized users from attempting to use User Cache
> commands. Valid values for this option are T and F. The default is F
> (cache utilities are enabled). If the parameter is set to T, then the
> arreload and arcache utilities are disabled for the AR System server.
>
> Plugin-Disable-Remote
> Specifies whether the plug-in service will accept calls from a remote
> server. Valid values are T and F. If the option is set to T, the
> plug-in service accepts calls only from an AR System server running on
> the local machine. The default is F (allow calls from a remote
> server).
>
> If you are on a pre-7 server, there is also a hard coded password for
> the following accounts:
> - Remedy Application Server
> - MidTier User
> both of which have admin rights.
>
> Active-Link-Dir
> The directory where active link server run processes are stored. Only
> commands located in the specified directory can be run. This is a
> security feature that makes sure clients or API programs can use only
> a safe set of server processes.
>
> Active-Link-Shell
> (UNIX only) A shell that will be the parent of any active link server
> process. This parameter causes the server to start the shell with the
> specified process as a parameter. This is a security feature. The
> specified shell might be a security shell that verifies a path, or
> runs with a user ID other than the one that the server uses. For
> example, if the server runs as root and an administrator specified a
> shell that runs as a lower user privilege, an active link will invoke
> the shell that runs as a user, instead of as root.
>
> Axton Grams
>
> On 7/23/07, Marc Simmons <[EMAIL PROTECTED]> wrote:
> > **
> > Axton,
> >
> > Thanks for the imput.  I'm actually looking to provide more guidance to
our
> > server security team.  When I showed them how to create a user from the
> > command line using arcache (an admin user at that) and then access their
> > system they lost their minds.  When I created a form and workflow and
showed
> > them that I could access their system as root (the owner of the
processes)
> > using $PROCESS$ there were strokes, seizures etc.  So now they have
asked me
> > what else they need to look for, I was hoping that someone in the list
new
> > of a white paper or other document that layed out a security plan for
Remedy
> > Servers.
> >
> > Thanks,
> > Marc Simmons
> >
> >
> > On 7/20/07, Axton <[EMAIL PROTECTED]> wrote:
> > >
> > > Some other things to consider:
> > > - allowing back ticks in run process commands
> > > - run process directory and access
> > > - sql injection
> > > - relative security of data on the wire (no/weak/strong encryption)
> > > - web: xss vulnerabilities
> > > - form/field/active link permissions
> > > - server hardening
> > > - network architecture for related components
> > > - protocol implementation (malformed packets causing DoS, etc.); they
do
> > exist
> > >
> > > Patch is probably the incorrect term, you are probably looking to
> > > properly configure the system.  Only BMC can provide patches, usually
> > > in the form of a stripped binary.
> > >
> > > Axton Grams
> > >
> > > On 7/20/07, Marc Simmons < [EMAIL PROTECTED]> wrote:
> > > > **
> > > >
> > > > Hi List,
> > > >
> > > > Does anyone know of a white paper that details the security risks
with
> > > > Remedy (ie arcache, arreload, encryption) etc and how to "patch"
those
> > > > holes.  I know that there are bits and pieces of information in the
> > > > admin/config guides etc.  I was just hoping that there would be a
doc
> > that
> > > > consolidated all of that information.
> > > >
> > > > Thanks
> > > > --
> > > > Marc Simmons
> > > > Remedy Administrator
> > > >
> > > > "Everyday above ground is a good day... the rest is a choice!"
> > > > __20060125_______________________This posting was
> > submitted
> > > > with HTML in it___
> > >
> > >
> >
_______________________________________________________________________________
> > > UNSUBSCRIBE or access ARSlist Archives at www.arslist.org
ARSlist:"Where
> > the Answers Are"
> > >
> >
> >
> >
> > --
> >
> > Marc Simmons
> > Remedy Administrator
> >
> > "Everyday above ground is a good day... the rest is a choice!"
> > __20060125_______________________This posting was
submitted
> > with HTML in it___
>
>
_______________________________________________________________________________
> UNSUBSCRIBE or access ARSlist Archives at www.arslist.org ARSlist:"Where
the Answers Are"
>



--
Marc Simmons
Remedy Administrator

"Everyday above ground is a good day... the rest is a choice!"
__20060125_______________________This posting was submitted
with HTML in it___

_______________________________________________________________________________
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org ARSlist:"Where the Answers 
Are"

Reply via email to